VNC 5.2.2 Build 7974
- LICENSE TYPE:
- FILE SIZE:
- 21.9 MB
- OUR RATING:
- DEVELOPED BY:
- RealVNC Limited
- USER RATING:
- Home \ Network/Admin
Handy and very-easy-to-use utility that makes it easy to control remote computers
VNC, short for Virtual Network Computing, is a straightforward graphical desktop sharing system that helps you control another computer via the Remote Frame Buffer protocol (RFB).
VNC is capable to transmit the keyboard and mouse events from one computer to another over any given network.
With VNC’s help, you can easily establish connections between computers different operating systems, from Mac OS X and Windows to Linux and UNIX.
Reliable protection against unauthorized access and various attacks
What is more, the connection between computers is protected by an encrypted passwords that provide protection against connection snooping, man-in-the-middle attacks, packet-tampering and more.
Thanks to the seamless integration with the system authentication system, you can use your own credentials of the user accounts to connect to another computer. Also, all your connections are encrypted using 128-bit or 256-bit AES, fact that translates into high performance encryption and protection.
Easily share your printers, transfer files and chat with other users
With VNC’s help you can print files using the printers connected to the remote computer, transfer files between devices and chat with the host computer user or other users connected at the same time. In order to use VNC you first have to install the app on the computer you want to control and run VNC Viewer on the Mac you want to control from.
By accessing VNC’s Options window, you can apply IP filters, change the connection port, customize the security settings, enable the guest access, share connected printers and enable or disable keyboard and mouse input, the clipboard share feature, chat and file transfer function.
VNC was reviewed by George Popescu, last updated on December 3rd, 2014
Runs on: Mac OS X 10.4 or later (Universal Binary)
feature list limitations