Solved

VNC

Posted on 2003-11-23
3
619 Views
Last Modified: 2010-04-14
We are using VNC.

VNC server runs on the server machine and people use VNC viewers to access the server.

I just want to ask how to block other users' access if the server is already being accessed by
a user thru VNC viewer?

Thanks,
0
Comment
Question by:codenamecharlie
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 24

Accepted Solution

by:
shivsa earned 100 total points
ID: 9808110
When you make a connection to a VNC server, all other existing connections to that server are normally closed. This is for security reasons, and because we normally think of VNC as a tool for mobility: your desktop follows you from place to place.

if u use -shared option when invoking vncvewer This option asks the server to leave any existing connections open, allowing you to share the desktop with someone already using it. Some servers have options to change the default behaviour and to override this request.
0
 
LVL 5

Expert Comment

by:juliancrawford
ID: 9808843
This is the registry key that sets the number of users allowed onto the VNC server.

HKEY_LOCAL_MACHINE\Software\ORL\WinVNC3
    Default
      SocketConnect = REG_DWORD 0x00000001

If you set SocketConnect to 1 then only 1 socket is available to connect to.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question