This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages) (Learn how and when to remove this message)
|
Remote desktop software issoftware forremote administration ofcomputers, allowing adesktop environment to be displayed on a computer, known as theclient, other than the one on which it is running − theserver. While commonly found in the context of personal computers, the concept also applies to other forms of computers, such as smartphones and dedicated servers.
Remote desktop applications have varying features. Some allow attaching to an existing user'ssession and "remote controlling", either displaying the remote control session or blanking the screen.
Remote access can also be explained as the remote control of a computer by using another device connected via the internet or another network. This is widely used by many computer manufacturers and large businesses' help desks for technical troubleshooting of their customers' problems.
Remote desktop software captures the mouse and keyboard inputs from the local computer (client) and sends them to theremote computer (server).[1] The remote computer in turn sends the display commands to the local computer. When applications with many graphics including video or 3D models need to be controlled remotely, a remote workstation software that sends the pixels rather than the display commands must be used to provide a smooth, like-local experience.
Remote desktop sharing is accomplished through a common client/server model. The client, orVNC viewer, is installed on a local computer and then connects via a network to a server component, which is installed on the remote computer. In a typical VNC session, all keystrokes and mouse clicks are registered as if the client were actually performing tasks on the end-user machine.[2]
Remote desktops also have a major advantage for security development, companies are able to permit software engineers who may be dispersed geographically to operate and develop from a computer which can be held within the companies office or cloud environment.
The target computer in a remote desktop scenario is still able to access all of its core functions. Many of these core functions, including the mainclipboard, can be shared between the target computer and remote desktop client.
Following the onset ofCOVID-19, the shift to remote-work environments has led many to work from home with devices without enterprise IT support. As a result, these workers were reliant on remote desktop software to collaborate and keep their systems available and secure.[3]
A main use of remote desktop software is remote administration and remote implementation. This need arises when software buyers are far away from their software vendor. Most remote access software can be used for "headless computers": instead of each computer having its own monitor, keyboard, and mouse, or using aKVM switch, one computer can have a monitor, keyboard, mouse, and remote control software, and control many headless computers. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there.
Remote desktop software can be used to access a remote computer: a physical personalcomputer to which a user does not have physical access, but that can be accessed or interacted with.[4] Unlikeservers, remote computers are mainly used for peer to peer connections, where one device is unattended. A remote computer connection is generally only possible if both devices have anetwork connection.
Since the advent ofcloud computing remote desktop software can be housed onUSB hardware devices, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, andwake on LAN equipment, to establish avirtual private network (VPN) connection with the router over the Internet if not connected to theLAN, switch on a computer connected to the router, then connect to it.)
Remote desktop products are available in three models: hosted service, software, and appliance.
Tech support scammers use remote desktop software to connect to their victim's computer and will often lock out the computer if the victim does not cooperate.
Remote desktopprotocols include the following:
Aremote access trojan (RAT, sometimes calledcreepware)[6] is a type ofmalware that controls a system through a remote network connection. Whiledesktop sharing andremote administration have many legal uses, "RAT" connotes criminal or malicious activity. A RAT is typically installed without the victim's knowledge, often as payload of aTrojan horse, and will try to hide its operation from the victim and fromcomputer security software and other anti-virus software.[7][8][9][10][11][12]