With addons like Single Click SC your customers don't even have to pre-install software or execute complex procedures to get remote helpdesk support. We are a small team of highly motivated and cool people :- Our goal is to make the more powerful, user-friendly and no-brainer free Remote Control software available.
Also, there is a number of improvements in the Server application.
The following documentation describes each option and the equivalent command-line parameters. When the Ok or Apply buttons of the Options Unless otherwise specified, changed settings take effect immediately. If this option is ticked and the port number is non zero then VNC Server accepts incoming connection requests from clients on a particular TCP port. The port number for VNC Server to use can be set to any other available port number, even ones outside the range. An idle client is one which has transmitted no keyboard or pointer events for more than a certain length of time.
The VNC Server can be configured with a threshold, expressed in seconds, after which idle clients will be disconnected to conserve resources. If the threshold specified is zero seconds then connections will never timeout. The default idle timeout is one hour. Note that pointer and keyboard events received from clients will prevent their connection timing out even if the VNC Server is configured to otherwise ignore those events see below.
This is only normally used when connections are to tunnelled through a custom transport e. If VNC Server is configured to accept connections only via local loopback then the Hosts option is ignored. VNC Server can filter incoming connection attempts based upon the apparent IP addresses of their originators.
Which IP addresses are allowed to connect and which are not is determined by the Hosts pattern. The pattern consists of a comma-separated list of IP address specifications, prefixed by an action. Each specification starts with an action, gives an IP address, and a subnet-style mask.
The first specification to match the address of the new connection determines the action that will performed. The pattern given above allows the computer with address All other connections are rejected by the - term, which is actually redundant in this case - a connection will always be rejected if it doesn't match anything in the Hosts pattern.
Note that IP addresses and masks are specified in Type-A xxx. The specification The Hosts pattern can be edited more easily through the Access Control interface, which allows IP address specifications to be edited individually and moved up to match first or down to match last the list. The Authentication page allows you to configure the required mode of authentication and level of security of VNC connections.
If your VNC Server is operating in a protected environment, such as a secure LAN or firewall-protected network, then you may wish to configure VNC Server to accept connections without requiring a username or password to be specified. We advise extreme caution when disabling authentication. Do not disable it unless you are absolutely sure that the host network is completely secure.
VNC Password Authentication allows a single password of up to 8 characters to be stored by VNC Server, which remote users must supply when prompted in order to authenticate. The password to use can be configured by selecting Configure and typing the new password twice.
On platforms which support it, the password and all other configuration options are protected using native operating system security methods, so that the password cannot be read or tampered with by other users. By default, VNC Server allows Viewers to connect as long as the correct username and password are supplied. QueryConnect allows an extra level of protection to be applied, requiring a local user to explicitly accept incoming connections.
When QueryConnect is enabled, incoming connections are first authenticated in the normal way. If the user authenticates successfully then a dialog is presented on the server's desktop, displaying the IP address and username of the incoming connection, and requiring a local user to accept the connection.
If the user does not accept the connection within a specified timeout then it is rejected. If an incoming connection requiring acceptance by the local user is received while an earlier connection is being queried then the second connection is automatically rejected, for security reasons. Connections from specific hosts or subnets can be configured to be queried via the Hosts configuration setting. This option affects the behaviour of the QueryConnect option, if enabled. If this option is set then the local user will only be prompted to accept the incoming connection if they are logged in.
If this option is not set then the local user will always be prompted, regardless of whether or not they are logged in. Note that it is not possible to reliably detect whether or not a user is logged in on some older Windows platforms. On these platforms, this option will err on the side of security and always prompt the local user.
If QueryConnect is enabled then the Query Connection dialog will be displayed by default for ten seconds before automatically rejecting the connection. The timeout value can be modified by setting QueryConnectTimeout accordingly. If this option is unticked then incoming pointer movements from all clients will be ignored, preventing any remote VNC Viewer from affecting the pointer of the VNC Server's desktop.
This can be used to configure a server to become effectively view-only. Note that a client will still be deemed active for the purposes of the IdleTimeout setting if it is sending pointer events to the server, whether or not they are accepted. If this option is unticked then incoming keystrokes from all clients will be ignored, preventing any remote VNC Viewer from typing into the VNC Server's desktop.
Note that a client will still be deemed active for the purposes of the IdleTimeout setting if it is sending keyboard events to the server, whether or not they are accepted. If this option is unticked then incoming clipboard updates will be ignored from all clients. This option should be used when making a VNC Server effectively view-only, but may also prove useful to prevent clipboard changes made by clients from overriding the VNC Server's local clipboard when this would be undesirable or confusing.
This option, if unticked, prevents the VNC Server from informing clients of changes to its local clipboard contents. This can be useful when untrusted clients are to be allowed to connect to the VNC Server, since it prevents any private data being accidentally leaked via the clipboard.
This option determines whether keyboard and mouse events received from VNC Viewers can cause the screen-saver to be hidden. This option is actually a system-wide setting and is not implemented by VNC Server itself, so there is no equivalent command-line option. Some older Win32 platforms do not support this option. It is recommended that this check-box be ticked, so that the screen-saver can be disabled by VNC Viewer input.
The mouse and keyboard physically attached to the server computer can be disabled for the duration of a remote connection, preventing local users from interacting with the computer. If this option is set then all incoming connections will be treated as shared, and thus not disconnect any existing connections, regardless of whether the connecting VNC Viewer requested that the connection be shared.
If this option is set then all incoming connections will be treated as non-shared. VNC Server will therefore either disconnect any existing connections, or refuse the incoming connection, depending on whether non-shared connections are configured to replace existing ones see below. When connecting, VNC Viewer specifies whether the connection should be shared or non-shared.
If this setting is configured then the VNC Viewer's preference will be respected. If an incoming connection is to be shared either by choice or because AlwaysShared is set then existing connections remain active. If a connection is non-shared either by choice or because NeverShared is set then either the new connection must be rejected, or existing clients disconnected. If this setting is configured then existing clients will be disconnected when a new non-shared connection is made.
Otherwise, they will remain, and the new connection will fail. Decorations such as wallpaper or font smoothing effects can make it harder for VNC Server to compress graphical data for trasmission to viewers. Simple, secure, ready-to-use remote access software for professionals and enterprises.
Toolkits and solutions for integrating secure, real-time remote access. The quick and easy way to connect to a Windows remote desktop from your tablet, PC, or smartphone. Seamlessly connect to and support your macOS computers from any location or device. Educate, monitor and innovate — instantly connect to and control all your remote Raspberry Pi devices. Secure, easy-to-use remote access software for educational institutions. Business and technology insights to help evolve your remote access strategy.
Join our world-class, multi-disciplinary team in Cambridge, UK. Our software is built from the ground up with security and privacy in mind. Device access and instant support together cover every remote access use case. Provide a consolidated remote access strategy that evolves with your business. Learn how our customers save time and money, increase efficiency and reduce risk. All our whitepapers, product brochures, ebooks and webinars in one place.
Education Secure, easy-to-use remote access software for educational institutions Integrators and OEMs Build remote access into your own products and services Home subscribers Free for non-commercial use on up to 5 devices Menu. About us. Blog Business and technology insights to help evolve your remote access strategy Press releases All our latest product and company news Menu. Join our world-class, multi-disciplinary team in Cambridge, UK Employee benefits Details of our standard benefits package Menu.
Provide a consolidated remote access strategy that evolves with your business Remote access tutorial New to remote access?
VNC® Connect is the latest version of our remote access software for personal and commercial use. It consists of a VNC® Server app for the computer you want to. TightVNC is a free remote desktop application. With TightVNC, you can see the desktop of a remote machine and control it with your local mouse and keyboard. TightVNC Server. -, Windows ; UltraVNC Server. -, Windows ; TigerVNC. -, Windows, Linux, Mac ; RealVNC. $0 - $50, Windows, Mac OS X, Linux.