Knowledge

Remote desktop software

Source πŸ“

1485: 1886: 84: 43: 406:, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, and 570: – a high performance remote desktop protocol developed by Splashtop, fully optimized for hardware (H.264) including Intel / AMD chipsets, NVIDIA / ATI GPU & APU, Qualcomm Snapdragon, and NVIDIA Tegra. By optimizing for different profiles of media codecs, Splashtop can deliver high frame rates with low latency, and also low power consumption. 1499: 146: 380:, one computer can have a monitor, keyboard, mouse, and remote control software, and control many headless computers. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there. 280:(server). The remote computer in turn sends the display commands to the local computer. When applications with many graphics including video or 3D models need to be controlled remotely, a remote workstation software that sends the pixels rather than the display commands must be used to provide a smooth, like-local experience. 362:
The transition from early protocols like RDP and VNC to modern cloud-based solutions illustrates the technological evolution that has enabled seamless remote work and access across devices. Today, remote desktop technology continues to evolve, incorporating AI, enhanced security, and integration with
350:
Citrix, with its Independent Computing Architecture (ICA) protocol, and VMware with PC-over-IP (PCoIP), contributed heavily to remote desktop technologies. These solutions allowed organizations to deploy applications and desktops in virtualized environments, centralizing resources while giving users
334:
Developed at the Olivetti Research Laboratory in 1998, VNC introduced a platform-independent way to share a desktop remotely. VNC works at the framebuffer level, transmitting pixels from the host to the client, enabling it to run across multiple operating systems like Linux, macOS, and Windows. The
720:
While remote desktop software offers significant convenience and flexibility, it also poses security risks if not properly configured. To mitigate these risks, several key security measures have become essential for protecting remote desktop connections, including encryption methods, multi-factor
357:
By the 2010s, services like Amazon Workspaces and Microsoft Azure Virtual Desktop brought remote desktops into the cloud era. These solutions allowed users to run powerful desktop environments from the cloud, which could be accessed from any device with an internet connection. This model provided
430:
A more recent innovation in the field is cloud-based remote desktops, which allow users to run high-performance computing environments entirely from the cloud. Services like Vagon, Citrix and Nutanix offer cloud computers tailored for designers, engineers, and gamers. Users can access powerful
327:
Introduced by Microsoft in 1998 as part of Windows NT 4.0 Terminal Server Edition, RDP was designed to allow users to access a remote computer's graphical user interface (GUI) over a network. RDP evolved rapidly, becoming integral to Windows operating systems, with features such as secure data
272:
Remote access can also be explained as the remote control of a computer by using another device connected via the internet or another network. This is widely used by many computer manufacturers and large businesses help desks for technical troubleshooting of their customer's problems.
287:
viewer, is installed on a local computer and then connects via a network to a server component, which is installed on the remote computer. In a typical VNC session, all keystrokes and mouse clicks are registered as if the client were actually performing tasks on the end-user machine.
342:
In the 2000s, with the growth of cloud computing, the concept of remote desktops expanded beyond direct peer-to-peer connections to cloud-based environments. Virtual Desktop Infrastructure (VDI) became a game-changer, allowing users to access virtual machines hosted in data centers.
1031: 291:
Remote desktops also have a major advantage for security development, companies are able to permit software engineers who may be dispersed geographically to operate and develop from a computer which can be held within the companies office or cloud environment.
306:, the shift to remote-work environments has led many to work from home with devices without enterprise IT support. As a result, these workers are reliant on remote desktop software to collaborate and keep their systems available and secure. 328:
transmission, clipboard sharing, and support for multiple monitor configurations. Over time, RDP became a widely adopted protocol for enterprises, allowing for remote access, support, and administration of Windows-based environments.
371:
A main use of remote desktop software is remote administration and remote implementation. This need arises when software buyers are far away from their software vendor. Most remote access software can be used for
335:
open-source nature of VNC led to many derivatives, and it became popular for its simplicity and flexibility across platforms, making it a staple in remote access solutions for non-Windows systems.
320:
Two significant technologies emerged in the 1990s that laid the foundation for modern remote desktop software: Microsoft’s Remote Desktop Protocol (RDP) and Virtual Network Computing (VNC).
1372: 1531: 1287: 1458: 1426: 391:, remote computers are mainly used for peer to peer connections, where one device is unattended. A remote computer connection is generally only possible if both devices have a 732:
protect data during transmission by encrypting the connection between the client and the remote server. This prevents unauthorized interception of sensitive information.
1780: 1626: 1006:"VMware Announces Strategic Licensing and Co-development Agreement with Teradici for True Remote PC User Experience Further Bolstering its vClient Initiative" 742:
provides an extra layer of security by requiring users to verify their identity with something beyond just a password, such as a code sent to a mobile device.
314:
Remote desktop technology has its roots in the 1980s and 1990s, with early development efforts focusing on enabling remote access to systems across networks.
1524: 576: – a protocol originally developed for forwarding X11 application seamlessly with audio, video, remote printing, etc. – extended to support 644:
have many legal uses, "RAT" connotes criminal or malicious activity. A RAT is typically installed without the victim's knowledge, often as payload of a
599: – a standard protocol for remotely waking up computers that are in low-power mode (turned off, but still have access to a power source). 2324: 1342: 295:
The target computer in a remote desktop scenario is still able to access all of its core functions. Many of these core functions, including the main
171: 56: 1517: 1489: 2301: 1560: 800: 805: 260:
and "remote controlling", either displaying the remote control session or blanking the screen. Taking over a desktop remotely is a form of
427:
use remote desktop software to connect to their victim's computer and will often lock out the computer if the victim does not cooperate.
2332: 1204: 431:
hardware remotely, enabling tasks such as 3D rendering, CAD design, or gaming on any device without needing dedicated local hardware.
1773: 489: 2264: 207: 189: 127: 70: 2060: 2314: 1295: 31: 845: 681: 94: 2127: 1766: 403: 1453: 590:(X11) – a well-established cross-platform protocol mainly used for displaying local applications; X11 is 62: 2319: 2240: 2040: 475: 276:
Remote desktop software captures the mouse and keyboard inputs from the local computer (client) and sends them to the
2296: 2254: 1910: 649: 557:(Simple Protocol for Independent Computing Environments) – remote-display system built for virtual environments by 1234: 2157: 1875: 1711: 1503: 548: 284: 161: 2142: 2020: 1915: 840: 645: 109: 2358: 2230: 2182: 1845: 1651: 830: 786:
These steps reduce the risk of unauthorized access and help secure remote desktop environments effectively.
534: 461: 411: 105: 835: 810: 676: 424: 2271: 2005: 1596: 1540: 856: 825: 795: 641: 296: 261: 1141: 1049: 901: 1350: 1005: 2291: 2203: 2152: 2097: 1965: 1938: 1920: 1885: 1818: 1789: 1591: 1288:"Remarks Prepared for Delivery by Special Agent in Charge Leo Taddeo at Blackshades Press Conference" 915: 671: 591: 520: 506: 493: 479: 451: 447: 440: 167: 1373:"Brisbane teenager built spyware used by domestic violence perpetrators across world, police allege" 2075: 1850: 1808: 1701: 1606: 1601: 387:
to which a user does not have physical access, but that can be accessed or interacted with. Unlike
241: 877: 2259: 2187: 2092: 1631: 704: 388: 253: 245: 421:
Remote desktop products are available in three models: hosted service, software, and appliance.
256:. Remote desktop applications have varying features. Some allow attaching to an existing user's 2307: 2065: 2000: 1950: 1897: 1855: 1803: 1737: 1178: 1146: 1115: 1087: 1054: 955: 937: 666: 538: 373: 303: 237: 156: 17: 1212: 2276: 2216: 1980: 1970: 1865: 1656: 1110: 1082: 927: 554: 465: 392: 283:
Remote desktop sharing is accomplished through a common client/server model. The client, or
233: 2167: 2147: 1870: 1860: 1576: 851: 637: 587: 483: 399: 277: 2337: 2235: 2085: 2035: 2010: 1975: 1955: 1835: 1823: 497: 244:
to be run remotely from one system (usually a PC, but the concept applies equally to a
1484: 2352: 2247: 2208: 2177: 2172: 2025: 2015: 1985: 1716: 502: 383:
Remote desktop software can be used to access a remote computer: a physical personal
257: 1317: 376:": instead of each computer having its own monitor, keyboard, and mouse, or using a 2281: 2137: 1840: 1732: 1676: 1661: 1427:"International crackdown on RAT spyware, which takes total control of victims' PCs" 1377: 661: 544: 358:
greater scalability and flexibility, removing the need for high-end local hardware.
932: 1509: 2221: 2055: 2030: 1995: 1830: 596: 407: 981:"High Performance Cloud Desktops for Creatives, Gamers & Engineers - Vagon" 2286: 2102: 2050: 1933: 1813: 1686: 1641: 1616: 468:-specific protocol featuring audio (play and record), remote printing, remote 377: 249: 941: 2162: 2117: 2112: 1960: 1928: 1681: 1611: 1581: 1183: 1151: 1120: 1059: 686: 567: 510: 221: 414:(VPN) connection with the router over the Internet if not connected to the 1498: 2122: 2080: 1943: 1706: 1696: 1691: 1666: 1636: 1265: 1173: 815: 558: 547:(RFB) – A framebuffer level cross-platform protocol that 528: 384: 229: 2132: 2107: 2070: 1758: 1646: 1621: 1586: 1431: 1260: 902:
Virtual Network Computing (VNC): Making Remote Desktop Sharing Possible
820: 633: 577: 562: 299:, can be shared between the target computer and remote desktop client. 2045: 1990: 1905: 1742: 1671: 524: 418:, switch on a computer connected to the router, then connect to it.) 755:
to create a secure, encrypted tunnel when accessing remote desktops.
112:. Statements consisting only of original research should be removed. 980: 699: 691: 636:
that controls a system through a remote network connection. While
581: 516: 513:
with open-source derivatives available from other forked projects.
455: 1174:"RAS Registry Modification Allowed Without Administrative Rights" 486:
specifically for high end workstation remoting and collaboration.
1747: 709: 573: 1762: 1513: 1400: 904:. Businessnewsdaily.com (2013-11-07). Retrieved on 2014-02-27. 648:, and will try to hide its operation from the victim and from 469: 415: 139: 77: 36: 1454:"Cybercrime Network focuses on support to victims of malware" 1884: 721:
authentication (MFA), and best practices for secure access.
956:"What is Remote Computer? – Definition from Techopedia" 450:
Protocol (ARD) – Original protocol for
101: 1459:
European Union Agency for Criminal Justice Cooperation
541:-specific protocol featuring audio and remote printing 340:
2000s-2010s: The Rise of Cloud-based Remote Solutions
30:"Remote desktop" redirects here. For other uses, see 1111:"Understanding the Windows NT Remote Access Service" 351:
remote access from thin clients or personal devices.
2196: 1896: 1796: 1725: 1569: 1548: 1050:"Remote Server Administration Tools for Windows 7" 1401:"Advice for potential victims of IM-RAT malware" 1261:"BlackShades: Arrests in computer malware probe" 916:"Remote Desktop Software as a forensic resource" 1774: 1627:Microsoft System Center Configuration Manager 1525: 8: 71:Learn how and when to remove these messages 1781: 1767: 1759: 1532: 1518: 1510: 2325:Security information and event management 931: 402:remote desktop software can be housed on 208:Learn how and when to remove this message 190:Learn how and when to remove this message 128:Learn how and when to remove this message 1142:"Netsh commands for remote access (ras)" 869: 252:), while being displayed on a separate 1205:"Computer RATS – Protecting Your Self" 27:Desktop run remotely from local device 2302:Host-based intrusion detection system 1561:Comparison of remote desktop software 801:Comparison of remote desktop software 7: 920:Journal of Cyber Security Technology 806:Comparison of screencasting software 2333:Runtime application self-protection 1343:"Malware analysys – Dark Comet RAT" 1235:"Code Access Security and bifrost" 771:Network Level Authentication (NLA) 490:Independent Computing Architecture 25: 2265:Security-focused operating system 1032:"Creepware β€” Who's Watching You?" 914:Manson, Jonathan (3 April 2022). 736:Multi-Factor Authentication (MFA) 52:This article has multiple issues. 2061:Insecure direct object reference 1497: 1483: 332:Virtual Network Computing (VNC): 170:has been specified. Please help 144: 82: 41: 2315:Information security management 1318:"pest control: taming the rats" 1296:Federal Bureau of Investigation 1083:"Danger: Remote Access Trojans" 773:to prevent unauthorized logins. 652:and other anti-virus software. 60:or discuss these issues on the 32:Remote desktop (disambiguation) 846:Virtual Desktop Infrastructure 780:to detect suspicious activity. 730:Transport Layer Security (TLS) 325:Remote Desktop Protocol (RDP): 18:Remote administration software 1: 1726:Controversial Implementations 1488:The dictionary definition of 933:10.1080/23742917.2022.2049560 728:: Encryption protocols like 545:Remote Frame Buffer Protocol 348:Citrix and VMware Solutions: 2320:Information risk management 2241:Multi-factor authentication 1797:Related security categories 1211:. July 2013. Archived from 476:HP Remote Graphics Software 318:1990s: Pioneering Protocols 108:the claims made and adding 2375: 2297:Intrusion detection system 2255:Computer security software 1911:Advanced persistent threat 1036:Symantec Security Response 762:and regularly update them. 650:computer security software 537:(RDP) – a 492:(ICA) – a 478:(RGS) – a 464:(ALP) – a 410:equipment, to establish a 29: 1882: 1876:Digital rights management 1712:Virtual Network Computing 1405:Australian Federal Police 878:"Remote Desktop Software" 2021:Denial-of-service attack 1916:Arbitrary code execution 841:Virtual Desktop Extender 760:strong password policies 2231:Computer access control 2183:Rogue security software 1846:Electromagnetic warfare 1652:Remote Desktop Services 1556:Remote desktop software 1491:remote desktop software 831:Remote desktop protocol 716:Security Considerations 535:Remote Desktop Protocol 462:Appliance Link Protocol 443:include the following: 412:virtual private network 2277:Obfuscation (software) 2006:Browser Helper Objects 1890: 836:Technical support scam 811:Desktop virtualization 776:Monitor sessions with 363:cloud infrastructure. 236:feature that allows a 2272:Data-centric security 2153:Remote access trojans 1888: 1597:Chrome Remote Desktop 1541:Remote administration 857:Software as a service 826:Remote administration 796:Chrome Remote Desktop 642:remote administration 519: – a 425:Tech support scammers 355:Cloud-based Desktops: 262:remote administration 2204:Application security 2098:Privilege escalation 1966:Cross-site scripting 1819:Cybersex trafficking 1790:Information security 1592:Apple Remote Desktop 1506:at Wikimedia Commons 1010:VMware News Releases 726:Encryption (TLS/SSL) 612:remote access trojan 521:proprietary protocol 507:proprietary protocol 494:proprietary protocol 480:proprietary protocol 452:Apple Remote Desktop 448:Apple Remote Desktop 404:USB hardware devices 398:Since the advent of 172:improve this article 160:to meet Knowledge's 1851:Information warfare 1809:Automotive security 1607:ConnectWise Control 1602:Citrix Virtual Apps 1038:. 10 December 2013. 624:, sometimes called 592:network-transparent 472:, accelerated video 302:Since the onset of 242:desktop environment 2260:Antivirus software 2128:Social engineering 2093:Polymorphic engine 2046:Fraudulent dialers 1951:Hardware backdoors 1891: 1632:NetSupport Manager 1407:. 29 November 2019 604:Malicious variants 517:PC-over-IP (PCoIP) 374:headless computers 310:Historical Context 93:possibly contains 2346: 2345: 2308:Anomaly detection 2213:Secure by default 2066:Keystroke loggers 2001:Drive-by download 1889:vectorial version 1856:Internet security 1804:Computer security 1756: 1755: 1738:Back Orifice 2000 1502:Media related to 1179:Microsoft TechNet 1154:. 21 January 2005 1147:Microsoft TechNet 1116:Microsoft TechNet 1088:Microsoft TechNet 1055:Microsoft TechNet 667:Back Orifice 2000 238:personal computer 218: 217: 210: 200: 199: 192: 162:quality standards 153:This article may 138: 137: 130: 95:original research 75: 16:(Redirected from 2366: 2217:Secure by design 2148:Hardware Trojans 1981:History sniffing 1971:Cross-site leaks 1866:Network security 1783: 1776: 1769: 1760: 1657:Remote Utilities 1534: 1527: 1520: 1511: 1501: 1487: 1471: 1470: 1468: 1466: 1450: 1444: 1443: 1441: 1439: 1423: 1417: 1416: 1414: 1412: 1397: 1391: 1390: 1388: 1386: 1369: 1363: 1362: 1360: 1358: 1353:on 26 April 2014 1349:. Archived from 1341:Aylward, Laura. 1338: 1332: 1331: 1329: 1327: 1322: 1313: 1307: 1306: 1304: 1302: 1284: 1278: 1277: 1275: 1273: 1257: 1251: 1250: 1248: 1246: 1239:CodingHorror.com 1231: 1225: 1224: 1222: 1220: 1215:on 14 March 2016 1201: 1195: 1194: 1192: 1190: 1170: 1164: 1163: 1161: 1159: 1138: 1132: 1131: 1129: 1127: 1107: 1101: 1100: 1098: 1096: 1091:. September 2002 1079: 1073: 1071: 1069: 1067: 1046: 1040: 1039: 1028: 1022: 1021: 1019: 1017: 1002: 996: 995: 993: 991: 977: 971: 970: 968: 966: 952: 946: 945: 935: 911: 905: 899: 893: 892: 890: 888: 874: 765:Limit access by 696:Imminent Monitor 656:Notable examples 630: 629: 622: 621: 614: 613: 466:Sun Microsystems 234:operating system 213: 206: 195: 188: 184: 181: 175: 148: 147: 140: 133: 126: 122: 119: 113: 110:inline citations 86: 85: 78: 67: 45: 44: 37: 21: 2374: 2373: 2369: 2368: 2367: 2365: 2364: 2363: 2349: 2348: 2347: 2342: 2192: 1892: 1880: 1871:Copy protection 1861:Mobile security 1792: 1787: 1757: 1752: 1721: 1577:Absolute Manage 1570:Implementations 1565: 1544: 1538: 1480: 1475: 1474: 1464: 1462: 1452: 1451: 1447: 1437: 1435: 1425: 1424: 1420: 1410: 1408: 1399: 1398: 1394: 1384: 1382: 1371: 1370: 1366: 1356: 1354: 1340: 1339: 1335: 1325: 1323: 1320: 1316:Denbow, Shawn. 1315: 1314: 1310: 1300: 1298: 1286: 1285: 1281: 1271: 1269: 1259: 1258: 1254: 1244: 1242: 1241:. 20 March 2007 1233: 1232: 1228: 1218: 1216: 1203: 1202: 1198: 1188: 1186: 1172: 1171: 1167: 1157: 1155: 1140: 1139: 1135: 1125: 1123: 1109: 1108: 1104: 1094: 1092: 1081: 1080: 1076: 1065: 1063: 1048: 1047: 1043: 1030: 1029: 1025: 1015: 1013: 1004: 1003: 999: 989: 987: 979: 978: 974: 964: 962: 954: 953: 949: 913: 912: 908: 900: 896: 886: 884: 876: 875: 871: 866: 852:Virtual machine 792: 718: 658: 638:desktop sharing 632:) is a type of 627: 626: 619: 618: 611: 610: 606: 588:X Window System 527:(licensed from 484:Hewlett-Packard 439:Remote desktop 437: 400:cloud computing 369: 312: 278:remote computer 270: 214: 203: 202: 201: 196: 185: 179: 176: 165: 149: 145: 134: 123: 117: 114: 99: 87: 83: 46: 42: 35: 28: 23: 22: 15: 12: 11: 5: 2372: 2370: 2362: 2361: 2359:Remote desktop 2351: 2350: 2344: 2343: 2341: 2340: 2338:Site isolation 2335: 2330: 2329: 2328: 2322: 2312: 2311: 2310: 2305: 2294: 2289: 2284: 2279: 2274: 2269: 2268: 2267: 2262: 2252: 2251: 2250: 2245: 2244: 2243: 2236:Authentication 2228: 2227: 2226: 2225: 2224: 2214: 2211: 2200: 2198: 2194: 2193: 2191: 2190: 2185: 2180: 2175: 2170: 2165: 2160: 2155: 2150: 2145: 2140: 2135: 2130: 2125: 2120: 2115: 2110: 2105: 2100: 2095: 2090: 2089: 2088: 2078: 2073: 2068: 2063: 2058: 2053: 2048: 2043: 2038: 2036:Email spoofing 2033: 2028: 2023: 2018: 2013: 2008: 2003: 1998: 1993: 1988: 1983: 1978: 1976:DOM clobbering 1973: 1968: 1963: 1958: 1956:Code injection 1953: 1948: 1947: 1946: 1941: 1936: 1931: 1923: 1918: 1913: 1908: 1902: 1900: 1894: 1893: 1883: 1881: 1879: 1878: 1873: 1868: 1863: 1858: 1853: 1848: 1843: 1838: 1836:Cyberterrorism 1833: 1828: 1827: 1826: 1824:Computer fraud 1821: 1811: 1806: 1800: 1798: 1794: 1793: 1788: 1786: 1785: 1778: 1771: 1763: 1754: 1753: 1751: 1750: 1745: 1740: 1735: 1729: 1727: 1723: 1722: 1720: 1719: 1714: 1709: 1704: 1699: 1694: 1689: 1684: 1679: 1674: 1669: 1664: 1659: 1654: 1649: 1644: 1639: 1634: 1629: 1624: 1619: 1614: 1609: 1604: 1599: 1594: 1589: 1584: 1579: 1573: 1571: 1567: 1566: 1564: 1563: 1558: 1552: 1550: 1546: 1545: 1539: 1537: 1536: 1529: 1522: 1514: 1508: 1507: 1504:Remote desktop 1495: 1479: 1478:External links 1476: 1473: 1472: 1445: 1418: 1392: 1381:. 30 July 2022 1364: 1333: 1308: 1279: 1252: 1226: 1196: 1165: 1133: 1102: 1074: 1041: 1023: 997: 972: 960:Techopedia.com 947: 906: 894: 868: 867: 865: 862: 861: 860: 854: 849: 843: 838: 833: 828: 823: 818: 813: 808: 803: 798: 791: 788: 784: 783: 782: 781: 774: 763: 756: 746:Best Practices 743: 733: 717: 714: 713: 712: 707: 702: 697: 694: 689: 684: 679: 674: 669: 664: 657: 654: 605: 602: 601: 600: 594: 585: 571: 565: 552: 542: 532: 514: 500: 498:Citrix Systems 487: 473: 459: 436: 433: 368: 365: 360: 359: 352: 337: 336: 329: 311: 308: 269: 266: 226:remote desktop 216: 215: 198: 197: 168:cleanup reason 152: 150: 143: 136: 135: 90: 88: 81: 76: 50: 49: 47: 40: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2371: 2360: 2357: 2356: 2354: 2339: 2336: 2334: 2331: 2326: 2323: 2321: 2318: 2317: 2316: 2313: 2309: 2306: 2303: 2300: 2299: 2298: 2295: 2293: 2290: 2288: 2285: 2283: 2280: 2278: 2275: 2273: 2270: 2266: 2263: 2261: 2258: 2257: 2256: 2253: 2249: 2248:Authorization 2246: 2242: 2239: 2238: 2237: 2234: 2233: 2232: 2229: 2223: 2220: 2219: 2218: 2215: 2212: 2210: 2209:Secure coding 2207: 2206: 2205: 2202: 2201: 2199: 2195: 2189: 2186: 2184: 2181: 2179: 2178:SQL injection 2176: 2174: 2171: 2169: 2166: 2164: 2161: 2159: 2158:Vulnerability 2156: 2154: 2151: 2149: 2146: 2144: 2143:Trojan horses 2141: 2139: 2138:Software bugs 2136: 2134: 2131: 2129: 2126: 2124: 2121: 2119: 2116: 2114: 2111: 2109: 2106: 2104: 2101: 2099: 2096: 2094: 2091: 2087: 2084: 2083: 2082: 2079: 2077: 2074: 2072: 2069: 2067: 2064: 2062: 2059: 2057: 2054: 2052: 2049: 2047: 2044: 2042: 2039: 2037: 2034: 2032: 2029: 2027: 2026:Eavesdropping 2024: 2022: 2019: 2017: 2016:Data scraping 2014: 2012: 2009: 2007: 2004: 2002: 1999: 1997: 1994: 1992: 1989: 1987: 1986:Cryptojacking 1984: 1982: 1979: 1977: 1974: 1972: 1969: 1967: 1964: 1962: 1959: 1957: 1954: 1952: 1949: 1945: 1942: 1940: 1937: 1935: 1932: 1930: 1927: 1926: 1924: 1922: 1919: 1917: 1914: 1912: 1909: 1907: 1904: 1903: 1901: 1899: 1895: 1887: 1877: 1874: 1872: 1869: 1867: 1864: 1862: 1859: 1857: 1854: 1852: 1849: 1847: 1844: 1842: 1839: 1837: 1834: 1832: 1829: 1825: 1822: 1820: 1817: 1816: 1815: 1812: 1810: 1807: 1805: 1802: 1801: 1799: 1795: 1791: 1784: 1779: 1777: 1772: 1770: 1765: 1764: 1761: 1749: 1746: 1744: 1741: 1739: 1736: 1734: 1731: 1730: 1728: 1724: 1718: 1717:NX technology 1715: 1713: 1710: 1708: 1705: 1703: 1700: 1698: 1695: 1693: 1690: 1688: 1685: 1683: 1680: 1678: 1675: 1673: 1670: 1668: 1665: 1663: 1660: 1658: 1655: 1653: 1650: 1648: 1645: 1643: 1640: 1638: 1635: 1633: 1630: 1628: 1625: 1623: 1620: 1618: 1615: 1613: 1610: 1608: 1605: 1603: 1600: 1598: 1595: 1593: 1590: 1588: 1585: 1583: 1580: 1578: 1575: 1574: 1572: 1568: 1562: 1559: 1557: 1554: 1553: 1551: 1547: 1542: 1535: 1530: 1528: 1523: 1521: 1516: 1515: 1512: 1505: 1500: 1496: 1494:at Wiktionary 1493: 1492: 1486: 1482: 1481: 1477: 1461: 1460: 1455: 1449: 1446: 1434: 1433: 1428: 1422: 1419: 1406: 1402: 1396: 1393: 1380: 1379: 1374: 1368: 1365: 1352: 1348: 1344: 1337: 1334: 1319: 1312: 1309: 1297: 1293: 1289: 1283: 1280: 1268: 1267: 1262: 1256: 1253: 1240: 1236: 1230: 1227: 1214: 1210: 1206: 1200: 1197: 1185: 1181: 1180: 1175: 1169: 1166: 1153: 1149: 1148: 1143: 1137: 1134: 1122: 1118: 1117: 1112: 1106: 1103: 1090: 1089: 1084: 1078: 1075: 1062:. 4 June 2009 1061: 1057: 1056: 1051: 1045: 1042: 1037: 1033: 1027: 1024: 1011: 1007: 1001: 998: 986: 982: 976: 973: 961: 957: 951: 948: 943: 939: 934: 929: 926:(1–2): 1–26. 925: 921: 917: 910: 907: 903: 898: 895: 883: 879: 873: 870: 863: 858: 855: 853: 850: 847: 844: 842: 839: 837: 834: 832: 829: 827: 824: 822: 819: 817: 814: 812: 809: 807: 804: 802: 799: 797: 794: 793: 789: 787: 779: 775: 772: 768: 764: 761: 757: 754: 750: 749: 747: 744: 741: 737: 734: 731: 727: 724: 723: 722: 715: 711: 708: 706: 703: 701: 698: 695: 693: 690: 688: 685: 683: 680: 678: 675: 673: 670: 668: 665: 663: 660: 659: 655: 653: 651: 647: 643: 639: 635: 631: 623: 615: 603: 598: 595: 593: 589: 586: 583: 579: 575: 572: 569: 566: 564: 560: 556: 553: 550: 546: 543: 540: 536: 533: 530: 526: 522: 518: 515: 512: 508: 504: 503:NX technology 501: 499: 495: 491: 488: 485: 481: 477: 474: 471: 467: 463: 460: 457: 453: 449: 446: 445: 444: 442: 434: 432: 428: 426: 422: 419: 417: 413: 409: 405: 401: 396: 394: 390: 386: 381: 379: 375: 366: 364: 356: 353: 349: 346: 345: 344: 341: 333: 330: 326: 323: 322: 321: 319: 315: 309: 307: 305: 300: 298: 293: 289: 286: 281: 279: 274: 267: 265: 263: 259: 255: 254:client device 251: 247: 243: 239: 235: 231: 227: 223: 212: 209: 194: 191: 183: 173: 169: 163: 159: 158: 151: 142: 141: 132: 129: 121: 111: 107: 103: 97: 96: 91:This article 89: 80: 79: 74: 72: 65: 64: 59: 58: 53: 48: 39: 38: 33: 19: 2282:Data masking 1841:Cyberwarfare 1733:Back Orifice 1677:Secure Shell 1662:RescueAssist 1555: 1490: 1465:23 September 1463:. Retrieved 1457: 1448: 1438:23 September 1436:. Retrieved 1430: 1421: 1411:23 September 1409:. Retrieved 1404: 1395: 1385:23 September 1383:. Retrieved 1378:the Guardian 1376: 1367: 1355:. Retrieved 1351:the original 1346: 1336: 1324:. Retrieved 1311: 1299:. Retrieved 1291: 1282: 1270:. Retrieved 1264: 1255: 1243:. Retrieved 1238: 1229: 1217:. Retrieved 1213:the original 1208: 1199: 1187:. Retrieved 1177: 1168: 1156:. Retrieved 1145: 1136: 1124:. Retrieved 1114: 1105: 1093:. Retrieved 1086: 1077: 1064:. Retrieved 1053: 1044: 1035: 1026: 1014:. Retrieved 1009: 1000: 990:27 September 988:. Retrieved 984: 975: 963:. Retrieved 959: 950: 923: 919: 909: 897: 885:. Retrieved 881: 872: 785: 777: 770: 767:IP addresses 766: 759: 752: 745: 739: 735: 729: 725: 719: 672:Beast Trojan 662:Back Orifice 646:Trojan horse 625: 617: 609: 607: 551:is based on. 509:designed by 496:designed by 482:designed by 438: 429: 423: 420: 397: 395:connection. 382: 370: 361: 354: 347: 339: 338: 331: 324: 317: 316: 313: 301: 294: 290: 282: 275: 271: 228:refers to a 225: 219: 204: 186: 177: 154: 124: 115: 92: 68: 61: 55: 54:Please help 51: 2222:Misuse case 2056:Infostealer 2031:Email fraud 1996:Data breach 1831:Cybergeddon 1209:HowTheyHack 882:ITarian.com 682:Blackshades 597:Wake-on-LAN 408:wake on LAN 224:, the term 174:if you can. 2287:Encryption 2163:Web shells 2103:Ransomware 2051:Hacktivism 1814:Cybercrime 1687:TeamViewer 1642:pcAnywhere 1617:IBM BigFix 1245:5 February 1189:5 February 1158:5 February 1126:5 February 1095:5 February 1066:4 February 864:References 778:audit logs 758:Implement 378:KVM switch 250:smartphone 102:improve it 57:improve it 2118:Shellcode 2113:Scareware 1961:Crimeware 1921:Backdoors 1682:Splashtop 1612:Crossloop 1582:AetherPal 1347:Contextis 1184:Microsoft 1152:Microsoft 1121:Microsoft 1060:Microsoft 942:2374-2917 738:: Adding 710:Sub Seven 705:PoisonIvy 687:DarkComet 628:creepware 568:Splashtop 511:NoMachine 458:machines. 441:protocols 435:Protocols 297:clipboard 222:computing 180:July 2011 118:July 2011 106:verifying 63:talk page 2353:Category 2292:Firewall 2197:Defenses 2123:Spamming 2108:Rootkits 2081:Phishing 2041:Exploits 1707:UltraVNC 1702:Timbuktu 1697:TightVNC 1692:ThinLinc 1667:RustDesk 1637:NinjaOne 1543:software 1266:BBC News 1012:. VMware 985:vagon.io 816:Extranet 790:See also 769:and use 559:Qumranet 529:Teradici 523:used by 385:computer 304:COVID-19 268:Overview 230:software 155:require 2133:Spyware 2076:Payload 2071:Malware 2011:Viruses 1991:Botnets 1898:Threats 1647:RealVNC 1622:LogMeIn 1587:AnyDesk 1549:General 1432:Europol 1357:5 March 1326:5 March 1292:fbi.gov 1219:17 July 965:10 June 821:FreeRDP 677:Bifrost 634:malware 584:servers 578:Windows 563:Red Hat 539:Windows 505:(NX) a 393:network 389:servers 258:session 157:cleanup 100:Please 2327:(SIEM) 2304:(HIDS) 2188:Zombie 1925:Bombs 1906:Adware 1743:NetBus 1672:scrcpy 1301:20 May 1272:20 May 1016:1 June 940:  859:(SaaS) 561:, now 525:VMware 246:server 2173:Worms 2168:Wiper 2086:Voice 1934:Logic 1321:(PDF) 887:1 May 848:(VDI) 700:NjRAT 692:Havex 582:macOS 555:SPICE 456:macOS 248:or a 232:- or 1939:Time 1929:Fork 1748:Sub7 1467:2022 1440:2022 1413:2022 1387:2022 1359:2014 1328:2014 1303:2014 1274:2014 1247:2011 1221:2013 1191:2011 1160:2011 1128:2011 1097:2011 1068:2011 1018:2013 992:2024 967:2020 938:ISSN 889:2019 753:VPNs 751:Use 640:and 580:and 574:Xpra 367:Uses 1944:Zip 928:doi 740:MFA 620:RAT 549:VNC 470:USB 454:on 416:LAN 285:VNC 240:'s 220:In 166:No 104:by 2355:: 1456:. 1429:. 1403:. 1375:. 1345:. 1294:. 1290:. 1263:. 1237:. 1207:. 1182:. 1176:. 1150:. 1144:. 1119:. 1113:. 1085:. 1058:. 1052:. 1034:. 1008:. 983:. 958:. 936:. 922:. 918:. 880:. 748:: 608:A 264:. 66:. 1782:e 1775:t 1768:v 1533:e 1526:t 1519:v 1469:. 1442:. 1415:. 1389:. 1361:. 1330:. 1305:. 1276:. 1249:. 1223:. 1193:. 1162:. 1130:. 1099:. 1072:, 1070:. 1020:. 994:. 969:. 944:. 930:: 924:6 891:. 616:( 531:) 372:" 211:) 205:( 193:) 187:( 182:) 178:( 164:. 131:) 125:( 120:) 116:( 98:. 73:) 69:( 34:. 20:)

Index

Remote administration software
Remote desktop (disambiguation)
improve it
talk page
Learn how and when to remove these messages
original research
improve it
verifying
inline citations
Learn how and when to remove this message
cleanup
quality standards
cleanup reason
improve this article
Learn how and when to remove this message
Learn how and when to remove this message
computing
software
operating system
personal computer
desktop environment
server
smartphone
client device
session
remote administration
remote computer
VNC
clipboard
COVID-19

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑