Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
14 views5 pages

Remote Desktop

Remote desktop software allows users to access and control a remote computer from a separate device. It captures inputs from the local computer and sends them to the remote computer, which sends display outputs back to the local computer. Common uses include remote administration, support, and security testing. However, malicious remote access trojans can also control remote systems covertly. Remote desktop software operates via client-server models and a variety of protocols, both proprietary and open-source.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views5 pages

Remote Desktop

Remote desktop software allows users to access and control a remote computer from a separate device. It captures inputs from the local computer and sends them to the remote computer, which sends display outputs back to the local computer. Common uses include remote administration, support, and security testing. However, malicious remote access trojans can also control remote systems covertly. Remote desktop software operates via client-server models and a variety of protocols, both proprietary and open-source.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Remote desktop software

In computing, the term remote desktop refers to a software- or operating system feature that allows a
personal computer's desktop environment to be run remotely from one system (usually a PC, but the concept
applies equally to a server or a smartphone), while being displayed on a separate client device. Remote
desktop applications have varying features. Some allow attaching to an existing user's session and "remote
controlling", either displaying the remote control session or blanking the screen. Taking over a desktop
remotely is a form of remote administration.

Overview
Remote access can also be explained as the remote control of a computer by using another device connected
via the internet or another network. This is widely used by many computer manufacturers and large
businesses help desks for technical troubleshooting of their customer's problems.

Remote desktop software captures the mouse and keyboard inputs from the local computer (client) and sends
them to the remote computer (server). [1] The remote computer in turn sends the display commands to the
local computer. When applications with many graphics including video or 3D models need to be controlled
remotely, a remote workstation software that sends the pixels rather than the display commands must be used
to provide a smooth, like-local experience.

Remote desktop sharing is accomplished through a common client/server model. The client, or VNC viewer,
is installed on a local computer and then connects via a network to a server component, which is installed on
the remote computer. In a typical VNC session, all keystrokes and mouse clicks are registered as if the client
were actually performing tasks on the end-user machine.[2]

Remote desktops also have a major advantage for security development, companies are able to permit
software engineers who may be dispersed geographically to operate and develop from a computer which can
be held within the companies office or cloud environment.

The target computer in a remote desktop scenario is still able to access all of its core functions. Many of
these core functions, including the main clipboard, can be shared between the target computer and remote
desktop client.

Uses
A main use of remote desktop software is remote administration and remote implementation. This need
arises when software buyers are far away from their software vendor. Most remote access software can be
used for "headless computers": instead of each computer having its own monitor, keyboard, and mouse, or
using a KVM switch, one computer can have a monitor, keyboard, mouse, and remote control software, and
control many headless computers. The duplicate desktop mode is useful for user support and education.
Remote control software combined with telephone communication can be nearly as helpful for novice
computer-users as if the support staff were actually there.

1 of 5 10/30/23, 16:03
Remote desktop software can be used to access a remote computer: a physical personal computer to which a
user does not have physical access, but that can be accessed or interacted with.[3] Unlike servers, remote
computers are mainly used for peer to peer connections, where one device is unattended. A remote computer
connection is generally only possible if both devices have a network connection.

Since the advent of cloud computing remote desktop software can be housed on USB hardware devices,
allowing users to connect the device to any PC connected to their network or the Internet and recreate their
desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which
requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is
possible with a router with C2S VPN support, and wake on LAN equipment, to establish a virtual private
network (VPN) connection with the router over the Internet if not connected to the LAN, switch on a
computer connected to the router, then connect to it.)

Remote desktop products are available in three models: hosted service, software, and appliance.

Tech support scammers use remote desktop software to connect to their victim's computer and will often lock
out the computer if the victim does not cooperate.

Protocols
Remote desktop protocols include the following:

▪ Apple Remote Desktop Protocol (ARD) – Original protocol for Apple Remote
Desktop on macOS machines.
▪ Appliance Link Protocol (ALP) – a Sun Microsystems-specific protocol featuring
audio (play and record), remote printing, remote USB, accelerated video
▪ HP Remote Graphics Software (RGS) – a proprietary protocol designed by Hewlett-
Packard specifically for high end workstation remoting and collaboration.
▪ Independent Computing Architecture (ICA) – a proprietary protocol designed by
Citrix Systems
▪ NX technology (NX) a proprietary protocol designed by NoMachine with open-
source derivatives available from other forked projects.
▪ PC-over-IP (PCoIP) – a proprietary protocol used by VMware (licensed from
Teradici)[4]
▪ Remote Desktop Protocol (RDP) – a Windows-specific protocol featuring audio and
remote printing
▪ Remote Frame Buffer Protocol (RFB) – A framebuffer level cross-platform protocol
that VNC is based on.
▪ SPICE (Simple Protocol for Independent Computing Environments) – remote-display
system built for virtual environments by Qumranet, now Red Hat
▪ Splashtop – a high performance remote desktop protocol developed by Splashtop,
fully optimized for hardware (H.264) including Intel / AMD chipsets, NVIDIA / ATI
GPU & APU, Qualcomm Snapdragon, and NVIDIA Tegra. By optimizing for different
profiles of media codecs, Splashtop can deliver high frame rates with low latency,
and also low power consumption.
▪ Xpra – a protocol originally developed for forwarding X11 application seamlessly
with audio, video, remote printing, etc. - extended to support Windows and macOS

2 of 5 10/30/23, 16:03
servers
▪ X Window System (X11) – a well-established cross-platform protocol mainly used
for displaying local applications; X11 is network-transparent
▪ Wake-on-LAN – a standard protocol for remotely waking up computers that are in
low-power mode (turned off, but still have access to a power source).

Malicious variants
A remote access trojan (RAT, sometimes called creepware)[5] is a type of malware that controls a system
through a remote network connection. While desktop sharing and remote administration have many legal
uses, "RAT" connotes criminal or malicious activity. A RAT is typically installed without the victim's
knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from
computer security software and other anti-virus software.[6][7][8][9][10][11]

Notable examples
▪ PoisonIvy
▪ Sub Seven
▪ Beast Trojan
▪ Bifrost[12]
▪ Blackshades[13][14]
▪ DarkComet[15][16]
▪ NjRAT
▪ Back Orifice
▪ Back Orifice 2000
▪ Imminent Monitor[17][18][19][20]
▪ Havex

See also
▪ Comparison of remote desktop software
▪ FreeRDP
▪ Technical support scam
▪ Chrome Remote Desktop
▪ Desktop virtualization
▪ Extranet
▪ Remote administration
▪ Remote desktop protocol
▪ Virtual Desktop Extender
▪ Virtual machine
▪ VDI

3 of 5 10/30/23, 16:03
References
1. "Remote Desktop Software" (https://remoteaccess.itarian.com/free-instant-remote-
access.php). ITarian.com. Retrieved 1 May 2019.
2. Virtual Network Computing (VNC): Making Remote Desktop Sharing Possible (http://
www.businessnewsdaily.com/5428-virtual-network-computing.html).
Businessnewsdaily.com (2013-11-07). Retrieved on 2014-02-27.
3. "What is Remote Computer? - Definition from Techopedia" (https://www.techopedia.
com/definition/23696/remote-computer). Techopedia.com. Retrieved 2020-06-10.
4. "VMware Announces Strategic Licensing and Co-development Agreement with
Teradici for True Remote PC User Experience Further Bolstering its vClient Initiative"
(http://www.vmware.com/company/news/releases/teradici_vmworld08.html).
VMware News Releases. VMware. Retrieved 1 June 2013.
5. "Creepware — Who's Watching You?" (http://www.symantec.com/connect/blogs/cre
epware-who-s-watching-you). Symantec Security Response. 10 December 2013.
6. "Remote Server Administration Tools for Windows 7" (https://technet.microsoft.com/
en-us/library/ee449475%28WS.10%29.aspx). Microsoft TechNet. Microsoft. 4 June
2009. Retrieved 4 February 2011.,
7. "Danger: Remote Access Trojans" (https://technet.microsoft.com/en-us/library/dd63
2947.aspx). Microsoft TechNet. September 2002. Retrieved 5 February 2011.
8. "Understanding the Windows NT Remote Access Service" (https://technet.microsoft.
com/en-us/library/cc751300.aspx). Microsoft TechNet. Microsoft. Retrieved
5 February 2011.
9. "Netsh commands for remote access (ras)" (https://technet.microsoft.com/en-us/lib
rary/cc757467%28WS.10%29.aspx). Microsoft TechNet. Microsoft. January 21,
2005. Retrieved 5 February 2011.
10. "RAS Registry Modification Allowed Without Administrative Rights" (http://support.m
icrosoft.com/kb/267861). Microsoft TechNet. Microsoft. Retrieved 5 February 2011.
11. "Computer RATS - Protecting Your Self" (https://web.archive.org/web/201603140409
20/http://howtheyhack.com/computer-rats-protecting-your-self). HowTheyHack. July
2013. Archived from the original (http://howtheyhack.com/computer-rats-protecting
-your-self/) on 14 March 2016. Retrieved 17 July 2013.
12. "Code Access Security and bifrost" (http://www.codinghorror.com/blog/2007/03/cod
e-access-security-and-bitfrost.html). CodingHorror.com. 20 March 2007. Retrieved
5 February 2011.
13. "BlackShades: Arrests in computer malware probe" (https://www.bbc.com/news/uk-
27471218). BBC News. Retrieved 20 May 2014.
14. "Remarks Prepared for Delivery by Special Agent in Charge Leo Taddeo at
Blackshades Press Conference" (https://www.fbi.gov/newyork/press-releases/2014/r
emarks-prepared-for-delivery-by-special-agent-in-charge-leo-taddeo-at-blackshades
-press-conference). fbi.gov. Federal Bureau of Investigation. Retrieved 20 May
2014.
15. Denbow, Shawn. "pest control: taming the rats" (http://www.matasano.com/researc
h/PEST-CONTROL.pdf) (PDF). Retrieved 5 March 2014.

4 of 5 10/30/23, 16:03
16. Aylward, Laura. "Malware analysys - Dark Comet RAT" (https://web.archive.org/web/
20140426053741/http://www.contextis.com/research/blog/malware-analysis-dark-c
omet-rat/). Contextis. Archived from the original (http://contextis.com/research/blog
/malware-analysis-dark-comet-rat/) on 26 April 2014. Retrieved 5 March 2014.
17. "Brisbane teenager built spyware used by domestic violence perpetrators across
world, police allege" (https://www.theguardian.com/australia-news/2022/jul/30/brisb
ane-teenager-built-spyware-used-by-domestic-violence-perpetrators-across-world-p
olice-allege). the Guardian. 30 July 2022. Retrieved 23 September 2022.
18. "Advice for potential victims of IM-RAT malware" (https://www.afp.gov.au/rats).
Australian Federal Police. 29 November 2019. Retrieved 23 September 2022.
19. "International crackdown on RAT spyware, which takes total control of victims' PCs"
(https://www.europol.europa.eu/media-press/newsroom/news/international-crackdo
wn-rat-spyware-which-takes-total-control-of-victims%E2%80%99-pcs). Europol.
Retrieved 23 September 2022.
20. "Cybercrime Network focuses on support to victims of malware" (https://www.euroj
ust.europa.eu/news/cybercrime-network-focuses-support-victims-malware).
European Union Agency for Criminal Justice Cooperation. Retrieved 23 September
2022.

Retrieved from "https://en.wikipedia.org/w/index.php?title=Remote_desktop_software&


oldid=1179914683"

5 of 5 10/30/23, 16:03

You might also like