?
Solved

VNC

Posted on 2003-11-23
3
Medium Priority
?
628 Views
Last Modified: 2010-04-14
We are using VNC.

VNC server runs on the server machine and people use VNC viewers to access the server.

I just want to ask how to block other users' access if the server is already being accessed by
a user thru VNC viewer?

Thanks,
0
Comment
Question by:codenamecharlie
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 24

Accepted Solution

by:
shivsa earned 400 total points
ID: 9808110
When you make a connection to a VNC server, all other existing connections to that server are normally closed. This is for security reasons, and because we normally think of VNC as a tool for mobility: your desktop follows you from place to place.

if u use -shared option when invoking vncvewer This option asks the server to leave any existing connections open, allowing you to share the desktop with someone already using it. Some servers have options to change the default behaviour and to override this request.
0
 
LVL 5

Expert Comment

by:juliancrawford
ID: 9808843
This is the registry key that sets the number of users allowed onto the VNC server.

HKEY_LOCAL_MACHINE\Software\ORL\WinVNC3
    Default
      SocketConnect = REG_DWORD 0x00000001

If you set SocketConnect to 1 then only 1 socket is available to connect to.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question