Method: 1. Use the "yum install..." command to install the VNC service software; 2. Edit the vnc operation script; 3. Set the vnc password and start the service; 4. Open the 5901 port of the firewall; 5. Turn off SELinux and configure the "/etc/selinux/config" file.
#The operating environment of this tutorial: centos7 system, thinkpad t480 computer.
VNC requires a desktop installed on the system. If it is a production environment server and a minimal installation is used during installation, then perform the following operations according to the GNOME desktop.
# 列出的组列表里有GNOME Desktop。 yum grouplist #安装之 yum groupinstall -y "GNOME Desktop" # 安装完成后,修改默认启动方式为图形化界面 systemctl set-default graphical.target //设置成图形模式 # 如果要换回来 systemctl set-default multi-user.target //设置成命令模式 #然后重启系统即可
Step 1: Install the VNC service software, use the root user to execute the following commands (the following operations are performed under the root user unless otherwise specified):
yum install tigervnc-server -y
After installation, you can use the following command to verify whether the installation is successful:
rpm -qa|grep tigervnc-server
##Step 2: Copy the startup operation script of vnc , in vncserver@:1.service: 1 means "desktop number", the started port number is 5900, the desktop number is 5901, if there is another one, it is 2, the port number plus 1 is 5902, and so on:
cp /lib/systemd/system/vncserver@.service /etc/systemd/system/vncserver@:1.service
Step 3: Edit /etc/systemd/system/vncserver@:1.service
vim /etc/systemd/system/vncserver@\:1.service


Step 4: Set the vnc password, execute su cy, switch to the cy user just set in the configuration file, execute (this step is performed under the cy user), enter the password twice , after the input is completed, you will be prompted whether to set the view-only password ("View-only password" password, only allows viewing, no control permissions.) This can be set or not:
vncpasswd
Step 5: Start the service:
systemctl start vncserver@\:1.serviceYou may be asked to enter the start service command for the first time (reload the configuration file , you need to execute the daemon-reload subcommand when adding new files or changing configuration files):
systemctl daemon-reloadAfter the execution is completed, just execute the startup command:
systemctl enable vncserver@\:1.service
Step 6: Check whether the port is listening:
netstat -lnpt|grep Xvnc

Step 7: Open the 5901 port of the firewall:
firewall-cmd --zone=public --add-port=5901/tcp --permanentIf the firewall is not started, it needs to be started first Firewall.
systemctl stop firewalld.service
systemctl disable firewalld.service
Step 8: Turn off SELinux and edit the /etc/selinux/config file:
vim /etc/selinux/config
Step 9: Enter the server IP:desktop number (such as 192.168.31.100:1) in the vnc client (vnc viewer), and press Enter after input:
Step 10: After entering the IP, a confirmation will pop up, click contiue:
Step 11: Enter the vnc password:
# #Step 12: Log in successfully, enter the password of the remote machine (after successful login, you need to enter the password of the user of the remote machine, if you do not have a password, you can enter the system directly):
Step 13: Successfully enter the remote desktop:
The above is the detailed content of How to install vnc on centos. For more information, please follow other related articles on the PHP Chinese website!

The reason why CentOS stopped maintaining is RedHat's strategic change. User response strategies include: 1. Migrating to other distributions, such as UbuntuServer, Debian or RockyLinux; 2. Continue to use CentOS7 until June 2024; 3. Turning to CentOSStream; 4. Build solutions, such as custom distributions based on RHEL or using container technology.

RedHatendedsupportforCentOStoshifttowardsacommerciallyfocusedmodelwithCentOSStream.1)CentOStransitionedtoCentOSStreamforRHELdevelopment.2)ThisencourageduserstomovetoRHEL.3)AlternativeslikeAlmaLinux,RockyLinux,andOracleLinuxemergedasreplacements.

CentOS is an open source operating system based on RedHatEnterpriseLinux, suitable for server environments. 1. Select the appropriate media and options during installation and configure network, firewall and user permissions. 2. Use useradd, usermod and systemctl commands to manage users and services, and update software packages regularly. 3. Basic operations include using yum installation software and systemctl management services, and advanced features such as SELinux to enhance security. 4. Check the system log to solve common errors. Optimizing performance requires monitoring resources and cleaning of unnecessary files.

CentOS is the first choice for server and enterprise environments for its superior security, stability and performance. 1) Security provides forced access control through SELinux to improve system security. 2) Stability is supported by the LTS version for up to 10 years to ensure the stability of the system. 3) Performance significantly improves system response speed and resource utilization by optimizing kernel and system configuration.

CentOS alternatives should have the characteristics of stability, compatibility, community support and package management. 1.AlmaLinux provides 10 years of support, 2. RockyLinux is initiated by the founder of CentOS to ensure compatibility with CentOS. Migration cost and performance optimization should be considered when choosing.

CentOS is an open source distribution based on RedHatEnterpriseLinux, focusing on stability and long-term support, suitable for a variety of server environments. 1. The design philosophy of CentOS is stable and suitable for web, database and application servers. 2. Use YUM as the package manager to release security updates regularly. 3. Simple installation, you can build a web server with a few commands. 4. Advanced features include enhanced security using SELinux. 5. Frequently asked questions such as network configuration and software dependencies can be debugged through nmcli and yumdeplist commands. 6. Performance optimization suggestions include tuning kernel parameters and using a lightweight web server.

CentOS is widely used in server management and web hosting. Specific methods include: 1) using yum and systemctl to manage the server, 2) install and configure Nginx for web hosting, 3) use top and mpstat to optimize performance, 4) correctly configure the firewall and manage disk space to avoid common problems.

CentOS is a stable, enterprise-grade Linux distribution suitable for server and enterprise environments. 1) It is based on RedHatEnterpriseLinux and provides a free, open source and compatible operating system. 2) CentOS uses the Yum package management system to simplify software installation and updates. 3) Support advanced automation management, such as using Ansible. 4) Common errors include package dependency and service startup issues, which can be solved through log files. 5) Performance optimization suggestions include the use of lightweight software, regular cleaning of the system and optimization of kernel parameters.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

Atom editor mac version download
The most popular open source editor

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 Chinese version
Chinese version, very easy to use

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
