What is Remote Control? Will the phone be controlled remotely?

Updated on technology 2024-05-27
13 answers
  1. Anonymous users2024-02-11

    Remote control is a kind of Trojan horse, a Trojan horse will be associated with a virus, in fact, a Trojan horse is not the same as a virus, the Trojan horse will not damage your system and hard disk files, there is no physical harm to your computer, but it can hide from it to do bad things, such as stealing information and data on the controlled computer, and the virus will destroy the normal use of the computer. Cat-and-mouse eating is to take advantage of the software vulnerabilities to invade the user's computer, and at present, only Tencent PC Manager blocks the security software of the cloud security service by virtue of a special protection mechanism of the cloud check function.

  2. Anonymous users2024-02-10

    1. Where is the "remote assistance"?

    First of all, open the dialog box to chat with friends, the one pointed by the mouse is "Window Layout Settings", click once, you can find "far".

    program assistance" option.

    2. Application for "Remote Assistance".

    The "Remote Assistance" option must be clicked on by the party who needs help. After that, a prompt will appear in the chat window of the other party.

    The accepting party clicked "Accept". At this time, a prompt will appear in the requester's dialog box that the other party has agreed to your remote assistance request, "accept" or "decline", and the remote assistance request will not be officially completed until the requester clicks "accept".

    Once the connection is successfully established, the recipient's desktop will appear and will be refreshed in real time. The window on the right is the applicant's desk.

    But now you can't directly control his computer, if you want to control the other party's computer, you have to click "Apply for Control", and after both parties click accept again, you can control the other party's computer.

    QQ does not lock the mouse and keyboard of the applicant during remote assistance control, remote assistance can be regardless of the network connection mode of both parties, do not need to consider firewall factors, etc., of course, or take into account the network speed of both parties, 3. Some settings of "remote assistance".

    1. On the receiving application side, you can click "Window Floating", which will make the other party's desktop a separate window.

    The floating window can be maximized so that you can see all of each other's desktops as much as possible, and it doesn't matter if you can't see them all, you can.

    Drag the scroll bar to do so.

    2. Do you think the display effect is not good? Because of the relationship between the Internet speed, the default effect is relatively poor, if you guys.

    The network speed is fast enough, then you can click on "Settings" by the applicant, and "Image Display Quality" and "Color Quality" will appear

    The setting window of the room, let's set it by yourself according to the bandwidth capacity.

    Hope it solves your problem.

  3. Anonymous users2024-02-09

    Hello! The phone can be controlled remotely. If your phone has any of the following situations, you should pay attention.

    1. Check your mobile phone communication records to see if there are any other suspicious communication records. Obviously I haven't called, but it shows that there is a call log. In addition, you should also see if your mobile phone contacts have added some numbers that you don't know, which is most likely the mobile phone number used by the other party to monitor.

    2. When in the call state, the mobile phone has a current noise. If your signal is not good at this time, then you can also think that the current is caused by the signal. But if the signal is stable, then you need to pay attention, then it is possible that the phone is being monitored.

    3. When you pick up the phone and press the first button, there will be a delay of 1 2 seconds. Or after ruling out the lack of memory, the phone is stuck and the keys respond slowly. It's possible that the phone was implanted with a chip, and there was one behind it"Eavesdroppers"。

    4. In addition to chips, the most common is monitoring software. But these are very difficult to detect and run hidden. If you suspect that your phone is being monitored, you can back up the necessary software and data on your phone, and then restore your phone to factory settings to allow the potentially threatening software to be disposed of.

    Now you need to choose safe and formal software to choose remote control software.

  4. Anonymous users2024-02-08

    1.Pop-ups or notifications: Some remote control software may display a pop-up window or notification on your screen to let you know that someone is remotely accessing your computer.

    2.Firewall or security software alerts: If you have a firewall or security software installed on your computer, they may detect and alert you about your remote control connection. You may see a warning or pop-up that blocks the connection.

    3.Unusual activity indication: You may notice your computer's activity light flashing or showing activity without you doing it. This may be due to remote control software.

    4.Unusual mouse or keyboard actions: If your mouse or keyboard suddenly starts moving or performing actions on its own, it may be caused by the remote control software.

    If you suspect that your computer is being remotely controlled or has a security issue, take the following steps immediately:

    1.Disconnect from the network: Disconnecting your computer from the network can block remote access and prevent further potential threats.

    2.Run a security scan: Perform a comprehensive scan of your computer with reliable antivirus software or security tools to detect and remove any malware.

    3.Update and harden your system: Ensure that your operating system and security software are up-to-date and perform the necessary security patches and updates to improve the security of your system.

    4.Seek professional help: If you are concerned about the security of your computer or are unable to resolve the issue, contact a professional technical support person or computer repair specialist for further help and advice.

    Please note that these tips are for informational purposes only and may behave differently depending on the remote control software and situation. If you have any concerns about the security of your computer, please take appropriate measures to protect your personal information and system security.

  5. Anonymous users2024-02-07

    If your computer is remotely controlled, there will generally be no prompts or warnings. This is because remote control software usually runs in the background and hides their activity so that it is not detected by the user.

    However, there are some indicators that can make you wonder if your computer is being remotely controlled:

    Mouse and keyboard movement: If you're not operating your computer, but your mouse and keyboard are still moving, someone may be taking control of your computer remotely.

    Window pop-ups: If a new window or program suddenly appears, especially if you're not doing anything, it could also be due to remote control.

  6. Anonymous users2024-02-06

    The following prompt may be given when the computer is being remotely controlledInput devices such as mice and keyboards move or operate automatically.

    The system or network speed is slow or abnormal.

    Security software, such as antivirus software or firewalls, prompts unknown programs or dangerous behavior.

    If the above situation is found, you should immediately disconnect the network connection and take relevant actions such as anti-virus detection and killing. At the same time, it is recommended to strengthen network security awareness, avoid surfing the Internet in an unsecured network environment, do not easily open suspicious emails or links, and keep the system and security software updated.

  7. Anonymous users2024-02-05

    After the computer is remotely controlled, some prompts may appear, such as:

    Whether your computer is remotely controlled, then go to the "My Computer" attribute "Remote" to see if the user is allowed to connect to this computer remotely, this option is not hooked, and it will not be remotely controlled if it is not hooked.

    See if there is any inexplicable operation, if you don't move the mouse, it will move on its own, and a dialog box will pop up.

    Inexplicably increase or decrease files on the hard disk.

    Preventive measures: aDisable remote services.

    b.Start-Run (enter enter, open the service (local), find: remote desktop configuration, we double-click:

    Remote Desktop Configuration, find the startup type in the pop-up window, and select: Disable (if it is disabled, do not change it).

    The above are some tips for your computer to be remotely controlled, if these situations occur, please pay attention to whether your computer is remotely controlled, and take appropriate measures to protect your computer security.

  8. Anonymous users2024-02-04

    No. First of all, there are 2 cases of remote control:

    1: Through software, such as QQ, that one needs your permission, so there is a hint.

    The computer is remotely controlled, and the disadvantages are:

    1. The person who controls it remotely can steal any data and information on the controlled computer, resulting in the leakage of confidential documents.

    2. The remote control person can arbitrarily destroy the system files of the controlled computer, causing the controlled computer to crash and fail to start.

    3. The person who controls the remote, if it is a senior computer expert, can secretly plant viruses or Trojans on the controlled computer, and then modify the anti-virus software to ignore these viruses and Trojans, and then at any time, drive the Trojan horse to launch an attack on the controlled computer to control and destroy the computer.

  9. Anonymous users2024-02-03

    Being controlled definitely needs to be operated in advance.,As long as you can directly control it remotely under a simple setting.,If you don't need to operate, it's not controlled but hacked.,Illegal.。 Like you use airdroid remote control, as long as you have an airdroid on the other party's mobile phone in advance, and then you can directly control it remotely after setting the permissions, and it is also very good to supervise the use of children's mobile phones.

  10. Anonymous users2024-02-02

    If you say that you can control the phone remotely according to the traditional method before, then you need root to control the Android phone, so it will not be very convenient. Because if the phone is rooted, it will also have an impact, and now there are many remote control software, in fact, you can quickly control the phone, and you don't need to root it, so it will be more convenient. So how do you control your phone remotely?

    It only takes a few simple steps.

    First install an "airdroid" on the controlled mobile phone, and then install an "airmirror" on the mobile phone that operates the remote control, don't install the wrong two, otherwise the remote control will not be possible. [Click to visit the official website**].

    Then open the AirDroid client on the controlled phone and enable the remote control permission.

    Finally, open the "airmirror" in the operation remote control phone to log in to the same airdroid, select the device you need to control, and then click "remote control".

    It is not difficult to control the phone remotely, according to the above steps, you can easily control the phone with the Airdroid software. In the case of no root, not only can the mobile phone control the mobile phone, but also the mobile phone can be controlled on the computer, so that you can control the mobile phone without being restricted. After controlling the mobile phone, you can use many functions, such as teaching parents to use the mobile phone remotely, remotely going to the camera of the mobile phone, etc., which are relatively good functions.

  11. Anonymous users2024-02-01

    Long control is useless, the controlled mobile phone still has to be operated, it should not be considered remote.

  12. Anonymous users2024-01-31

    You can use the following methods to determine whether your computer is being remotely controlled by someone else.

    1. The remote control software of the network person needs to be manually installed by the computers of both parties: if you suspect that the computer is remotely controlled, first think about the computer has installed the network person software by itself, because the regular remote control software needs to be installed by both parties, and it cannot be automatically installed and run on the computer after clicking on the Trojan horse.

    2. Network people remote control software is free of killing: If you suspect that your computer is remotely controlled, if it is a Trojan virus, directly use antivirus software to check and kill the whole thing.

    3. The network remote control software can be set up to monitor the other party's computer screen: if you suspect that the computer is remotely controlled, because many users will use the service to start to ensure that the software starts automatically after each computer restart, and the 360 team will list all the programs that are not self-starting the system, you can judge the empty to go there to take a look, and clear the programs that do not need to be self-starting. This does not refer to the remote control software for network people, and the same is true for other cavity punching orange software.

  13. Anonymous users2024-01-30

    Operating computer: Huawei MateBookXPro 2022.

    Operating system: Windows 10.

    Check whether the computer is taken and beamed remotely controlled by the following methods:

    1. Open the task manager shortcut: Ctrl Alt del. Click on the Users menu: it lists all the users on the computer at the moment.

    2. If you see that it is not just you who are logged in, you can be sure that there is a remote login. If you have QQ Remote turned on, check which friend controls your computer.

    3. If it is malicious control, test it with anti-virus software, and then shut it down directly.

    Prevent yourself from being remotely controlled by others:

    Update your system's security patches. Install the latest version of antivirus software and network firewall, and update its virus database files in a timely manner. Ideally, the installed antivirus software should have registry monitoring.

    After installing anti-virus software and network firewalls, don't take it lightly, and be sure to block it immediately and decisively when an unclear program accesses the network.

    Don't go to some unfamiliar **** files, and don't arbitrarily execute the documents sent by others, even if he is your friend, be cautious. Individual users should not install too many Windows components, and it is best to disable unwanted system services. Shelter <>

Related questions
18 answers2024-05-27

Let's briefly describe it with existing appliances.

1. The wiring problem of the connecting wires between household appliances: >>>More

8 answers2024-05-27

2. Set the access password in your personal account.

3. Enter the home page and see a quick access code, enter this access code on the main control terminal to directly access the mobile phone. >>>More

12 answers2024-05-27

The computer can be used to remotely control the mobile phone with the help of some third-party remote control software. >>>More

13 answers2024-05-27

Xiaomi phones. MIUI, Kids Mode (Parental Control Mode, Student Mode) is still there, as shown below. It's just that the function is not powerful enough, but it restricts the installation of apps, restricts the use of specified apps (maps, memorization software, learning software...) >>>More

14 answers2024-05-27

Tools Raw materials.

One smartphone (Android). >>>More