Second, there are dangerous loopholes. The remote controller requires the controlled computer to open the corresponding port, and also adopts intranet penetration technology, which can penetrate the intranet and firewall, easily connect two computers in different LANs or even different regions for remote control, which is convenient for users and leaves a convenient door for hackers to find network attack paths and vulnerabilities. Some remote control software will send data to the software provider during remote control, thus exposing the information of the controlled computer. Some free remote control software also has a "back door", not only users can control the controlled computer, but also software developers can easily control the controlled computer, which is tantamount to inviting wolves into the room.
Basic principle of computer remote control
There are many kinds of computer remote controllers, which generally refer to all kinds of remote control software, and some also include hardware such as board, installation and key disk. Most functions of the remote controller need to be realized by software. If you need to remotely control computer startup or advanced key functions, you need corresponding hardware to support it.
Remote control software is generally divided into two parts: one is client program, and the other is server program. Usually, the client program needs to be installed in the host computer, and the server program needs to be installed in the controlled computer before it can be used. The process of remote control is generally to execute the client program on the master computer, send signals to the server program in the controlled computer, and establish a special remote service channel, and then the master computer sends remote control commands through this channel to control and monitor the controlled computer.
Through remote control software, users can perform various remote operations. For example, check the screen and window of the controlled computer; Access the disks, folders and files of the controlled computer, and manage or * * * enjoy the resources therein; Run or close the application program in the controlled computer; Check the process list of the controlled computer and activate or stop the program process; Recording and extracting keyboard or mouse operations of the controlled computer; Shut down, log off or restart the controlled computer; Modify the registry of the controlled computer; Operate external devices connected to the controlled computer, such as printers and scanners; Capture the audio and video information around the controlled computer through the camera and microphone of the controlled computer. In addition, the card can be plugged into the controlled computer, and the remote computer can be awakened or turned off by making a phone call (including fixed telephone or mobile phone).
From the principle and function of computer remote control software, it has all the characteristics of "Trojan horse", and its essence is software developed for legal purposes by using the principle of "Trojan horse".
The main purpose of computer remote control
Computer remote control is widely used in many fields, and its uses mainly include the following aspects.
The first is distance training and teaching. The remote controller can be used to train users and employees in different places, control the other party's computer through remote control technology, and demonstrate the operation to the other party, which greatly improves the training efficiency and saves the training cost. Remote control is also widely used in teaching network, and multimedia network with software scheme is the product of the combination of remote control technology and multimedia technology.
The second is telecommuting. The remote controller also allows users to connect to their work computers anywhere, use data and applications in them, access network resources and use printers connected to them. It can also be used for the interaction between colleagues in the company.