Xenserver 7.1 Virtual Machine User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Xenserver 7.1 Virtual Machine User's Guide Citrix XenServer ® 7.1 Virtual Machine User's Guide Published November 2018 1.1 Edition Citrix XenServer ® 7.1 Virtual Machine User's Guide Copyright © 2018 Citrix Systems. Inc. All Rights Reserved. Version: 7.1 Citrix, Inc. 851 West Cypress Creek Road Fort Lauderdale, FL 33309 United States of America Disclaimers This document is furnished "AS IS." Citrix, Inc. disclaims all warranties regarding the contents of this document, including, but not limited to, implied warranties of merchantability and fitness for any particular purpose. This document may contain technical or other inaccuracies or typographical errors. Citrix, Inc. reserves the right to revise the information in this document at any time without notice. This document and the software described in this document constitute confidential information of Citrix, Inc. and its licensors, and are furnished under a license from Citrix, Inc. Citrix, the Citrix logo, Citrix XenServer and Citrix XenCenter, and other trademarks appearing herein are the property of Citrix Systems, Inc, or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners. Trademarks Citrix® XenServer ® XenCenter ® Contents 1. About this Document .................................................................................... 1 1.1. Overview ...................................................................................................................... 1 1.2. XenServer Documentation ............................................................................................ 1 2. Virtual Machines ............................................................................................ 2 2.1. Types of Virtual Machines ............................................................................................. 2 2.2. Creating VMs ............................................................................................................... 2 2.2.1. Using VM Templates .......................................................................................... 2 2.3. Other Methods of VM Creation .................................................................................... 3 2.3.1. Physical to Virtual Conversion (P2V) ................................................................... 3 2.3.2. Cloning an Existing VM ...................................................................................... 3 2.3.3. Importing an Exported VM ................................................................................. 4 2.4. XenServer Tools ............................................................................................................ 4 2.4.1. Finding out the virtualization state of a VM ........................................................ 4 3. Supported Guests and Allocating Resources ................................................. 6 3.1. XenServer Product Family Virtual Device Support ........................................................... 6 3.1.1. VM Block Devices .............................................................................................. 6 4. Creating Windows VMs ................................................................................. 7 4.1. Basic Procedure for Creating a Windows VM ................................................................. 7 4.2. Windows VM Templates ............................................................................................... 7 4.2.1. Attaching an ISO Image Library ........................................................................... 8 4.3. Using XenCenter to Create a VM ................................................................................... 8 4.3.1. Installing XenServer Tools ................................................................................. 10 4.3.1.1. Silent Installation .................................................................................. 11 4.4. Using the CLI to Create a Windows VM ....................................................................... 12 5. Creating Linux VMs ...................................................................................... 13 5.1. PV Linux distributions ................................................................................................. 14 5.2. HVM Linux distributions .............................................................................................. 15 5.3. Creating a Linux VM by Installing from an Internet Repository ....................................... 16 iii 5.4. Creating a Linux VM by Installing from a Physical CD/DVD ............................................ 16 5.5. Creating a Linux VM by Installing From an ISO Image ................................................... 17 5.5.1. Network Installation Notes ............................................................................... 18 5.6. Advanced Operating System Boot Parameters .............................................................. 18 5.7. Installing the Linux Guest Agent .................................................................................. 19 5.8. Additional Installation Notes for Linux Distributions ..................................................... 20 5.9. Debian Apt Repositories .............................................................................................. 22 5.10. Preparing to Clone a Linux VM .................................................................................. 22 5.10.1. Machine Name .............................................................................................. 23 5.10.2. IP address ...................................................................................................... 23 5.10.3. MAC address ................................................................................................. 23 6. VM Migration with XenMotion and Storage XenMotion ............................. 24 6.1. XenMotion and Storage XenMotion ............................................................................. 24 6.1.1. XenMotion ...................................................................................................... 24 6.1.2. Storage XenMotion .......................................................................................... 24 6.1.3. Compatibility Requirements ............................................................................. 24 6.1.4. Limitations and Caveats ................................................................................... 25 6.2. Migrating a VM using XenCenter ................................................................................. 25 6.3. Live VDI Migration ...................................................................................................... 25 6.3.1. Limitations and Caveats ................................................................................... 26 6.3.2. To Move Virtual Disks ...................................................................................... 26 7. Updating VMs .............................................................................................. 27 7.1. Updating Windows Operating Systems ........................................................................ 27 7.2. Reinstalling XenServer Tools ........................................................................................ 27 7.3. Updating XenServer Tools ........................................................................................... 28 7.3.1. Updating the I/O drivers .................................................................................. 28 7.3.2. Updating the Management Agent ..................................................................... 29 7.3.3. Managing Automatic Updates .......................................................................... 29 7.4. Updating Linux Kernels and Guest Utilities ................................................................... 30 7.5. Upgrading to Ubuntu 14.04, RHEL 7.x and CentOS 7.x Guests ........................................ 30 iv 8. Container Management ............................................................................... 32 8.1. What is Docker™ ....................................................................................................... 32 8.2. Container Management Supplemental Pack ................................................................. 32 8.3. Managing Docker Containers Using XenCenter ............................................................. 33 8.4. Managing Containers on Other Linux Guests ................................................................ 33 8.5. Accessing Docker Container Console and Logs ............................................................. 34 8.5.1. Automating the Authentication Process (optional) ............................................. 34 8.6. Managing Windows Server Containers ......................................................................... 34 8.7. Network Requirements and Security ............................................................................ 35 8.7.1. Network Partitioning and Firewalls ................................................................... 36 8.7.2. Authentication on Linux-based operating systems ............................................. 36 8.7.3. Authentication for Windows Server Containers .................................................. 36 9. vApps ...........................................................................................................
Recommended publications
  • Citrix Historical Retrospective 1989-2010 2010 • Citrix Xendesktop Feature Pack 1 Released • Citrix Xendesktop 4 Honored A
    Citrix Historical Retrospective 1989-2010 2010 • Citrix XenDesktop Feature Pack 1 released • Citrix XenDesktop 4 honored as an InfoWorld 2010 Technology of the Year Award winner • Joint collaboration agreement with Microsoft to accelerate virtual desktop adoption. • First public release of Citrix XenClient, a new client-side virtualization solution, developed in collaboration with Intel • New Citrix HDX™ “Nitro” technologies, which include groundbreaking innovations at all levels of the desktop virtualization infrastructure, introduced • Citrix XenDesktop® 4 won the “Best of Interop” 2010 award for leading innovation in virtualization • Citrix NetScaler “burst pack” licenses, which extend the flexible pay-as-you-grow model by scaling data center capacity during traffic spikes, introduced • Citrix XenServer 5.6, with powerful new features for the free and paid editions, becomes available • Citrix Receiver and Citrix GoToMeeting become available as apps in the Apple iPad App Store • Citrix XenDesktop including Citrix XenClient and Citrix XenVault are introduced, making it easier for IT to incorporate mobile laptop users into a unified enterprise desktop virtualization strategy • Citrix and Cisco partner to provide the new Cisco Desktop Virtualization Solution • Citrix and Microsoft introduced V-Alliance, an expanded global partnership with Microsoft that gives Citrix and Microsoft partners access to special sales and marketing tools • Citrix acquired VMLogix, a leading provider of virtualization management for private and public clouds • Announces HD Faces – integrated video – in its GoToMeeting web collaboration offering • Citrix GoToTraining, an easy online training tool that allows you to deliver interactive online training sessions to anyone, anywhere, at any time is introduced • Citrix enhanced its Citrix OpenCloud™ infrastructure platform that extend the company’s leadership position as the most widely deployed provider of virtualization and networking solutions for the open cloud.
    [Show full text]
  • Software Catalog for Patch Management and Software Deployment 
    Software Catalog for Patch Management and Software Deployment Find all supported 3rd party applications that can be patched and deployed in Monitoring & Asset Management below. Click on a software to get a more detailed view of the respective versions. (Last Update: 2021/03/23) Vendors # Citrix 4 7-Zip 4 Code4ward.net 5 A CoreFTP 5 Acro 4 Corel 5 Adobe 4 CrowdStrike, Inc 5 AdoptOpenJDK 4 D AIMP Dev Team 4 dotPDN LLC 5 Amazon Services LLC 4 Dropbox 5 Apache Software Foundation 4 E Apple 4 Evernote Corporation 5 Atlassian 4 F Audacity 4 FileZilla 5 Azul Systems, Inc 4 Foxit Corporation 5 B G Bandicam Company 4 GIT 5 Barco, Inc 4 GIMP.org 5 BlueJeans Network, Inc. 4 Glavsoft 5 Botkind, Inc. 4 Google 5 Box.com 4 Gretech Corp 5 C Inkscape 5 CDBurnerXP 4 IrfanView 5 Cisco 4 Software Catalog for Patch Management and Software Deployment J P Jabra 5 PeaZip 10 JAM Software 5 Pidgin 10 Juraj Simlovic 5 Piriform 11 K Plantronics, Inc. 11 KeePass 5 Plex, Inc 11 L Prezi Inc 11 LibreOffice 5 Programmer‘s Notepad 11 Lightning UK 5 PSPad 11 LogMeIn, Inc. 5 Q M QSR International 11 Malwarebytes Corporation 5 Quest Software, Inc 11 Microsoft 6 R MIT 10 R Foundation 11 Morphisec 10 RarLab 11 Mozilla Foundation 10 Real 11 N RealVNC 11 Neevia Technology 10 RingCentral, Inc. 11 NextCloud GmbH 10 S Nitro Software, Inc. 10 Scooter Software, Inc 11 Nmap Project 10 Siber Systems 11 Node.js Foundation 10 Simon Tatham 11 Notepad++ 10 Skype Technologies S.A.
    [Show full text]
  • Industrial Control Via Application Containers: Migrating from Bare-Metal to IAAS
    Industrial Control via Application Containers: Migrating from Bare-Metal to IAAS Florian Hofer, Student Member, IEEE Martin A. Sehr Antonio Iannopollo, Member, IEEE Faculty of Computer Science Corporate Technology EECS Department Free University of Bolzano-Bozen Siemens Corporation University of California Bolzano, Italy Berkeley, CA 94704, USA Berkeley, CA 94720, USA fl[email protected] [email protected] [email protected] Ines Ugalde Alberto Sangiovanni-Vincentelli, Fellow, IEEE Barbara Russo Corporate Technology EECS Department Faculty of Computer Science Siemens Corporation University of California Free University of Bolzano-Bozen Berkeley, CA 94704, USA Berkeley, CA 94720, USA Bolzano, Italy [email protected] [email protected] [email protected] Abstract—We explore the challenges and opportunities of control design full authority over the environment in which shifting industrial control software from dedicated hardware to its software will run, it is not straightforward to determine bare-metal servers or cloud computing platforms using off the under what conditions the software can be executed on cloud shelf technologies. In particular, we demonstrate that executing time-critical applications on cloud platforms is viable based on computing platforms due to resource virtualization. Yet, we a series of dedicated latency tests targeting relevant real-time believe that the principles of Industry 4.0 present a unique configurations. opportunity to explore complementing traditional automation Index Terms—Industrial Control Systems, Real-Time, IAAS, components with a novel control architecture [3]. Containers, Determinism We believe that modern virtualization techniques such as application containerization [3]–[5] are essential for adequate I. INTRODUCTION utilization of cloud computing resources in industrial con- Emerging technologies such as the Internet of Things and trol systems.
    [Show full text]
  • Realvnc @ LC August 2018 LC User Meeting
    RealVNC @ LC August 2018 LC User Meeting Cameron Harr Title (optional) Aug. 21, 2018 LLNL-PRES-XXXXXX This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC RealVNC @ LC § What is RealVNC? § What did we have? § What do we have now? § What’s coming in the future? § How do you use it? 2 LLNL-PRES-xxxxxx Cloud versus direct with VNC Connect VNC Connect is unique among remote access software in its ability to offer both cloud and direct connectivity methods within a single product. At first glance, knowing whether to connect directly or via our cloud service can seem confusing. However, there are clear benefits to each connection method. The trick is knowing how to maximize these benefits. This brief product guide provides an overview of the differences between cloud and direct connectivity, and offers some advice on how each method can be used to your greatest advantage. Key terminology Throughout this guide, we refer to certain RealVNC-specific terminology. VNC Connect is comprised of two separate apps: VNC Server and VNC Viewer. You must install and license VNC Server on the computer you want to control. This is known as your VNC Server computer. You must then install VNC Viewer on the computer or device you want to take control from, which is known as your VNC Viewer device. You do not need to license this device, meaning you can freely connect to your VNC Server computer from as many devices as you wish.
    [Show full text]
  • Sharefile Enterprise
    Product Overview ShareFile Enterprise Built for business. Trusted by IT. Flexible enough to meet enterprise needs. Secure enough to satisfy corporate policies. Easy enough for everyone to use. Collaborate, share, store, sync, and secure data on any device, anywhere. citrix.com Product Overview ShareFile Enterprise Key Benefits: Trends such as employee mobility, workshifting and BYO devices are • Provide secure, instant access to corporate data – online or offline putting pressure on IT, along with the business need to leverage • Data mobility - mobilize existing existing investments, protect corporate data and intellectual property enterprise data wherever it is stored • Choose where data is stored – and meet regulatory compliance requirements. In addition, growing on prem, in the cloud or both global and dispersed workforces, the need to collaborate and • Sync, share and collaborate from anywhere securely share data with other employees, 3rd parties, customers, • Protect data and retain IT control partners, further adds to these complexities. Employees have – solve the “Dropbox problem” • Deliver next-gen mobility increasingly turned to unsecure and unauthorized personal online – integrated mobile desktops, file sharing accounts for access to corporate data and files across all apps and data of their devices, and to share data with others. Personal online file sharing usage in the workplace creates serious risks for the enterprise with potential data loss, violation of regulatory rules, and places data outside of IT control. To combat this, Citrix ShareFile, a secure data sync and sharing service with flexible storage options allows IT to protect and mobilize all enterprise data. ShareFile enables mobile productivity with read-write access to data, workflows and collaboration, allows users to securely share files with anyone, and sync files across all of their devices.
    [Show full text]
  • ME Full Holdings Report 20201231.Xlsx
    2021年2月22日 投資家の皆様へ MFSインベストメント・マネジメント株式会社 弊社ファンド・オブ・ファンズの組入ファンドの保有明細開示について 平素は格別のお引き立てを賜り、厚く御礼申し上げます。 当社が設定、運用するファンド・オブ・ファンズにつきまして、一般社団法人投資信託協会が定める「投資 信託等の運用に関する規則」第22条第4項に基づき、組入ファンドの保有明細開示を下記のとおりご報告 いたします。 記 1. 開示対象のファンド・オブ・ファンズ MFSプルーデント・ファンド(米ドル売り円買い) 2. 開示対象の組入ファンド MFSメリディアン・ファンズ-プルーデント・キャピタル・ファンド 3. 開示基準日:2020年12月31日 4.保有銘柄明細 時価評価額 銘柄名 国名 ウェイト(%) LEG Immobilien AG 4.62 Germany US Treasury Note 1.125% SEP 30 21 3.19 United States US Treasury Note 1.75% MAR 31 22 3.19 United States US Treasury Note 2.25% MAR 31 21 3.19 United States US Treasury Note 2% DEC 31 21 3.16 United States US Treasury Note 2.125% JUN 30 21 3.15 United States Alphabet Inc Class A 2.72 United States Vonovia SE 2.17 Germany Wolters Kluwer NV 2.02 Netherlands Check Point Software Technologies Ltd 2.02 Israel Costco Wholesale Corp 1.96 United States Nintendo Co Ltd 1.83 Japan Charter Communications Inc 1.79 United States Nitto Denko Corp 1.79 Japan Citrix Systems Inc 1.77 United States KDDI Corp 1.72 Japan Oracle Corp 1.70 United States Beiersdorf AG 1.63 Germany Sage Group PLC/The 1.63 United Kingdom Nestle SA 1.62 Switzerland Kose Corp 1.55 Japan Heineken NV 1.43 Netherlands Accenture PLC 1.39 United States Booking Holdings Inc 1.38 United States Amadeus IT Group SA 1.36 Spain Yamato Holdings Co Ltd 1.35 Japan Constellation Software Inc/Canada 1.33 Canada Deutsche Wohnen SE 1.27 Germany 時価評価額 銘柄名 国名 ウェイト(%) Kao Corp 1.25 Japan Kyocera Corp 1.21 Japan adidas AG 1.19 Germany Danone SA 1.04 France Legrand SA 0.99 France Premier Inc 0.97 United States Swiss Re AG
    [Show full text]
  • VNC Connect Security Whitepaper
    VNC Connect security whitepaper VNC Connect security whitepaper Version 1.3 Contents Contents .................................................................................................................................................................... 2 Introduction ............................................................................................................................................................... 3 Security architecture ................................................................................................................................................. 4 Cloud infrastructure ................................................................................................................................................... 7 Client security ........................................................................................................................................................... 9 Development procedures ........................................................................................................................................ 12 Summary ................................................................................................................................................................. 13 VNC Connect security whitepaper Introduction Customer security is of paramount importance to RealVNC. As such, our security strategy is ingrained in all aspects of our VNC Connect software. We have invested extensively in our security, and take great pride in our successful
    [Show full text]
  • Developer Guide(KAE Encryption & Decryption)
    Kunpeng Acceleration Engine Developer Guide(KAE Encryption & Decryption) Issue 15 Date 2021-08-06 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2021. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Issue 15 (2021-08-06) Copyright © Huawei Technologies Co., Ltd. i Kunpeng Acceleration Engine Developer Guide(KAE Encryption & Decryption) Contents Contents 1 Overview....................................................................................................................................1
    [Show full text]
  • Netbackup ™ Enterprise Server and Server 8.0 - 8.X.X OS Software Compatibility List Created on September 08, 2021
    Veritas NetBackup ™ Enterprise Server and Server 8.0 - 8.x.x OS Software Compatibility List Created on September 08, 2021 Click here for the HTML version of this document. <https://download.veritas.com/resources/content/live/OSVC/100046000/100046611/en_US/nbu_80_scl.html> Copyright © 2021 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas Technologies LLC in the U.S. and other countries. Other names may be trademarks of their respective owners. Veritas NetBackup ™ Enterprise Server and Server 8.0 - 8.x.x OS Software Compatibility List 2021-09-08 Introduction This Software Compatibility List (SCL) document contains information for Veritas NetBackup 8.0 through 8.x.x. It covers NetBackup Server (which includes Enterprise Server and Server), Client, Bare Metal Restore (BMR), Clustered Master Server Compatibility and Storage Stacks, Deduplication, File System Compatibility, NetBackup OpsCenter, NetBackup Access Control (NBAC), SAN Media Server/SAN Client/FT Media Server, Virtual System Compatibility and NetBackup Self Service Support. It is divided into bookmarks on the left that can be expanded. IPV6 and Dual Stack environments are supported from NetBackup 8.1.1 onwards with few limitations, refer technote for additional information <http://www.veritas.com/docs/100041420> For information about certain NetBackup features, functionality, 3rd-party product integration, Veritas product integration, applications, databases, and OS platforms that Veritas intends to replace with newer and improved functionality, or in some cases, discontinue without replacement, please see the widget titled "NetBackup Future Platform and Feature Plans" at <https://sort.veritas.com/netbackup> Reference Article <https://www.veritas.com/docs/100040093> for links to all other NetBackup compatibility lists.
    [Show full text]
  • Citrix Xendesktop on HPE Proliant DL560 with HPE Ssds
    Fact sheet Citrix XenDesktop on HPE ProLiant DL560 with HPE SSDs Boost mobility, increase productivity, and reduce costs with a persistent, high-performance client virtualization solution to meet the needs of your most demanding users—online and oline with HPE servers and HPE Solid State Drives (SSDs)—powered by Intel Are you facing these challenges? • Do you need remote access to apps from anywhere, at any time, using any device? • Would you like to improve data security, maintain compliance, and address data geo location requirements? • Do you want to increase flexibility and scalability to support all the users within your environment? • Are you looking for a consistent, high-performance user experience to meet SLAs? • Do you want to simplify and accelerate your Microsoft® Windows® 10 migration? Client virtualization is the answer! Centralized management and control A seamlessly integrated user experience • Deliver applications and full virtual desktops • Ensure consistent performance and availability • Support Linux®, Mac, and Windows endpoints • Centralize file sharing for your virtual workforce • Simplify image management Increased protection of corporate assets • Automate desktop provisioning • Deploy granular security controls • Save on PC refresh cycles • Ensure full auditability for compliance and protection • Increase employee productivity • Reduce risk of data breaches by keeping apps and data in the data center Fact sheet Deploy end-to-end, high-performance client virtualization Accelerate time-to-value HPE ProLiant DL560
    [Show full text]
  • Accessing Remote Desktop Using VNC on Dell Poweredge Servers
    Accessing Remote Desktop using VNC on Dell PowerEdge Servers and MX7000 Modular Infrastructure This technical white paper provides information about establishing secure remote desktop connections to server host operating systems (OS) by using the standard VNC clients. Abstract Dell EMC PowerEdge servers support efficient and secure remote management tools. Virtual Network Computing (VNC) technology is incorporated in the iDRAC Enterprise firmware to support open and easy-to-use remote desktop functionality. This functionality is in addition to the browser-based remote console support accessible on the iDRAC GUI. September 2018 Dell EMC Technical White Paper Revisions Revisions Date Description Sep 2018 Initial release Acknowledgements This paper was produced by the following members of the Dell EMC Server and Infrastructure Systems team: Authors Saurabh Kishore — Software Principal Engineer Alex Rote — Software Senior Engineer The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. © <Sep/12/2018> Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. Dell believes the information in this document is accurate as of its publication date. The information is subject to change without notice. 2 Accessing Remote Desktop using VNC on Dell PowerEdge Servers and MX7000 Modular Infrastructure Acknowledgements Contents Revisions............................................................................................................................................................................
    [Show full text]
  • VNC User Guide 7 About This Guide
    VNC® User Guide Version 5.3 December 2015 Trademarks RealVNC, VNC and RFB are trademarks of RealVNC Limited and are protected by trademark registrations and/or pending trademark applications in the European Union, United States of America and other jursidictions. Other trademarks are the property of their respective owners. Protected by UK patent 2481870; US patent 8760366 Copyright Copyright © RealVNC Limited, 2002-2015. All rights reserved. No part of this documentation may be reproduced in any form or by any means or be used to make any derivative work (including translation, transformation or adaptation) without explicit written consent of RealVNC. Confidentiality All information contained in this document is provided in commercial confidence for the sole purpose of use by an authorized user in conjunction with RealVNC products. The pages of this document shall not be copied, published, or disclosed wholly or in part to any party without RealVNC’s prior permission in writing, and shall be held in safe custody. These obligations shall not apply to information which is published or becomes known legitimately from some source other than RealVNC. Contact RealVNC Limited Betjeman House 104 Hills Road Cambridge CB2 1LQ United Kingdom www.realvnc.com Contents About This Guide 7 Chapter 1: Introduction 9 Principles of VNC remote control 10 Getting two computers ready to use 11 Connectivity and feature matrix 13 What to read next 17 Chapter 2: Getting Connected 19 Step 1: Ensure VNC Server is running on the host computer 20 Step 2: Start VNC
    [Show full text]