the Internet Windows Android

The best program for remote control of computers. How to set remote access to the computer: three simple ways

Simultaneous work on several computers, of which only one is in front of you, and the rest - at least on the other side of the Earth, are not fiction. To enjoy this miracle opportunity, enough access to the Internet and programs remote control On each machine.

Remote control programs are bridges connecting PC or mobile gadget, which is in front of you, with various computer devices around the world. Of course, if you have a key, that is, a password allowing a remote connection with them.

The possibilities of this kind of programs are very wide. This is access to the contents of the disks, and the launch installed applications, and change system settings, and view the actions of the user ... in a word, they allow you to do almost all the same on a remote PC as on the local one. Today's article is an overview of six free software remote computer management on windows database (and not only), one of which is part of the operating system itself.

If you need to establish a connection of two computers or PCs and a mobile device, one of which (remote) is under windows controlAnd the second is under Windows, iOS, Android or Mac OS X, sometimes you can do without third-party programs (only Windows computers are involved in the connection). System application The "remote desktop" is present in all the releases of "Windows", starting with XP. It is not necessary that on both machines the same version of the OS, you do without problems install the connection, for example, between Windows 10 and Windows 7.

Microsoft app Remote Desktop. For Android and Apple are available for free download In Google Play and App Store.

What else is needed to create a connection:

  • Permission to remote access - Configured on the computer you are going to manage from outside.
  • Account with password on a remote computer. To solve administrative tasks (installation and removal of programs, changes in system settings, etc.) need account with administrator rights.
  • Connecting both machines to the Internet or in one local network.
  • On the receiving side - open port TCP 3389 (used by the remote default desktop).

How to enable permission

This and further instructions are shown on example Windows 10.

  • Running the right mouse button on the "Computer" icon on the desktop. Open "Properties".

  • Being in the system "System", click in the "Setup Remote Access" transition panel. In the "Remote Desktop" windows, we set the "Allow ..." label ("Allow connections only with authentication" checkbox is better left). After clicking clicking "Users".

  • To add a user to which a remote connection with you will be allowed, click "Add". In the "Enter Names" field, you will enter the name of its account on this computer (do not forget, it must be with a password!), Press "Check names" and approx.

This is completed on this.

How to configure connection settings

The following actions perform on the computer from which we carry out a remote connection.

  • Click on the search icon in the taskbar and start typing the word "remote". Select from the found "Connection to a remote desktop".

  • By default, the application window opens folded, where there are only fields for entering the computer name and user data. To access all settings, click the "Show Parameters" arrow. At the bottom of the first tab - "General", the button for saving the connection parameters to the file is. It is convenient when you use different settings To connect with different machines.

  • The following tab is "Screen", allows you to change the properties of the image of the remote computer screen on your monitor. In particular, to increase and reduce the resolution, use multiple monitors, change the depth of color.

  • Next, you will configure "Local Resources" - sound from a remote computer, the conditions for using keyboard cuts, access to the remote printer and the exchange buffer.

  • The "Interaction" tab parameters affect the connection speed and the quality of the demonstration of the picture from the remote machine on your monitor.

  • The "Advanced" tab allows you to determine the actions with an unsuccessful authentication of the remote PC, as well as set the connection parameters when connecting through the gateway.

  • To start a remote access session, click "Connect" in the next window, enter a password.

After installing the connection session at the computer current user It will be completed and the management will go to you. The user of the remote PC will not be able to see its desktop, as the screensaver will appear on the screen instead.

Following this instruction, you can easily connect with a computer that is on the same network with yours. If the devices are connected to different networksYou will have to make some additional settings.

How to connect to a remote computer via the Internet

There are 2 ways to configure a remote working connection. wooden tables Through the Internet - by creating a VPN channel so that the devices see each other in the same way as if they were in one local network, and by redirecting the port 3389 to the local network and change the dynamic (variable) IP address of the remote machine to constant (static).

The methods of creating VPN channels are abuse, but the description of them all will take quite a lot of space (in addition, the mass of information about it is easily located on the network). Therefore, we consider for example one of the simple - own means Windows.

How to create a VPN channel in Windows

On a remote machine, which will be the server:


After that in the folder network connections The "Incoming Connections" component will appear, which will be a VPN server. To ensure that the connection is not blocked by the firewall, do not forget to open the TCP 1723 port on the device. And if the server is assigned a local IP address (starts at 10, 172.16 or 192.168), the port will have to be redirected to the external network. How to do it, read below.

On the client computer (Windows 10), the connection is configured even easier. Run the "Parameters" utility, go to the "Network and Internet" section -\u003e "VPN". Click "Add NPN connection".

In the Parameters window, specify:

  • Service provider - WINDOVS.
  • Connection name - any.
  • Name or server address - IP or domain name The server you created before that.
  • VPN type is to determine automatically or PPTP.
  • Data type for input is a login and password (one of the accounts you gave permission to access). In order not to enter this data for each connection, write them into the appropriate fields below and set the "Remember" label.


Port redirection on the router and getting static IP

Redirection (forward) ports on different devices (routers) is performed in its own way, but general principle Everywhere is the same. Consider how this is done, on the example of the TP-LINK standard home router.

Open the "Redirection" and "Virtual Servers" in the admin panel of the router. In the right half of the window click the "Add" button.

In the "Add or Edit Record" window, we enter the following settings:

  • Service port: 3389 (or 1723, if you configure VPN).
  • The inner port is the same.
  • IP address: computer address (see the connection properties) or a domain name.
  • Protocol: TCP or all.
  • Standard service port: You can not specify or select from the PDP list, and for VPN - PPTP.

How to make a changeable IP address permanent

The standard package of Internet service providers for home subscribers, as a rule, includes only a dynamic IP address that is constantly changing. And the consolidation of the user of the unchanged IP usually goes to him in a round sum. So that you do not have excess costs, there are DDNS services (dynamic DNS), whose task is to assign a permanent domain name to a device (computer) with a changing network address.

Many DDNS services provide their services for free, but there are also those who charge for this a small subscription fee.

Below I give a brief list of free DDNS, whose opportunities for our task are more than enough.

The rules for using these services, if different, then slightly: first we pass the registration of the account, then I confirm the Email address, and finally, register the domain name of your device and activate it. After that, yours home computer There will be your own name on the Internet, for example, 111pc.ddns.net. This name should be specified in the connection settings instead of the IP or name on the local network.

By the way, some routers support only a small group of DDNS providers, for example, only the oldest and most famous Dyndns (now paid) and NO IP. And others - such as ASUS, have their own DDNS service. Remove restrictions helps installation on router alternative firmware DD-WRT.

Pros and Cons Using Remote Windows Desktop

The main advantage of proprietary windows Before third-party developments is the absence of intermediary servers when connected, and therefore reducing the risk of data leakage. In addition, this tool has a lot flexible settings And with a skillful approach, it can become a "impregnable fortress" and "cosmic rocket".

Other pluses of Windows Desktop are the lack of need to download, restrictions on the duration of the session, the number of connections and free.

Disadvantages - the complexity of the setting for access via the Internet, vulnerability to Pass The Hash attacks.

TeamViewer.

Before you start using the service, you will have to register Google account (Android-devices already have it already) or log in to it in the browser Google Chrome..

The main window of Chrome Desktop includes 2 sections:

  • Remote support. Here are the options for managing one-time connection to another PC and provide access to your.
  • My computers. This section contains the machines with which you previously installed the connection and can quickly connect to them according to a given PIN code.

When the first communication session, you will install an additional component (host), which will take 2-3 minutes, will be installed on the Chrome Desktop. When everything is ready, it will appear on the screen secret code. After entering it in the appropriate field, click "Connection".

Like when working with TeamViewer, the user of the remote machine will be able to see all your actions on the screen. So for hidden surveillance, for example, for the child, these programs are not suitable.

- Very simple and equally reliable utility designed to remotely control computers under Windows and Linux. Its main advantages are ease of use, reliability, high speed connection as well as it does not require installation. Cons - in the absence mobile versions (Install the connection through Android and IOS with this program will not work) and in the fact that many antiviruses consider it malicious and strive to remove. Fortunately, the latter is easy to prevent, adding an exclusion utility.

AMMYY ADMIN supports 2 ways to establish communication - by the ID number and by the IP address. The second works only on the local network.

The utility window is divided into 2 half - "Client", where there are computer identification data and password, and "operator" - with fields for entering this data. Here is the connection button.

The book of contacts and customization of the program, which are pretty simple, hidden in the "AMMYY" menu.

- Another compact portable Windows program, externally similar to the previous one, but with a more interesting set of functions. Supports 2 methods of connection - on ID and IP, and 3 modes - complete control, file manager (File Transfer) and viewing the remote PC screen.

It also allows you to determine several levels of access rights:

  • Using a remote keyboard and mouse operator.
  • Synchronization of the clipboard.
  • Changes in the rights of access by the administrator, etc.

Mode "Only view" can be used for hidden monitoring of users of remote machines (children, employees), which is not in similar products.

In the main window, Aeroadmin is the Email Chat Opening button (located next to the Stop button). Chat is designed for quick shipping email Operator, for example, asking for help. This feature is unique, as there are only ordinary chats for sharing text messaging in the analog programs. And it begins to work only after establishing communication.

Unfortunately, the Aeroadmin contact book becomes not immediately available. It requires a separate activation - through Facebook. And only participants can use it social networkSince, to get the activation code, the developers request a link to a personal page. It turns out that those who liked the program, without registering on Facebook it is not necessary.

Another feature of Aeroadmin is the permissibility of free use even for commercial purposes, if not needed additional features (Continuous connection, multiple parallel sessions, etc.), available only in paid versions.

- the latter in today's review utility for remote connection To a Windows PC from another computer or mobile device. It can be used without installation, and with it.

Like predecessors, has a number of unique features:

  • The highest transfer rate of the picture from the remote machine.
  • The fastest sharing files, even at low Internet speed.
  • Support for simultaneous connecting multiple remote users. Opportunity collaboration Over one project (each user has its own cursor).

Plus, like the other programs of this class, AnyDesk provides the operator full access The functions of the remote machine, it is very simply connected (on ID and password) and reliably protects the transmitted data.

Ivanov Sergey

Remote Administration Programs - Hidden Safety Threat

Information today is one of the most important resources in the world, therefore its security and confidentiality is paid to special attention even at the state level. The more valuable and meaningful information, the more damage from its loss.

The threat of the integrity of the information exists always, it may be a simple failure of the equipment with the loss of all information or malicious penetration and theft or damage to the attacker. In the first case, there is plenty of protection tools, such as regular duplication or archiving information, in the second case, things are much more complicated.

There are many ways to penetrate someone else's computer, to gain access to confidential information, and in each case there are its own means of protection against these threats.

In this article, I will consider threats coming from remote administration programs, find out the reason and source of threats, and then consider the methods of protection against this type of threats.

Remote Administration Programs

Remote administration programs are a powerful tool providing almost complete control over the remote computer. If the attacker succeeds in access through such a program, he will be able to make anything with information on this computer. Most famous programs Remote administration is RDP, VNC, DameWare, TeamViewer, Remote Office Manager, Hamachi, etc. All these programs provide the ability to remotely manage the computer desktop, the ability to copy or delete files and much more, which is very convenient for system administration. In principle, the remote administration program is the perfect "Troyan" for an attacker, the question is only in whose hands will be remote control. Of course, not one system administrator voluntarily will not open access to the computer through such a program. Where does the threat come from? How can an attacker get illegal remote access to a computer?

Source of danger

The threat comes from people who wants to get remote access to a specific computer. To do this, they want to use the remote administration program. Of course, if a remote administration program is installed on the computer and a simple access password will be set, for example, 111111 or 123456, without any security settings, then anyone can penetrate such a computer. In practice, this happens rarely, in serious organizations to protect information and safety, it is suitable for special attention, set complex passwords, additional means of information protection, antiviruses and network screens.

But even with such a serious approach, you still won't be in complete safety! The most serious danger represents former employees who wish for some reasons, to penetrate into the inner network of the enterprise and harm or paint confidential data. Who knows what could be a dismissed employee in his head? What is the resentment in him, and who he wants to pour ...

Former employees represent the greatest danger, because they already know the password for accessing the computer through the remote administration program, and it will not be able to connect remotely. Even if the information is encrypted, full access will provide the ability to simply spoil it, or decrypt, editing the password of access to it.

Consider this problem and solutions, on the example of the most common remote administration program, although other similar programs are also subject to this threat of a name that I will not mention.

What is the complexity of the problem

The fact is that in a large company under the control of the IT department to be up to hundreds of cars, or even more, each of these computers has a program that provides remote access. When the staff is changed in the staff of the IT department, it is necessary to change the access password through this program on all machines through this program, since to work through the remote administration program you need to know the access password, and each time it is connected to enter it.

Install on the hundred cars diverse, a complex password can be, but no one does, because the system administrator can get confused and forget it. Therefore, in most cases, it is installed either the same, or a single complex password, for example: store01, store02, etc. Sometimes the layout on the keyboard when set, i.e. The "flvbybcnhfnjh" password is recruited, which corresponds to the "administrator", instead of the word administrator applies the name of the company or the name of the director. All this makes it possible to choose a password and connect to a computer company on the Internet, where it can already steal or spoil information, and it is possible to use the received computer as a platform for penetrating other computers.
Of course, remote administration programs provide their protection tools, such as IP filtering, NT authorization, password selection protection. You can not always use IP filtering on your computer, as access to it can be made by an employee from a computer that has a dynamic IP or from another region when it is on vacation. Security authorization Windows NT is not often used in practice, because it also requires knowledge of the username on a remote computer and his password, and loses its power before an attacker who already knows the access password.

So, the essence of the problem is that the attacker already knows the password for accessing the computer, or can pick it up quickly.

How to protect yourself?

Means to solve the problem

The first thing that comes to mind is the change in access passwords on all computers, when dismissing one of the employees. But it is simply impossible to produce such an operation every time on hundreds of machines, really, no system administrator to do it. Even if you change the password on all computers, then you need to inform all interested parties about new passwords, it will deliver great inconvenience, although it will solve our problem.

The second way is, changing the approach to the remote control itself. Employees working through the remote control program are not provided with a password in open video. Anyway, many programs require an open password, so you can use additional development or other remote administration program. Good decision In this situation, the Remote Office Manager program (http://www.aledensoft.ru/). Remote Office Manager is a remote administration program that provides almost all the main features of remote administration, but with the ability to save a password access to a remote computer. That is, we can ask for hundreds of computers any passwords that will know only one person, the rest of the staff will be able to remotely connect and work, not knowing access password. Thus, the abolished employee will not know passwords to access remote computers and cannot apply them for penetration. Unfortunately, in this case there is one very unpleasant moment, the fact is that most programs provide the ability to export the address book with all the settings in the form of a file and then upload it on another computer. To completely eliminate the possibility of penetration, it is necessary to regularly change the main passwords of access as prevention, especially since it will not be difficult to make it with the password save function.

Summarize

In my practice there were a lot of cases when former employees, applying a remote administration program, penetrated the computers of their organization and organized a real house. And it can be any employee password For remote access, even if he worked for a couple of months in the sales department and has no relation to system administration. It is better to prevent a hidden threat to the remote administration programs and dismissed employees in advance. I only described the problem and brought an example of its solution, perhaps it will not touch you, or you will find another way to solve it, more suitable for you.

Conclusion

Privacy protection and the preservation of information integrity is a priority for the IT department and its leadership, therefore it is worth paying attention to the hidden threat coming from the remote administration programs and take measures to prevent possible danger in advance, as they say "careful God saves."

Remote computer management programs allow you to remotely manage another computer via the Internet or on the local network. It is convenient when it is necessary to help not a very experienced user, for example, a relative or a friend, a badly dismantled in a computer, something to do on it, without going from his cozy chair and not spending his nerves and time on telephone conversations. Such programs are still convenient to use for remote work, for example, from home to connect to the office and on the contrary - to access your home PC, for system administration of a whole Park of computers and servers.

We will conduct a comparative analysis of remote control programs, select their advantages and disadvantages.

TeamViewer.

One of the most popular programs for remote access, you can quickly download and install it or immediately run, without installation, it will not even be able to cope with it advanced user. When starting, the program displays a window with ID and password to access this computerAnd also TeamViewer allows you to connect to another computer by specifying its ID and password.

Benefits:
The program has several basic modes of operation. This is remote control, file transfer, chat, demonstrating your desktop. The program allows you to configure round-the-clock access to the computer, it will be convenient for system administration. The speed of operation is quite worthy, there are versions for all mobile platforms, for various operating systems, which is very pleased. A simple and fully understandable interface plus a number of additional utilities to extend the program functionality will be useful for remote support services.

Disadvantages:
Although the program is free, but only for non-commercial use, as well as when working with it, more than 5 minutes there is a number of difficulties, such as TV can block a remote connection session, recognizing it as commercial use. For round-the-clock remote access or administering multiple computers, computer networkYou will have to pay for additional program modules. The cost of the program is high.

Outcome:
This program is ideal for a one-time remote connection or use of its short periods of time. Convenient to use from mobile platforms, but do not administer a large number of computers. For additional modules will have to pay extra.

Litemanager.

Simple, but quite a powerful software program, consists of two parts, the first server that needs to be installed or run on a remote computer and viewer that allows you to manage another computer. For work, the program requires a little more skills and experience from the manager, although the server work is even easier than in TeamViewer, the server can be installed once and no longer you need from the user, the ID will always be permanent, it can even be set in manual that Very convenient for memorization. The LiteManager Free version is free for personal and commercial use.

Benefits:
In the program, in addition to the main remote access modes: Remote Control, File Transfer, Chat, Task Manager, Registry Editor, There are unique features, for example: inventory, screen recording, remote installation. The program is free for use on 30 computers, it can be used for round-the-clock access without any additional modules. There are no restrictions on time. It is possible to configure your own server ID to configure the corporate support service. The program does not have any restrictions on time and locking.

Disadvantages:
Lack client under mobile platforms or other systems, there are 30 computers restrictions in free versionTo administer more need to be purchased by a license. Some specific work modes are available only in Pro version.

Outcome:
The LiteManager program is suitable for providing remote support, to administer multiple dozen computers absolutely free to configure your own remote support service. The cost of the program is the lowest in its segment and the license is not limited to time.

AMMY ADMIN.

The program is mainly similar to TeamViewer, but a simpler option. There are only the basic modes of operation - view and control, file transfer, chat. The program can work without installation, free for non-commercial use.

Benefits:
A simple and easy program, you can work both on the Internet and on the local network, has minimal settings and does not require any special skills and skills. By comparison with TeamViewer, a softer licensed policy.

Disadvantages:
Minimum features for remote control, administer a large computer park will be difficult, with a debt of use, more than 15 hours per month, the work session may be limited or blocked, paid for commercial use,

Outcome:
This program is more suitable for a single connection to a computer and not highly complex manipulations, for example, as providing assistance not to an experienced user in configuring a computer.

Radmin.

One of the first remote control programs and known in its circle could not be mentioned, more intended for system administration, the main focus was on security. The program consists of two: server component and client. Requires installation, not an experienced user will not just understand with it, the program is designed mainly to work on the IP address, which is not entirely convenient to provide those. Support via the Internet. The program is paid, but has a free test period.

Benefits:
The program has a high speed of work, especially in a good network, thanks to the video driver capturing the desktop, increased reliability and security. Built in intel technology AMT, which allows you to connect to the BIOS of a remote computer and adjust it. Implemented only the main modes of operation Remote control, file transfer, chat, etc.

Disadvantages:
There is almost no possibility to work without an IP address, i.e. Connect by id. There is no client for mobile systems. There is no free version, only a test period of 30 days. For working with the program you need an experienced user skills. When you connect a video driver can turn off the AERO graphic shell, sometimes the screen flashes.

Outcome:
The program is more suitable for system administrators To administer computers and servers on the local network. To work via the Internet, you may have to configure the VPN tunnel.

Many computer owners would like to fulfill full control over their terminal at home, for example, through another computer or mobile device. You can get remote access to a computer over the Internet in several ways. About them now will be discussed.

Access to a remote computer via the Internet: How does it work?

The Internet is very funny. The fact is that the worldwide web, as it is sometimes called it, works in such a way that it allows to use even the computational capabilities of any terminal. It is not surprising that it is not necessary to connect to any labor computer. You need to know only an external IP address.

The remote system is reconcilized and connected to the source. It looks like a connection with a computer without using wired connections. But not all users of Windows systems know how to set remote access to the computer via the Internet. You can do this by several simple methods. To begin with, we will stop at the tools itself.

Windows

Connect the remote access to the computer via the Internet in the simplest way through the "Control Panel" in which you want to select the viewing of the system properties. In this section, there is a remote access tab, where you should install a check mark in front of the resolution string.

It is worth paying attention to the fact that you will have to use additional settings that are mandatory in use.

How to get remote access to the computer via the Internet: Initial settings

The first is the inclusion of a remote assistant (it will save you from problems in the future). This uses the corresponding string. Why do you need to do? Just because it is in this way that the connection will be entered into the list of exceptions of the Windows brandmaera.

In addition, in the Remote Desktop section, the connection must also be allowed, after which it is possible to make a choice of users who have the right to control the terminal outside. In case of use automatic settings Access to the remote computer via the Internet will be activated for six hours.

IP address

Now you need to find out the external address, without which all connection attempts will be reduced. To do this should be launched command line (CMD in the "Run" console, which is called through a combination of Win + R).

In the window that appears, we prescribe ipconfig and write the address (in Windows 10 it can be copied, in Windows 7 - no). Next, open on the remote terminal connecting to a remote "desktop" and enter the address. If you have an internet connection, the connection will be installed automatically after checking.

If a password is installed on the remote terminal, it will need to enter it. Optionally, you can configure some additional parameters.

Setting the Terminal Server

Initially, in some unofficial versions of the OS, problems can occur with identifier recognition. To solve the problem will have to download special utility In the form of an internetidadmin.exe file. Install the program is needed on both computer terminals.

Next, configure remote access to the computer via the Internet as follows. First, click on the host icon that appears in the system tray and select the connection setting from the menu. This procedure is performed on the terminal from which access to another PC will be accessed. An identifier will appear in the new ID window.

Next, on the computer you want to control, you need to run the program in the "Client" mode. After that, launch the creation of a new connection, give it a name and enter the previously identified ID. After that, the connection mode through the identifier is simply selected. And after a couple of minutes, the connection will be installed.

Power Supply

Remote access to the computer through Internet windows Although it can provide, however, its own scheme looks incomplete. The problem will make that the transition to sleep mode is capable of blocking the connection.

You can disable this parameter in the power supply scheme, access to which you can get from the "Control Panel", and on laptops - use the Click menu on the battery charge indicator.

Inochanned settings

You can dig and in system RegistryIf you use the HKLM branch with the transition to CurrentControlset and search the TerminalServer directory there, which you need to find the RDP-TCP and Portnumber settings. As a port, set a value that exceeds 1024 (preferably around 49152 to 65535, although it is optional).

After that, you need to open port 3389 and add the address ending with 5500 to the exception list (at the beginning may be 192.168, as for the router).

RDP clients

Remote access to the computer via the Internet can be configured using special applications, called RDP clients (from English reduction Remote Desktop). That is, this type of programs are an average link between the computer from which access is accessed, to a remote terminal with a load output just on the standard "desktop".

Remote access programs are very peculiar to the computer. Some of them work in authorization mode, some suggest the use of registration. It is worth noting here to note that it is often common for password entry on the basis of a user account. This is a virus. No application must require "account".

TeamViewer.

Access to a remote computer via the Internet can be carried out using the TeamViewer utility, which is most often used in computer Games And implies online communication between players of one team. Configure access to a remote computer via the Internet with this program is very simple.

At the first stage, you will need to enter the name of the computer and password of access, if it is provided. Next will appear window with an account creation. In principle, this can be refused. Next, the computer id is scanning, which may take a few minutes.

After that, in the program window, you need to set the ID of the connected terminal, enter the password, if required, and click the Connection button to the partner.

Remote access to the computer via the Internet ("Android" - Systems)

With Android devices, access to any OS can also be completely simple. The main thing - the presence google browser Chrome and on a computer, and on a smartphone or tablet.

Application can be downloaded from Play Market.. It can be installed on the computer in a standard way by loading the distribution or from an unofficial source. The presence of the RDP client Chrome is a prerequisite.

It is worth noting another moment. If you want to use remote access to someone else's computer via the Internet, you will have to use so-called sniffers. Among these programs can be found online and offline-type utilities. In the first case, you can simply send a letter to the desired client with an attachment in the form of a photo in which a malicious code will be present, although it is enough to install a program to define an external IP like VNC Scanner GUI.

Many users do not know that it is using this program that you can access a remote computer via the Internet. The application works based on port scanning (and not IP addresses). IP addresses corresponding to open terminal ports will be determined automatically.

What preferred?

As a certain output, you can offer the use of the programs described above. To control the remote terminal from another computer, TeamViewer is perfectly suitable, but to gain access to the same laptop from a mobile device based on Android, you will have to apply the RDP client from Google. Of course, the installation of a web browser will also be required, but there is nothing terrible in this. It takes a minimum of space, and, as they say, it will be useful in the farm, especially since latest version It has sufficiently high speed.

Naturally, when using all connection options, you should pay attention to the setting of the power circuit, so that the remote computer at one fine moment is not turned off with the transition to sleep mode. It is especially worth paying attention to laptops. They will need to rebuild the action options with the lid, because by default it is closing and translates the device to hibernation mode.

Among other things, if the resource-intensive applications can be launched remotely, it is worth identifying to determine the speed of the Internet connection. This is especially true of multimedia in all manifestations. Suite themselves, because video processing or audio consumes quite a lot random access memoryAnd also has a direct impact on the loading of the central processor.

Finally, you should not forget that the port of port 3389 from the Windows firewall must be removed. You may have to open the port also on the router (router) or to make ports. However, this applies to specific models like ZyXEL. On the most common models like TP-Link or D-Link, nothing like this does not need.

And, of course, to obtain control over the remote terminal from another computer you need to have admin rights. Otherwise, nothing will come (the system is simply not allowed to carry out the input). If a password is installed on a remote computer, you will have to enter it. Again, it should be a password applied to the account under which the entrance is carried out in this moment. And it is also worth considering the fact that not all programs can be launched without the rights of the admin. Therefore, it is desirable to enter into a remote system under such "account".

It remains to add that, subject to access from a mobile device, for example, to the home terminal, you need to check the compatibility for speed, because it is not a fact that the mobile device will be able to process the program that is started under Windows. But, as a rule, it usually does not occur with this. If everything is done correctly, and the connection is installed, everything will work like a clock. This also applies to computer, and mobile devicesDespite even the difference in technical equipment (meaning "iron" filling). The operating system itself, under which the connection occurs, by and large the role does not play.

In general, everything is not so difficult, as it could seem at first glance. The main thing is to take into account several basic moments when configuring the connection. Only and everything. How will access (by means of an operating system or using third-party software) Everyone decides himself. But, in principle, so as not to create a problem in an even place, it is better to use the system tools. It is easier and more reliable.

Hello all the readers of the site site! Please advise program for remote computer management. I want to manage the computer at work or from work to manage a home computer. Sometimes there is a desire to help friends in solving computer problems remotely, for example, without leaving the house to establish a friend (living at the other end of the city) antivirus program, set up Skype, remove the virus and so on. It is desirable that the program is free, and nowhere was not necessary to register, that is, I downloaded, I started and working. Sergey.

Program for remote control computer

Hello, friends! Without a doubt, such programs are free, and TeamViewer, today's article about the latter, it is free for personal use, it works without installation, you can wear on a flash drive, and register at will, now make sure now.
I will give you two instructions.
1) How to use the TeamViewer program quickly and without registration.

2) In the second part of the article, we consider that it will give us registration in the TeamViewer program. Registration in the program will help us connect to a remote computer from anywhere and we do not even need a partner.

TeamViewer program is easy to use that all my friends, even very far from computer affairs, also adapted to use it. When for example, they do something wrong in operating system, they immediately launch a "blue programmer with arrows" and call me. Just come on, helping, your program has already been launched, the ID is such, such a password.

In my life there was such an interesting case. One of my buddy asked him to set him a laptop with Windows 7 a few free programs, he himself was in another country at that time, with programs for remote computer management TeamViewer conceived exercise. Any experienced user can give you hundreds of similar cases when with the help of TeamViewer he helped your friends to eliminate any problem in the operating system. So it is your queue to get acquainted with this program, if you are not familiar yet.

We go to the site of the program http://www.teamviewer.com/en and click "Free Full Version"

We have a program installer on the computer,

Run it. We mark the item "Only run" and "Personal / Non-Profit Use". Accept - run.

Pay attention to the main program window. TeamViewer assigned to our computer ID ID and password. If you tell them your partner, it will be able to easily connect to your computer.

How will he do it? Yes, very simple! On the remote computer You need to do the same thing, namely, run the TeamViewer program and mark items "just run" and personal / non-commercial use. Accept - run.

On the remote computer, the TeamViewer program will also start with its identification number ID and password.
Your partner will then introduce your ID ID - 394032155 and clicks the Connect to Partner to the Connect button,

there will immediately appear the password field. Your partner enters the password 2917 and clicks the login.

That's all, your partner connected to your computer and sees your desktop, it can work exactly as behind my desktop. In exactly the same way, you can get to your computer to your partner. Enter in the program of its ID and password, and help your friend remotely.


What gives registration in the TeamViewer program and how to configure uncontrollable access

If you register in TeamViewer, you will be much more convenient to use the program. You will have your own account (permanent ID and password) and with it you can very just set up permanent access To the computers you need. For example, from your home you can go to the working computer, and from the working computer to the home, for this you need the computer is simply turned on. Specially on remote computer TeamViewer. You do not need to run, after installing the program, the TeamViewer service will continuously work in the operating system.
Install the TeamViewer program, for example, home stationary computer. Run the installer. When installing, select "Install to manage this computer remotely" and "Personal / Non-Profit Use". Mark the item "Show Additional settings". Accept - Next.

Ready.

I installed with me (a cool program, I recommend) to sign that the TeamViewer service passed into autoload.

Configure uncontrollable access.

We enter the invented computer name (account) and password. Further.

Create account TeamViewer for free. Enter the name, mail and password. Further.

Ready.

We go to our mailbox, I find a letter from TeamViewer and confirm our account, click on the link.

Now at startup teamViewer programsThis computer will have a permanent ID and password from the account.

Suppose this is our home computer. You can connect to it like this. On any other computer (for example, we have a laptop and it is at work) Run TeamViewer, and simply note the items "just run" and personal / non-commercial use. Accept - complete. Enter the ID code. As you can see the program leads the log, it means simply choose our account and click "connect to a partner",

Enter the password from the account

And we can manage the home computer.
Similarly, you can manage the work computer from the house.