Most remote control software can only be used on the LAN or on the public network, otherwise do port mapping. Network people achieve the intranet penetration, do not need to make any settings, you can connect to remote computers through the network, the use of remote computer resources. This is very convenient for Internet users, because most users are in a variety of local area networks, such as community broadband, campus network and so on. and its installation and use is very simple and quick, even if the computer knowledge of the user can be effortless use.
Figure 1 Software small file
Unzip the installation package downloaded from the Internet and double-click the network installation file. Select the installation directory in the pop-up installation interface and click "Install". (Figure 2)
Figure 2 Software Installation Interface
The software runs automatically when the installation is complete. (Figure 3)
Figure 3 Software main interface
The local IP and control password are automatically displayed on the left side of the software. The "remote" on the right simply fills in the remote computer's IP and control password, and can connect and remotely control each other. How does this remote IP and control password get? Don't bother thinking, as long as the remote computer is also installed to run the network person software.
Fill in each other's IP and control password, select control options, click "Connect", you can control the remote computer.
Tip: Long strings of IP are hard to remember, and the password will change after the software restarts. Friends who are afraid of trouble can register for free as members. Use the member account and password login software, in the future, as long as the internet can run the computer network people, and fill in the Membership account and control password can be used remotely this computer. Of course, the premise is that the remote computer also runs the network person.
Let's take a look at what you can do with remote computers through the remote control of a network person.
1. Access Remote Desktop
Figure 4 Accessing Remote Desktop
Select a remote-controlled connection to view the remote computer's screen synchronously. Use the local mouse keyboard can operate the remote computer, operating in the same way as the operation of the machine. Using the function of the menu bar at the top of the control interface, you can also chat with the other person, file transfer, record or intercept the screen.
Tips:
(1) If the network of computer-controlled people in the security settings selected "Do not abort the running of the connection", many people connect the computer at the same time to achieve desktop sharing.
(2) The mouse will be placed at the top of the control interface can be pop-up ctrl+alt+delet and other dishes command.
2. Remote administration files
Figure 5 File Management
File management of the way to connect, you can quickly enter the file management interface, intuitive to see the local computer and remote computer hard disk data, by dragging the way to achieve file upload download. Software provides a copy, paste, cut, file lookup and other practical functions, you can see in the interface. These functions can only be used on the same computer, that is, after the remote computer copy or cut the file can only paste to the remote computer, and can not paste to the local computer.
Tips: Software for file transfer size is not limited to support the continuation of the breakpoint. If you want to preach games, movies, TV dramas, it is very convenient.
Figure 6 Voice Video Chat
To open the video way to connect, you can directly turn on the other side of the camera, voice video communication, text communication, video recording and photography.
Tips: Click the next key can be remote control camera rotation. If your camera supports the spin function, then you can use it to guard against theft.
Network person is a formal software, will not be anti-virus software killing. Often need to use remote control software, but also afraid of being anti-virus software killing friends can try a network of people. Compared with the remote control software of Trojan Horse, the network person is much more safe and reliable.