Virtual Network Computing
is a graphical desktop sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer.
It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network.
In comparison to RDP it is slightly slower.
It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network.
In comparison to RDP it is slightly slower.
Popular VNC clients
You can install one of these on any phone or tablet and make a connection to your computer
by using the VNC port on your ClusterDesktop account.
by using the VNC port on your ClusterDesktop account.
bVNC | Jump | PocketCloud | RemoteRipple | RealVNC | Remotix | MochaVNC |
------------------------------
Remote Desktop Protocol
is a proprietary protocol,
which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.
In comparison to VNC it is slightly faster.
which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.
In comparison to VNC it is slightly faster.
Popular RDP clients
You can install one of these on any phone or tablet and make a connection to your computer
by using the RDP port on your ClusterDesktop account.
by using the RDP port on your ClusterDesktop account.
Microsoft RDP | aRDP | Jump | PocketCloud | Remotix | 2x RDP |
------------------------------
Secure Shell
is a cryptographic network protocol for secure data communication, remote command-line login,
remote command execution, and other secure network services between two networked computers.
By using SSH you make any connection to your computer secure, so that no one is able to steal any of your data.
remote command execution, and other secure network services between two networked computers.
By using SSH you make any connection to your computer secure, so that no one is able to steal any of your data.
Popular SSH clients
You can install one of these on any phone or tablet and make a connection to your computer
by using the SSH port on your ClusterDesktop account.
by using the SSH port on your ClusterDesktop account.
Connectbot SSH | JuiceSSH | SSH Droid | Tunnel | Tasker SSH |