To get started, download RealVNC to the computer you want to control, install it, and choose a license. Then, download VNC Viewer to the computer you wish to exercise control from. Note if you are connecting over the Internet, you may also need to configure your network.
Cross-platform remote control
Enable connections to be established between computers running an unrivalled mix of Windows, Mac OS X, UNIX, and Linux operating systems.
Prevent unauthorized access with a password specific to VNC. Note passwords are always encrypted, even if encryption is turned off or not supported.
128-bit AES encryption
Encrypt connections using 128-bit AES, for high performance encryption. This means that all data transmitted in either direction while connections are in progress—keystrokes and mouse movements made by users; screen captures sent back in order to display the desktop—are resistant to packet sniffing and tampering, man-in-the-middle attacks, and other malicious eavesdropping.
Authorize users to connect using the already-familiar credentials of their own user accounts on a computer. Note passwords are always encrypted, even if encryption is turned off or not supported.
Patented algorithms for encoding screen data enable the user experience to be as seamless as your network connection will allow.
Enable connected users to print files directly to printers connected to their own computers.
Enable connected users to transfer files in either direction, and also share with other users connected at the same time.
Enable connected users to chat to other users connected at the same time, or with a host computer user.
Dedicated support channel
Get help when you need it, and in addition receive free upgrades for the duration of the contract. On expiry, you can renew for a competitive fee to continue receiving help and upgrades.
256-bit AES encryption
Encrypt connections using ultra-secure 256-bit AES, for ultra-high performance encryption. This means that all data transmitted in either direction while connections are in progress—keystrokes and mouse movements made by users; screen captures sent back in order to display the desktop—are resistant to packet sniffing and tampering, man-in-the-middle attacks, and other malicious eavesdropping.
Single sign-on authentication
Automatically authorize users to connect using the credentials they have already entered to log on to their own computers. Note all computers must be in a managed network environment, with (for example) a Kerberos authentication server.
Powerful deployment tool
Windows only (other platforms coming soon). Deploy, install, and license VNC on computers from a central location. Configure VNC from a management console (for example, to change authentication or encryption settings).
Basic remote control for individual private use. Contains no session encryption and none of the premium features contained within Personal and Enterprise. Cross-platform remote control. VNC authentication.