Computer method of remote control for network people

Source: Internet
Author: User
Tags file upload

Most remote control software can only be used on the LAN or on the public network, otherwise do port mapping. Network people achieve the intranet penetration, do not need to make any settings, you can connect to remote computers through the network, the use of remote computer resources. This is very convenient for Internet users, because most users are in a variety of local area networks, such as community broadband, campus network and so on. and its installation and use is very simple and quick, even if the computer knowledge of the user can be effortless use.

Figure 1 Software small file

Unzip the installation package downloaded from the Internet and double-click the network installation file. Select the installation directory in the pop-up installation interface and click "Install". (Figure 2)

Figure 2 Software Installation Interface

The software runs automatically when the installation is complete. (Figure 3)

Figure 3 Software main interface

The local IP and control password are automatically displayed on the left side of the software. The "remote" on the right simply fills in the remote computer's IP and control password, and can connect and remotely control each other. How does this remote IP and control password get? Don't bother thinking, as long as the remote computer is also installed to run the network person software.

Fill in each other's IP and control password, select control options, click "Connect", you can control the remote computer.

Tip: Long strings of IP are hard to remember, and the password will change after the software restarts. Friends who are afraid of trouble can register for free as members. Use the member account and password login software, in the future, as long as the internet can run the computer network people, and fill in the Membership account and control password can be used remotely this computer. Of course, the premise is that the remote computer also runs the network person.

Let's take a look at what you can do with remote computers through the remote control of a network person.

1. Access Remote Desktop

Figure 4 Accessing Remote Desktop

Select a remote-controlled connection to view the remote computer's screen synchronously. Use the local mouse keyboard can operate the remote computer, operating in the same way as the operation of the machine. Using the function of the menu bar at the top of the control interface, you can also chat with the other person, file transfer, record or intercept the screen.

Tips:

(1) If the network of computer-controlled people in the security settings selected "Do not abort the running of the connection", many people connect the computer at the same time to achieve desktop sharing.

(2) The mouse will be placed at the top of the control interface can be pop-up ctrl+alt+delet and other dishes command.

2. Remote administration files

Figure 5 File Management

File management of the way to connect, you can quickly enter the file management interface, intuitive to see the local computer and remote computer hard disk data, by dragging the way to achieve file upload download. Software provides a copy, paste, cut, file lookup and other practical functions, you can see in the interface. These functions can only be used on the same computer, that is, after the remote computer copy or cut the file can only paste to the remote computer, and can not paste to the local computer.

Tips: Software for file transfer size is not limited to support the continuation of the breakpoint. If you want to preach games, movies, TV dramas, it is very convenient.

Figure 6 Voice Video Chat

To open the video way to connect, you can directly turn on the other side of the camera, voice video communication, text communication, video recording and photography.

Tips: Click the next key can be remote control camera rotation. If your camera supports the spin function, then you can use it to guard against theft.

Network person is a formal software, will not be anti-virus software killing. Often need to use remote control software, but also afraid of being anti-virus software killing friends can try a network of people. Compared with the remote control software of Trojan Horse, the network person is much more safe and reliable.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.