How to control someone else s computer desktop through your own computer on the classroom computer

Updated on number 2024-04-09
14 answers
  1. Anonymous users2024-02-07

    Since it's in the classroom, it's the same LAN, just use it for experiments, don't do bad things. First of all, you need to know the IP address of the computer you want to control, and have the username and password, which can be scanned, such as scan or Binghe, and then use the command to use net use ip ipc$" " /user:" "Establish an IPC null link.

    net use \\ip\ipc$ "1" /user:"administrator"Establish an IPC non-null link.

    net use h: ip c$ after logging in, map the other party c: to the local h:

    net use ip ipc$ del delete ipc link net use h: del delete the h: map to the other party so that you can see the contents of the other party's disk!

  2. Anonymous users2024-02-06

    The teacher controls the student's computer desktop through a control program.

    If you want to be uncontrolled, go into safe mode, then open Task Manager, find the name of the monitor, and click to end the process.

    The monitor should be visible in the Start menu.

  3. Anonymous users2024-02-05

    Open the webpage and enter IP C$ (IP is the IP of someone else's computer, C in C$ refers to C disk, if you want to enter D disk, you can play D$).

    Prerequisites: All of them are on the same local area network, and your computer's username and password are the same.

  4. Anonymous users2024-02-04

    The remote desktop function must be enabled on the controlled side. Add a remote connection user.

    Two. The control terminal can be connected with a remote desktop and controlled by an IP address.

    Controlled settings.

    1 The remote desktop function should be enabled on the controlled side.

    First, right-click on my computer. Select Properties.

    2 Click: Remote bar first, and then under Remote Desktop, tick: Allow users to connect to this computer remotely.

    3 Normally, the above two steps are sufficient, but it is also important to note that the user account remotely connected to this computer must contain a password, which means that the user who has the password can connect.

    And one more: select the remote user and go in and have a look.

    4 super administrators, already have the right to connect remotely, in fact, because the super administrator has the highest permissions, and many people's super administrator accounts are empty passwords, the system requires password verification for security, so you have to remember.

    If you don't want to connect with a super admin account, see how to add a remote connection user.

    3. Add a remote connection user.

    1Based on security and permissions, some people don't want to use the super administrator account to remotely connect to the server, so they have to add users. Of course, if you still find it convenient for the super administrator, you can set a password for the super administrator.

    1.First, right-click on my computer. Select: Manage.

    2 Find "Users" in Computer Management.

    3. Then add the new old Qiliang household.

    4. Set the username and password, cancel the first tick first, and then tick the second and third ticks.

    5 After pressing OK, you will see that the new user has been established successfully.

    6After creating a user, you also need to go to the remote desktop settings and add a user for the remote desktop.

    Click Add.

  5. Anonymous users2024-02-03

    To control all the computers in the computer classroom, you can use the remote desktop software. This software allows you to remotely access the desktop and applications of Naysa from one computer and perform actions on that computer. With remote desktop software, teachers or administrators can send commands, start or stop processes, install software, and more to all the electronic devices in the entire classroom.

    Commonly used remote desktop software includes Microsoft Remote Desktop, TeamViewer, and VNC.

  6. Anonymous users2024-02-02

    When I was in computer class, I was controlled by the teacher but couldn't operate the computer independently. In fact, there are still ways to get out of the teacher's control. But then again, in class, you still have to learn knowledge well, rather than thinking about how to get out of the teacher's control.

    Method steps.

    Unplug the network cable. When you unplug the network cable, you are disconnected from the network, and no matter what the situation is, no one can reach you.

    Please click Enter a description.

    Task Manager.

    The teacher is able to control the computer because of a client-like program installed in your computer. If you have a keen eye, it's easy to spot this process right in your task manager. The next step is to finish the process.

    Please click Enter a description.

    Disconnected. The method of disconnecting the network is actually very simple, and it does not need to be as complicated as the network cable. Open the local link for your online neighbors. Once you've found a local link and deactivated it, you're disconnected.

    Please click Enter a description.

    Go to System Configuration.

    Enter msconfig in Start Operation, go to the real-time configurator of the system call, and select the service option. Then disable all services. Then enter the exit state without restarting. The teacher won't be able to control your machine anyway.

    Please click Enter a description.

    Client-side control.

    If the teacher is using a client to control your machine, then it must have a piece of software. This software definitely has a machine that will free you from the teacher's control with one click. You can usually show your hospitality to the teacher, and there will be no secrets.

    Please click Enter a description.

    Be a computer class representative.

    In computer class, the teacher will tell you some techniques related to client control, so you can get out of the teacher's control.

    Please click Enter a description.

  7. Anonymous users2024-02-01

    How to get it, it's very simple to click start - run - type "cmd" (everyone will get this, don't explain it) and then, a black box will pop up, this black box is a control platform for the DOS system, very useful. That's it, and then everyone enters "tasklist" in it, enter, and then a column will pop up, just like this A lot of programs are running on the current computer, and now we just need to find out this disgusting program in the electronic classroom and then ko'll get rid of it, our Fuyang Middle School uses the Polar Electronic Classroom online version The program on the student's machine is called "case indistinguishable"), not on the Internet"Oh. At this time, it is necessary to write down these numbers of the PID (usually four digits) corresponding to the program.

    Found the program,Now just kill it.,Many people will use the "taskkill" command, but it's invalid for this kind of program.,Program protection.,Then this can't be used.,Let's change it.,Use the "ntsd" command. This command is gray and powerful,How to use it to see,Enter "ntsd -p pid (pid is the pid of that program)" in the black box,Then a box will pop up,After a large row of garbled characters,Turn off this box,Then move the mouse to the icon of the electronic classroom in the lower right corner,If it's gone,Then you've succeeded。 If there is only one small line in the pop-up box, then eighty percent of it has failed, but most of it will still succeed.

  8. Anonymous users2024-01-31

    Here's how:

    The first method is to directly unplug the network cable plugged into the main chassis. When the computer shows that the network cable is not plugged in, it means that it is no longer connected to the teacher's machine.

    The second method: you can press Ctrl+Alt+Del to open the task manager, find the process of the student side of the electronic classroom in it, and it's over.

    Third method: If the second method does not work, it is likely that the client of the teacher is encrypted and cannot illegally close the process. We can find the folder location where the local client is located, and use the powerful delete function of 360 Security Guard to shred the client files that control the computer.

  9. Anonymous users2024-01-30

    I guess your student is a master, and he directly removed his computer from your monitoring, if that's the case, you better leave him alone. Because he will even monitor your computer in anti-surveillance. Or your computer was directly given a stallion by a master.。。

  10. Anonymous users2024-01-29

    I didn't give points, why did I tell you? You want to do bad things, don't you?

  11. Anonymous users2024-01-28

    Just turn on the secure network mode! When you turn it on. Just keep pressing F11. He'll pop up a selection and you just have to press the up, down, and enter keys! (Be careful that your computer is seen by the teacher).

  12. Anonymous users2024-01-27

    There are ways to get out of control in computer classes.

    Questions. The teacher used Red Spider software.

    1. Right-click the taskbar at the bottom to open the Task Manager. Shortcut: Ctrl+Shift+Select "Process" from the options above.

    3.Find "Processes" below. 4.

    Click on the bottom right corner to end the process, and you can get rid of the teacher's control.

    Questions. There is no such process.

    Then you can restart the computer and log out.

  13. Anonymous users2024-01-26

    If the teacher controls your computer through software, then you unplug the network cable of the computer, the teacher can't control it, if it is controlled by hardware, then listen to the teacher's lecture with peace of mind.

  14. Anonymous users2024-01-25

    Just sit in the teacher's seat.

Related questions
5 answers2024-04-09

There may be something wrong with your mic, so let's reset it and see.

1 answers2024-04-09

1.You can start by saying that our school has a computer lab and he left me with many memories. >>>More

4 answers2024-04-09

For people who don't know much about computers, don't choose to match your own machine, choosing a brand machine is the best choice. And in order to prevent going to the computer city to be deceived by JS, you can inquire and choose the machine on the **, have an understanding of the model you want to buy, don't be fooled by JS, no matter which model you are familiar with, they will generally say sorry, you said this is out of stock, we have another model better than this, and then begin to fool you, take you to the ditch, in fact, maybe sell yours as you have already chosen, **may be more expensive. For online inquiry, it is best not to refer to **, Jingdong, easy to remember the inquiry, first of all, you have to go on**,**Tmall** can also refer to.

16 answers2024-04-09

I didn't give points, why did I tell you? You want to do bad things, don't you?

3 answers2024-04-09

quote:

Theoretically, all S60V3 systems can be implemented, which is simple and easy. >>>More