-
1. If you control someone else's computer without someone else's knowledge, you have to turn to a hacker master.
2. If it is with the consent of others or in the case of remote assistance to others. You can use the "Remote Desktop Connection" in the system.
Here's how to make a remote connection in a local area network:
a.First of all, you need to create a user and password in the other party's computer (of course, it can also be the other party's login username and password).Then right-click on it"My computer"properties, select"Remotely"panel, all of which are selected in the page"Allowed".
In"Advanced"also select Allow. In"Select the remote user"on your Mac, add > Advanced > Find Now > select the user you just created, OK.
If you can't connect. Then it's possible that the firewall is blocking it. You can add your IP address to the trusted zone in the firewall of the other party.
3. Know how the other party's IP controls the other party's computer, and it is actually very simple to control the other party's computer through the channel of the other party's IP.
a.Software**, in this case, both computers need to install network person software, network person remote control software is a network person remote control software is able to penetrate the intranet, has passed the major anti-virus software security certification of excellent software, network person remote control has a bright spot, as long as you know the other party's IP can remotely control the other party's computer.
b.After installing and running the software, you will see that there is a local IP or ID on the software, and the control password. At this time, you can ask for the IP and control password on the other party's computer through QQ or **, and enter them into the "remote IP" and "control password" boxes.
c.However, for security reasons, the control password of the software is randomly generated when the computer is started, so every time the software is restarted, the control password will change accordingly. Therefore, it is strongly recommended that you register a free member ID on the main control computer and the controlled computer, and set a fixed control password, so that as long as you know the other party's ID and control password, even if the remote computer is empty, you can also connect to the remote computer at any time, easily control its mouse and keyboard, upload the files of the remote computer, and no longer have to ask for the other party's IP and control password every time, and use the ID login is better than the IP to remember more, more convenient to remember or use.
-
The XT800 can be controlled remotely.
-
You don't need to install the client's monitoring software, in addition to the domain environment, such as dameware, Linyang domain computer scanning and management system do not need to install the client program, you can batch scanning or stand-alone management, if there is no client installed under the working group, in addition to the remote desktop that comes with Windows, you also need to know the account and password of the other party's computer.
-
To be exact, you don't have what you want. In addition, if you want to control a computer remotely, in fact, the remote computer is installed on the server side, just as a process running on the controlled computer, of course, if it is a hacker program, it will not be seen in the task manager, and there will be no interface to make the controlled computer unconscious.
-
And I also want to know that there is such a simple thing, if you understand the principle of remote control, you won't ask for that.
-
In cmd, you can know whether the other party has ** directly (ping the other party's public IP). You can ipconfig to find the local and public IP addresses, which is usually the case locally. If you want to control it remotely, it is recommended that the next remote control software is recommended Sunflower remote control software.
-
Directly type cmd in the start of the run, type "ping What I wrote casually, you just fill in the IP address of the other party, no double quotes."
If the other party is using a router to access the Internet, there will be an external network and an intranet, the external IP is the IP of the router, and the intranet is the IP of each computer under the router.
-
Now this kind of software is not recommended by the average person to go to a hacker.
-
If you think about it, it's impossible, and if that's the case, wouldn't it be a mess You can control someone else's machine, and someone else can control your machine at will.
If there's such a thing, I'm going to control the servers in Nine Cities first.
-
It's not quite clear that you go.
Find out if there's anything you need, I don't know the specifics.
-
Yes, I forgot what it was called, it was controlled by a web page.
The network person remote control flagship version is very easy to use! I'll use it too, so I'll tell you about it: >>>More
Sunflower, the operation is simple and clear, after installation, you can work remotely, work for more than a week, quite stable.
Network people remote control flagship version,Let me tell you about it: >>>More
The best remote control in 09 is the ---NetGod remote control software.
You can use IP** software, change IP is to change or hide the address of your computer, for some**If you frequently register an IP is not possible, I recently used Aurora IP software, which is very functional, high IP quality, low latency, should be suitable for you.