1485:
1886:
84:
43:
406:, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, and
570: – a high performance remote desktop protocol developed by Splashtop, fully optimized for hardware (H.264) including Intel / AMD chipsets, NVIDIA / ATI GPU & APU, Qualcomm Snapdragon, and NVIDIA Tegra. By optimizing for different profiles of media codecs, Splashtop can deliver high frame rates with low latency, and also low power consumption.
1499:
146:
380:, one computer can have a monitor, keyboard, mouse, and remote control software, and control many headless computers. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there.
280:(server). The remote computer in turn sends the display commands to the local computer. When applications with many graphics including video or 3D models need to be controlled remotely, a remote workstation software that sends the pixels rather than the display commands must be used to provide a smooth, like-local experience.
362:
The transition from early protocols like RDP and VNC to modern cloud-based solutions illustrates the technological evolution that has enabled seamless remote work and access across devices. Today, remote desktop technology continues to evolve, incorporating AI, enhanced security, and integration with
350:
Citrix, with its
Independent Computing Architecture (ICA) protocol, and VMware with PC-over-IP (PCoIP), contributed heavily to remote desktop technologies. These solutions allowed organizations to deploy applications and desktops in virtualized environments, centralizing resources while giving users
334:
Developed at the
Olivetti Research Laboratory in 1998, VNC introduced a platform-independent way to share a desktop remotely. VNC works at the framebuffer level, transmitting pixels from the host to the client, enabling it to run across multiple operating systems like Linux, macOS, and Windows. The
720:
While remote desktop software offers significant convenience and flexibility, it also poses security risks if not properly configured. To mitigate these risks, several key security measures have become essential for protecting remote desktop connections, including encryption methods, multi-factor
357:
By the 2010s, services like Amazon
Workspaces and Microsoft Azure Virtual Desktop brought remote desktops into the cloud era. These solutions allowed users to run powerful desktop environments from the cloud, which could be accessed from any device with an internet connection. This model provided
430:
A more recent innovation in the field is cloud-based remote desktops, which allow users to run high-performance computing environments entirely from the cloud. Services like Vagon, Citrix and
Nutanix offer cloud computers tailored for designers, engineers, and gamers. Users can access powerful
327:
Introduced by
Microsoft in 1998 as part of Windows NT 4.0 Terminal Server Edition, RDP was designed to allow users to access a remote computer's graphical user interface (GUI) over a network. RDP evolved rapidly, becoming integral to Windows operating systems, with features such as secure data
272:
Remote access can also be explained as the remote control of a computer by using another device connected via the internet or another network. This is widely used by many computer manufacturers and large businesses help desks for technical troubleshooting of their customer's problems.
287:
viewer, is installed on a local computer and then connects via a network to a server component, which is installed on the remote computer. In a typical VNC session, all keystrokes and mouse clicks are registered as if the client were actually performing tasks on the end-user machine.
342:
In the 2000s, with the growth of cloud computing, the concept of remote desktops expanded beyond direct peer-to-peer connections to cloud-based environments. Virtual
Desktop Infrastructure (VDI) became a game-changer, allowing users to access virtual machines hosted in data centers.
1031:
291:
Remote desktops also have a major advantage for security development, companies are able to permit software engineers who may be dispersed geographically to operate and develop from a computer which can be held within the companies office or cloud environment.
306:, the shift to remote-work environments has led many to work from home with devices without enterprise IT support. As a result, these workers are reliant on remote desktop software to collaborate and keep their systems available and secure.
328:
transmission, clipboard sharing, and support for multiple monitor configurations. Over time, RDP became a widely adopted protocol for enterprises, allowing for remote access, support, and administration of
Windows-based environments.
371:
A main use of remote desktop software is remote administration and remote implementation. This need arises when software buyers are far away from their software vendor. Most remote access software can be used for
335:
open-source nature of VNC led to many derivatives, and it became popular for its simplicity and flexibility across platforms, making it a staple in remote access solutions for non-Windows systems.
320:
Two significant technologies emerged in the 1990s that laid the foundation for modern remote desktop software: Microsoftβs Remote
Desktop Protocol (RDP) and Virtual Network Computing (VNC).
1372:
1531:
1287:
1458:
1426:
391:, remote computers are mainly used for peer to peer connections, where one device is unattended. A remote computer connection is generally only possible if both devices have a
732:
protect data during transmission by encrypting the connection between the client and the remote server. This prevents unauthorized interception of sensitive information.
1780:
1626:
1006:"VMware Announces Strategic Licensing and Co-development Agreement with Teradici for True Remote PC User Experience Further Bolstering its vClient Initiative"
742:
provides an extra layer of security by requiring users to verify their identity with something beyond just a password, such as a code sent to a mobile device.
314:
Remote desktop technology has its roots in the 1980s and 1990s, with early development efforts focusing on enabling remote access to systems across networks.
1524:
576: – a protocol originally developed for forwarding X11 application seamlessly with audio, video, remote printing, etc. β extended to support
644:
have many legal uses, "RAT" connotes criminal or malicious activity. A RAT is typically installed without the victim's knowledge, often as payload of a
599: – a standard protocol for remotely waking up computers that are in low-power mode (turned off, but still have access to a power source).
2324:
1342:
295:
The target computer in a remote desktop scenario is still able to access all of its core functions. Many of these core functions, including the main
171:
56:
1517:
1489:
2301:
1560:
800:
805:
260:
and "remote controlling", either displaying the remote control session or blanking the screen. Taking over a desktop remotely is a form of
427:
use remote desktop software to connect to their victim's computer and will often lock out the computer if the victim does not cooperate.
2332:
1204:
431:
hardware remotely, enabling tasks such as 3D rendering, CAD design, or gaming on any device without needing dedicated local hardware.
1773:
489:
2264:
207:
189:
127:
70:
2060:
2314:
1295:
31:
845:
681:
94:
2127:
1766:
403:
1453:
590:(X11) – a well-established cross-platform protocol mainly used for displaying local applications; X11 is
62:
2319:
2240:
2040:
475:
276:
Remote desktop software captures the mouse and keyboard inputs from the local computer (client) and sends them to the
2296:
2254:
1910:
649:
557:(Simple Protocol for Independent Computing Environments) β remote-display system built for virtual environments by
1234:
2157:
1875:
1711:
1503:
548:
284:
161:
2142:
2020:
1915:
840:
645:
109:
2358:
2230:
2182:
1845:
1651:
830:
786:
These steps reduce the risk of unauthorized access and help secure remote desktop environments effectively.
534:
461:
411:
105:
835:
810:
676:
424:
2271:
2005:
1596:
1540:
856:
825:
795:
641:
296:
261:
1141:
1049:
901:
1350:
1005:
2291:
2203:
2152:
2097:
1965:
1938:
1920:
1885:
1818:
1789:
1591:
1288:"Remarks Prepared for Delivery by Special Agent in Charge Leo Taddeo at Blackshades Press Conference"
915:
671:
591:
520:
506:
493:
479:
451:
447:
440:
167:
1373:"Brisbane teenager built spyware used by domestic violence perpetrators across world, police allege"
2075:
1850:
1808:
1701:
1606:
1601:
387:
to which a user does not have physical access, but that can be accessed or interacted with. Unlike
241:
877:
2259:
2187:
2092:
1631:
704:
388:
253:
245:
421:
Remote desktop products are available in three models: hosted service, software, and appliance.
256:. Remote desktop applications have varying features. Some allow attaching to an existing user's
2307:
2065:
2000:
1950:
1897:
1855:
1803:
1737:
1178:
1146:
1115:
1087:
1054:
955:
937:
666:
538:
373:
303:
237:
156:
17:
1212:
2276:
2216:
1980:
1970:
1865:
1656:
1110:
1082:
927:
554:
465:
392:
283:
Remote desktop sharing is accomplished through a common client/server model. The client, or
233:
2167:
2147:
1870:
1860:
1576:
851:
637:
587:
483:
399:
277:
2337:
2235:
2085:
2035:
2010:
1975:
1955:
1835:
1823:
497:
244:
to be run remotely from one system (usually a PC, but the concept applies equally to a
1484:
2352:
2247:
2208:
2177:
2172:
2025:
2015:
1985:
1716:
502:
383:
Remote desktop software can be used to access a remote computer: a physical personal
257:
1317:
376:": instead of each computer having its own monitor, keyboard, and mouse, or using a
2281:
2137:
1840:
1732:
1676:
1661:
1427:"International crackdown on RAT spyware, which takes total control of victims' PCs"
1377:
661:
544:
358:
greater scalability and flexibility, removing the need for high-end local hardware.
932:
1509:
2221:
2055:
2030:
1995:
1830:
596:
407:
981:"High Performance Cloud Desktops for Creatives, Gamers & Engineers - Vagon"
2286:
2102:
2050:
1933:
1813:
1686:
1641:
1616:
468:-specific protocol featuring audio (play and record), remote printing, remote
377:
249:
941:
2162:
2117:
2112:
1960:
1928:
1681:
1611:
1581:
1183:
1151:
1120:
1059:
686:
567:
510:
221:
414:(VPN) connection with the router over the Internet if not connected to the
1498:
2122:
2080:
1943:
1706:
1696:
1691:
1666:
1636:
1265:
1173:
815:
558:
547:(RFB) – A framebuffer level cross-platform protocol that
528:
384:
229:
2132:
2107:
2070:
1758:
1646:
1621:
1586:
1431:
1260:
902:
Virtual
Network Computing (VNC): Making Remote Desktop Sharing Possible
820:
633:
577:
562:
299:, can be shared between the target computer and remote desktop client.
2045:
1990:
1905:
1742:
1671:
524:
418:, switch on a computer connected to the router, then connect to it.)
755:
to create a secure, encrypted tunnel when accessing remote desktops.
112:. Statements consisting only of original research should be removed.
980:
699:
691:
636:
that controls a system through a remote network connection. While
581:
516:
513:
with open-source derivatives available from other forked projects.
455:
1174:"RAS Registry Modification Allowed Without Administrative Rights"
486:
specifically for high end workstation remoting and collaboration.
1747:
709:
573:
1762:
1513:
1400:
904:. Businessnewsdaily.com (2013-11-07). Retrieved on 2014-02-27.
648:, and will try to hide its operation from the victim and from
469:
415:
139:
77:
36:
1454:"Cybercrime Network focuses on support to victims of malware"
1884:
721:
authentication (MFA), and best practices for secure access.
956:"What is Remote Computer? β Definition from Techopedia"
450:
Protocol (ARD) – Original protocol for
101:
1459:
European Union Agency for
Criminal Justice Cooperation
541:-specific protocol featuring audio and remote printing
340:
2000s-2010s: The Rise of Cloud-based Remote Solutions
30:"Remote desktop" redirects here. For other uses, see
1111:"Understanding the Windows NT Remote Access Service"
351:
remote access from thin clients or personal devices.
2196:
1896:
1796:
1725:
1569:
1548:
1050:"Remote Server Administration Tools for Windows 7"
1401:"Advice for potential victims of IM-RAT malware"
1261:"BlackShades: Arrests in computer malware probe"
916:"Remote Desktop Software as a forensic resource"
1774:
1627:Microsoft System Center Configuration Manager
1525:
8:
71:Learn how and when to remove these messages
1781:
1767:
1759:
1532:
1518:
1510:
2325:Security information and event management
931:
402:remote desktop software can be housed on
208:Learn how and when to remove this message
190:Learn how and when to remove this message
128:Learn how and when to remove this message
1142:"Netsh commands for remote access (ras)"
869:
252:), while being displayed on a separate
1205:"Computer RATS β Protecting Your Self"
27:Desktop run remotely from local device
2302:Host-based intrusion detection system
1561:Comparison of remote desktop software
801:Comparison of remote desktop software
7:
920:Journal of Cyber Security Technology
806:Comparison of screencasting software
2333:Runtime application self-protection
1343:"Malware analysys β Dark Comet RAT"
1235:"Code Access Security and bifrost"
771:Network Level Authentication (NLA)
490:Independent Computing Architecture
25:
2265:Security-focused operating system
1032:"Creepware β Who's Watching You?"
914:Manson, Jonathan (3 April 2022).
736:Multi-Factor Authentication (MFA)
52:This article has multiple issues.
2061:Insecure direct object reference
1497:
1483:
332:Virtual Network Computing (VNC):
170:has been specified. Please help
144:
82:
41:
2315:Information security management
1318:"pest control: taming the rats"
1296:Federal Bureau of Investigation
1083:"Danger: Remote Access Trojans"
773:to prevent unauthorized logins.
652:and other anti-virus software.
60:or discuss these issues on the
32:Remote desktop (disambiguation)
846:Virtual Desktop Infrastructure
780:to detect suspicious activity.
730:Transport Layer Security (TLS)
325:Remote Desktop Protocol (RDP):
18:Remote administration software
1:
1726:Controversial Implementations
1488:The dictionary definition of
933:10.1080/23742917.2022.2049560
728:: Encryption protocols like
545:Remote Frame Buffer Protocol
348:Citrix and VMware Solutions:
2320:Information risk management
2241:Multi-factor authentication
1797:Related security categories
1211:. July 2013. Archived from
476:HP Remote Graphics Software
318:1990s: Pioneering Protocols
108:the claims made and adding
2375:
2297:Intrusion detection system
2255:Computer security software
1911:Advanced persistent threat
1036:Symantec Security Response
762:and regularly update them.
650:computer security software
537:(RDP) – a
492:(ICA) – a
478:(RGS) – a
464:(ALP) – a
410:equipment, to establish a
29:
1882:
1876:Digital rights management
1712:Virtual Network Computing
1405:Australian Federal Police
878:"Remote Desktop Software"
2021:Denial-of-service attack
1916:Arbitrary code execution
841:Virtual Desktop Extender
760:strong password policies
2231:Computer access control
2183:Rogue security software
1846:Electromagnetic warfare
1652:Remote Desktop Services
1556:Remote desktop software
1491:remote desktop software
831:Remote desktop protocol
716:Security Considerations
535:Remote Desktop Protocol
462:Appliance Link Protocol
443:include the following:
412:virtual private network
2277:Obfuscation (software)
2006:Browser Helper Objects
1890:
836:Technical support scam
811:Desktop virtualization
776:Monitor sessions with
363:cloud infrastructure.
236:feature that allows a
2272:Data-centric security
2153:Remote access trojans
1888:
1597:Chrome Remote Desktop
1541:Remote administration
857:Software as a service
826:Remote administration
796:Chrome Remote Desktop
642:remote administration
519: – a
425:Tech support scammers
355:Cloud-based Desktops:
262:remote administration
2204:Application security
2098:Privilege escalation
1966:Cross-site scripting
1819:Cybersex trafficking
1790:Information security
1592:Apple Remote Desktop
1506:at Wikimedia Commons
1010:VMware News Releases
726:Encryption (TLS/SSL)
612:remote access trojan
521:proprietary protocol
507:proprietary protocol
494:proprietary protocol
480:proprietary protocol
452:Apple Remote Desktop
448:Apple Remote Desktop
404:USB hardware devices
398:Since the advent of
172:improve this article
160:to meet Knowledge's
1851:Information warfare
1809:Automotive security
1607:ConnectWise Control
1602:Citrix Virtual Apps
1038:. 10 December 2013.
624:, sometimes called
592:network-transparent
472:, accelerated video
302:Since the onset of
242:desktop environment
2260:Antivirus software
2128:Social engineering
2093:Polymorphic engine
2046:Fraudulent dialers
1951:Hardware backdoors
1891:
1632:NetSupport Manager
1407:. 29 November 2019
604:Malicious variants
517:PC-over-IP (PCoIP)
374:headless computers
310:Historical Context
93:possibly contains
2346:
2345:
2308:Anomaly detection
2213:Secure by default
2066:Keystroke loggers
2001:Drive-by download
1889:vectorial version
1856:Internet security
1804:Computer security
1756:
1755:
1738:Back Orifice 2000
1502:Media related to
1179:Microsoft TechNet
1154:. 21 January 2005
1147:Microsoft TechNet
1116:Microsoft TechNet
1088:Microsoft TechNet
1055:Microsoft TechNet
667:Back Orifice 2000
238:personal computer
218:
217:
210:
200:
199:
192:
162:quality standards
153:This article may
138:
137:
130:
95:original research
75:
16:(Redirected from
2366:
2217:Secure by design
2148:Hardware Trojans
1981:History sniffing
1971:Cross-site leaks
1866:Network security
1783:
1776:
1769:
1760:
1657:Remote Utilities
1534:
1527:
1520:
1511:
1501:
1487:
1471:
1470:
1468:
1466:
1450:
1444:
1443:
1441:
1439:
1423:
1417:
1416:
1414:
1412:
1397:
1391:
1390:
1388:
1386:
1369:
1363:
1362:
1360:
1358:
1353:on 26 April 2014
1349:. Archived from
1341:Aylward, Laura.
1338:
1332:
1331:
1329:
1327:
1322:
1313:
1307:
1306:
1304:
1302:
1284:
1278:
1277:
1275:
1273:
1257:
1251:
1250:
1248:
1246:
1239:CodingHorror.com
1231:
1225:
1224:
1222:
1220:
1215:on 14 March 2016
1201:
1195:
1194:
1192:
1190:
1170:
1164:
1163:
1161:
1159:
1138:
1132:
1131:
1129:
1127:
1107:
1101:
1100:
1098:
1096:
1091:. September 2002
1079:
1073:
1071:
1069:
1067:
1046:
1040:
1039:
1028:
1022:
1021:
1019:
1017:
1002:
996:
995:
993:
991:
977:
971:
970:
968:
966:
952:
946:
945:
935:
911:
905:
899:
893:
892:
890:
888:
874:
765:Limit access by
696:Imminent Monitor
656:Notable examples
630:
629:
622:
621:
614:
613:
466:Sun Microsystems
234:operating system
213:
206:
195:
188:
184:
181:
175:
148:
147:
140:
133:
126:
122:
119:
113:
110:inline citations
86:
85:
78:
67:
45:
44:
37:
21:
2374:
2373:
2369:
2368:
2367:
2365:
2364:
2363:
2349:
2348:
2347:
2342:
2192:
1892:
1880:
1871:Copy protection
1861:Mobile security
1792:
1787:
1757:
1752:
1721:
1577:Absolute Manage
1570:Implementations
1565:
1544:
1538:
1480:
1475:
1474:
1464:
1462:
1452:
1451:
1447:
1437:
1435:
1425:
1424:
1420:
1410:
1408:
1399:
1398:
1394:
1384:
1382:
1371:
1370:
1366:
1356:
1354:
1340:
1339:
1335:
1325:
1323:
1320:
1316:Denbow, Shawn.
1315:
1314:
1310:
1300:
1298:
1286:
1285:
1281:
1271:
1269:
1259:
1258:
1254:
1244:
1242:
1241:. 20 March 2007
1233:
1232:
1228:
1218:
1216:
1203:
1202:
1198:
1188:
1186:
1172:
1171:
1167:
1157:
1155:
1140:
1139:
1135:
1125:
1123:
1109:
1108:
1104:
1094:
1092:
1081:
1080:
1076:
1065:
1063:
1048:
1047:
1043:
1030:
1029:
1025:
1015:
1013:
1004:
1003:
999:
989:
987:
979:
978:
974:
964:
962:
954:
953:
949:
913:
912:
908:
900:
896:
886:
884:
876:
875:
871:
866:
852:Virtual machine
792:
718:
658:
638:desktop sharing
632:) is a type of
627:
626:
619:
618:
611:
610:
606:
588:X Window System
527:(licensed from
484:Hewlett-Packard
439:Remote desktop
437:
400:cloud computing
369:
312:
278:remote computer
270:
214:
203:
202:
201:
196:
185:
179:
176:
165:
149:
145:
134:
123:
117:
114:
99:
87:
83:
46:
42:
35:
28:
23:
22:
15:
12:
11:
5:
2372:
2370:
2362:
2361:
2359:Remote desktop
2351:
2350:
2344:
2343:
2341:
2340:
2338:Site isolation
2335:
2330:
2329:
2328:
2322:
2312:
2311:
2310:
2305:
2294:
2289:
2284:
2279:
2274:
2269:
2268:
2267:
2262:
2252:
2251:
2250:
2245:
2244:
2243:
2236:Authentication
2228:
2227:
2226:
2225:
2224:
2214:
2211:
2200:
2198:
2194:
2193:
2191:
2190:
2185:
2180:
2175:
2170:
2165:
2160:
2155:
2150:
2145:
2140:
2135:
2130:
2125:
2120:
2115:
2110:
2105:
2100:
2095:
2090:
2089:
2088:
2078:
2073:
2068:
2063:
2058:
2053:
2048:
2043:
2038:
2036:Email spoofing
2033:
2028:
2023:
2018:
2013:
2008:
2003:
1998:
1993:
1988:
1983:
1978:
1976:DOM clobbering
1973:
1968:
1963:
1958:
1956:Code injection
1953:
1948:
1947:
1946:
1941:
1936:
1931:
1923:
1918:
1913:
1908:
1902:
1900:
1894:
1893:
1883:
1881:
1879:
1878:
1873:
1868:
1863:
1858:
1853:
1848:
1843:
1838:
1836:Cyberterrorism
1833:
1828:
1827:
1826:
1824:Computer fraud
1821:
1811:
1806:
1800:
1798:
1794:
1793:
1788:
1786:
1785:
1778:
1771:
1763:
1754:
1753:
1751:
1750:
1745:
1740:
1735:
1729:
1727:
1723:
1722:
1720:
1719:
1714:
1709:
1704:
1699:
1694:
1689:
1684:
1679:
1674:
1669:
1664:
1659:
1654:
1649:
1644:
1639:
1634:
1629:
1624:
1619:
1614:
1609:
1604:
1599:
1594:
1589:
1584:
1579:
1573:
1571:
1567:
1566:
1564:
1563:
1558:
1552:
1550:
1546:
1545:
1539:
1537:
1536:
1529:
1522:
1514:
1508:
1507:
1504:Remote desktop
1495:
1479:
1478:External links
1476:
1473:
1472:
1445:
1418:
1392:
1381:. 30 July 2022
1364:
1333:
1308:
1279:
1252:
1226:
1196:
1165:
1133:
1102:
1074:
1041:
1023:
997:
972:
960:Techopedia.com
947:
906:
894:
868:
867:
865:
862:
861:
860:
854:
849:
843:
838:
833:
828:
823:
818:
813:
808:
803:
798:
791:
788:
784:
783:
782:
781:
774:
763:
756:
746:Best Practices
743:
733:
717:
714:
713:
712:
707:
702:
697:
694:
689:
684:
679:
674:
669:
664:
657:
654:
605:
602:
601:
600:
594:
585:
571:
565:
552:
542:
532:
514:
500:
498:Citrix Systems
487:
473:
459:
436:
433:
368:
365:
360:
359:
352:
337:
336:
329:
311:
308:
269:
266:
226:remote desktop
216:
215:
198:
197:
168:cleanup reason
152:
150:
143:
136:
135:
90:
88:
81:
76:
50:
49:
47:
40:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2371:
2360:
2357:
2356:
2354:
2339:
2336:
2334:
2331:
2326:
2323:
2321:
2318:
2317:
2316:
2313:
2309:
2306:
2303:
2300:
2299:
2298:
2295:
2293:
2290:
2288:
2285:
2283:
2280:
2278:
2275:
2273:
2270:
2266:
2263:
2261:
2258:
2257:
2256:
2253:
2249:
2248:Authorization
2246:
2242:
2239:
2238:
2237:
2234:
2233:
2232:
2229:
2223:
2220:
2219:
2218:
2215:
2212:
2210:
2209:Secure coding
2207:
2206:
2205:
2202:
2201:
2199:
2195:
2189:
2186:
2184:
2181:
2179:
2178:SQL injection
2176:
2174:
2171:
2169:
2166:
2164:
2161:
2159:
2158:Vulnerability
2156:
2154:
2151:
2149:
2146:
2144:
2143:Trojan horses
2141:
2139:
2138:Software bugs
2136:
2134:
2131:
2129:
2126:
2124:
2121:
2119:
2116:
2114:
2111:
2109:
2106:
2104:
2101:
2099:
2096:
2094:
2091:
2087:
2084:
2083:
2082:
2079:
2077:
2074:
2072:
2069:
2067:
2064:
2062:
2059:
2057:
2054:
2052:
2049:
2047:
2044:
2042:
2039:
2037:
2034:
2032:
2029:
2027:
2026:Eavesdropping
2024:
2022:
2019:
2017:
2016:Data scraping
2014:
2012:
2009:
2007:
2004:
2002:
1999:
1997:
1994:
1992:
1989:
1987:
1986:Cryptojacking
1984:
1982:
1979:
1977:
1974:
1972:
1969:
1967:
1964:
1962:
1959:
1957:
1954:
1952:
1949:
1945:
1942:
1940:
1937:
1935:
1932:
1930:
1927:
1926:
1924:
1922:
1919:
1917:
1914:
1912:
1909:
1907:
1904:
1903:
1901:
1899:
1895:
1887:
1877:
1874:
1872:
1869:
1867:
1864:
1862:
1859:
1857:
1854:
1852:
1849:
1847:
1844:
1842:
1839:
1837:
1834:
1832:
1829:
1825:
1822:
1820:
1817:
1816:
1815:
1812:
1810:
1807:
1805:
1802:
1801:
1799:
1795:
1791:
1784:
1779:
1777:
1772:
1770:
1765:
1764:
1761:
1749:
1746:
1744:
1741:
1739:
1736:
1734:
1731:
1730:
1728:
1724:
1718:
1717:NX technology
1715:
1713:
1710:
1708:
1705:
1703:
1700:
1698:
1695:
1693:
1690:
1688:
1685:
1683:
1680:
1678:
1675:
1673:
1670:
1668:
1665:
1663:
1660:
1658:
1655:
1653:
1650:
1648:
1645:
1643:
1640:
1638:
1635:
1633:
1630:
1628:
1625:
1623:
1620:
1618:
1615:
1613:
1610:
1608:
1605:
1603:
1600:
1598:
1595:
1593:
1590:
1588:
1585:
1583:
1580:
1578:
1575:
1574:
1572:
1568:
1562:
1559:
1557:
1554:
1553:
1551:
1547:
1542:
1535:
1530:
1528:
1523:
1521:
1516:
1515:
1512:
1505:
1500:
1496:
1494:at Wiktionary
1493:
1492:
1486:
1482:
1481:
1477:
1461:
1460:
1455:
1449:
1446:
1434:
1433:
1428:
1422:
1419:
1406:
1402:
1396:
1393:
1380:
1379:
1374:
1368:
1365:
1352:
1348:
1344:
1337:
1334:
1319:
1312:
1309:
1297:
1293:
1289:
1283:
1280:
1268:
1267:
1262:
1256:
1253:
1240:
1236:
1230:
1227:
1214:
1210:
1206:
1200:
1197:
1185:
1181:
1180:
1175:
1169:
1166:
1153:
1149:
1148:
1143:
1137:
1134:
1122:
1118:
1117:
1112:
1106:
1103:
1090:
1089:
1084:
1078:
1075:
1062:. 4 June 2009
1061:
1057:
1056:
1051:
1045:
1042:
1037:
1033:
1027:
1024:
1011:
1007:
1001:
998:
986:
982:
976:
973:
961:
957:
951:
948:
943:
939:
934:
929:
926:(1β2): 1β26.
925:
921:
917:
910:
907:
903:
898:
895:
883:
879:
873:
870:
863:
858:
855:
853:
850:
847:
844:
842:
839:
837:
834:
832:
829:
827:
824:
822:
819:
817:
814:
812:
809:
807:
804:
802:
799:
797:
794:
793:
789:
787:
779:
775:
772:
768:
764:
761:
757:
754:
750:
749:
747:
744:
741:
737:
734:
731:
727:
724:
723:
722:
715:
711:
708:
706:
703:
701:
698:
695:
693:
690:
688:
685:
683:
680:
678:
675:
673:
670:
668:
665:
663:
660:
659:
655:
653:
651:
647:
643:
639:
635:
631:
623:
615:
603:
598:
595:
593:
589:
586:
583:
579:
575:
572:
569:
566:
564:
560:
556:
553:
550:
546:
543:
540:
536:
533:
530:
526:
522:
518:
515:
512:
508:
504:
503:NX technology
501:
499:
495:
491:
488:
485:
481:
477:
474:
471:
467:
463:
460:
457:
453:
449:
446:
445:
444:
442:
434:
432:
428:
426:
422:
419:
417:
413:
409:
405:
401:
396:
394:
390:
386:
381:
379:
375:
366:
364:
356:
353:
349:
346:
345:
344:
341:
333:
330:
326:
323:
322:
321:
319:
315:
309:
307:
305:
300:
298:
293:
289:
286:
281:
279:
274:
267:
265:
263:
259:
255:
254:client device
251:
247:
243:
239:
235:
231:
227:
223:
212:
209:
194:
191:
183:
173:
169:
163:
159:
158:
151:
142:
141:
132:
129:
121:
111:
107:
103:
97:
96:
91:This article
89:
80:
79:
74:
72:
65:
64:
59:
58:
53:
48:
39:
38:
33:
19:
2282:Data masking
1841:Cyberwarfare
1733:Back Orifice
1677:Secure Shell
1662:RescueAssist
1555:
1490:
1465:23 September
1463:. Retrieved
1457:
1448:
1438:23 September
1436:. Retrieved
1430:
1421:
1411:23 September
1409:. Retrieved
1404:
1395:
1385:23 September
1383:. Retrieved
1378:the Guardian
1376:
1367:
1355:. Retrieved
1351:the original
1346:
1336:
1324:. Retrieved
1311:
1299:. Retrieved
1291:
1282:
1270:. Retrieved
1264:
1255:
1243:. Retrieved
1238:
1229:
1217:. Retrieved
1213:the original
1208:
1199:
1187:. Retrieved
1177:
1168:
1156:. Retrieved
1145:
1136:
1124:. Retrieved
1114:
1105:
1093:. Retrieved
1086:
1077:
1064:. Retrieved
1053:
1044:
1035:
1026:
1014:. Retrieved
1009:
1000:
990:27 September
988:. Retrieved
984:
975:
963:. Retrieved
959:
950:
923:
919:
909:
897:
885:. Retrieved
881:
872:
785:
777:
770:
767:IP addresses
766:
759:
752:
745:
739:
735:
729:
725:
719:
672:Beast Trojan
662:Back Orifice
646:Trojan horse
625:
617:
609:
607:
551:is based on.
509:designed by
496:designed by
482:designed by
438:
429:
423:
420:
397:
395:connection.
382:
370:
361:
354:
347:
339:
338:
331:
324:
317:
316:
313:
301:
294:
290:
282:
275:
271:
228:refers to a
225:
219:
204:
186:
177:
154:
124:
115:
92:
68:
61:
55:
54:Please help
51:
2222:Misuse case
2056:Infostealer
2031:Email fraud
1996:Data breach
1831:Cybergeddon
1209:HowTheyHack
882:ITarian.com
682:Blackshades
597:Wake-on-LAN
408:wake on LAN
224:, the term
174:if you can.
2287:Encryption
2163:Web shells
2103:Ransomware
2051:Hacktivism
1814:Cybercrime
1687:TeamViewer
1642:pcAnywhere
1617:IBM BigFix
1245:5 February
1189:5 February
1158:5 February
1126:5 February
1095:5 February
1066:4 February
864:References
778:audit logs
758:Implement
378:KVM switch
250:smartphone
102:improve it
57:improve it
2118:Shellcode
2113:Scareware
1961:Crimeware
1921:Backdoors
1682:Splashtop
1612:Crossloop
1582:AetherPal
1347:Contextis
1184:Microsoft
1152:Microsoft
1121:Microsoft
1060:Microsoft
942:2374-2917
738:: Adding
710:Sub Seven
705:PoisonIvy
687:DarkComet
628:creepware
568:Splashtop
511:NoMachine
458:machines.
441:protocols
435:Protocols
297:clipboard
222:computing
180:July 2011
118:July 2011
106:verifying
63:talk page
2353:Category
2292:Firewall
2197:Defenses
2123:Spamming
2108:Rootkits
2081:Phishing
2041:Exploits
1707:UltraVNC
1702:Timbuktu
1697:TightVNC
1692:ThinLinc
1667:RustDesk
1637:NinjaOne
1543:software
1266:BBC News
1012:. VMware
985:vagon.io
816:Extranet
790:See also
769:and use
559:Qumranet
529:Teradici
523:used by
385:computer
304:COVID-19
268:Overview
230:software
155:require
2133:Spyware
2076:Payload
2071:Malware
2011:Viruses
1991:Botnets
1898:Threats
1647:RealVNC
1622:LogMeIn
1587:AnyDesk
1549:General
1432:Europol
1357:5 March
1326:5 March
1292:fbi.gov
1219:17 July
965:10 June
821:FreeRDP
677:Bifrost
634:malware
584:servers
578:Windows
563:Red Hat
539:Windows
505:(NX) a
393:network
389:servers
258:session
157:cleanup
100:Please
2327:(SIEM)
2304:(HIDS)
2188:Zombie
1925:Bombs
1906:Adware
1743:NetBus
1672:scrcpy
1301:20 May
1272:20 May
1016:1 June
940:
859:(SaaS)
561:, now
525:VMware
246:server
2173:Worms
2168:Wiper
2086:Voice
1934:Logic
1321:(PDF)
887:1 May
848:(VDI)
700:NjRAT
692:Havex
582:macOS
555:SPICE
456:macOS
248:or a
232:- or
1939:Time
1929:Fork
1748:Sub7
1467:2022
1440:2022
1413:2022
1387:2022
1359:2014
1328:2014
1303:2014
1274:2014
1247:2011
1221:2013
1191:2011
1160:2011
1128:2011
1097:2011
1068:2011
1018:2013
992:2024
967:2020
938:ISSN
889:2019
753:VPNs
751:Use
640:and
580:and
574:Xpra
367:Uses
1944:Zip
928:doi
740:MFA
620:RAT
549:VNC
470:USB
454:on
416:LAN
285:VNC
240:'s
220:In
166:No
104:by
2355::
1456:.
1429:.
1403:.
1375:.
1345:.
1294:.
1290:.
1263:.
1237:.
1207:.
1182:.
1176:.
1150:.
1144:.
1119:.
1113:.
1085:.
1058:.
1052:.
1034:.
1008:.
983:.
958:.
936:.
922:.
918:.
880:.
748::
608:A
264:.
66:.
1782:e
1775:t
1768:v
1533:e
1526:t
1519:v
1469:.
1442:.
1415:.
1389:.
1361:.
1330:.
1305:.
1276:.
1249:.
1223:.
1193:.
1162:.
1130:.
1099:.
1072:,
1070:.
1020:.
994:.
969:.
944:.
930::
924:6
891:.
616:(
531:)
372:"
211:)
205:(
193:)
187:(
182:)
178:(
164:.
131:)
125:(
120:)
116:(
98:.
73:)
69:(
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.