30.01.2015 Views

VNC User Guide - RealVNC

VNC User Guide - RealVNC

VNC User Guide - RealVNC

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7<br />

Making Connections Secure<br />

<strong>VNC</strong> Server (Enterprise) and <strong>VNC</strong> Server (Personal) are designed to permit authenticated and encrypted<br />

connections between a host and any number of client computers out-of-the-box. This chapter explains how<br />

to configure <strong>VNC</strong> Server to relax the authentication and encryption rules if you consider it safe to do so.<br />

Conversely, you can tighten the encryption rules for <strong>VNC</strong> Server (Enterprise) if required.<br />

Note: <strong>VNC</strong> Server (Free) can only authenticate connections. Upgrade the host computer to <strong>VNC</strong> Server<br />

(Enterprise) or <strong>VNC</strong> Server (Personal) if security is important to you.<br />

This chapter also explains how to configure <strong>VNC</strong> Server to protect the host computer from accidental or<br />

malicious damage by particular connected users, either by restricting their access to Real<strong>VNC</strong> remote<br />

control features while connections are in progress, or by preventing them from connecting in the first place.<br />

Contents<br />

Authenticating connections to <strong>VNC</strong> Server 98<br />

Relaxing the authentication rules 104<br />

Bypassing the authentication rules 107<br />

Changing the encryption rules 109<br />

Preventing particular connections to <strong>VNC</strong> Server 111<br />

Restricting features for particular connected users 114<br />

Uniquely identifying <strong>VNC</strong> Server 118<br />

Protecting privacy 118<br />

<strong>VNC</strong> <strong>User</strong> <strong>Guide</strong> 97

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!