The revelation of multi-multiple control remote control technology for network people

Source: Internet
Author: User
Tags md5 encryption sub account

First, the Network person remote control technology:

Network people remote control software is the most professional enterprise remote management, remote office, remote monitoring software. It realizes the intranet penetration (LAN control to support local area network), in any place can use the local computer on the Internet to manage and monitor multiple computers distributed in different locations, such as the staff computer of different departments in the company, the computer of each chain store, etc. At the same time it can also achieve a variety of convenient and efficient batch of office operations. Software security settings options are rich, installation of the control side (server) can be set whether the software to start, whether to hide the software icon, whether to allow the control of the machine for file management, remote control and other operations.

Second, the SOFTWARE structure:

The network person remote control software divides into the control end and the controlled end (service side). Use the software before the first to our website to register a free ID, and then in the computer you want to control the installation is controlled, after installation, fill in the registration of a good ID, and click to login, and then according to user needs to set whether the software from the start, whether to hide icons and other options. After setting up, you will be in any place with the same ID login to the control side, you can see the control interface of the computer, so that remote management or remote monitoring. The software uses the VNC core, the resource occupies the small, may realize many to many control, simultaneously has used the intranet penetration technology, does not need to do the port mapping can realize the long-distance control intranet computer.

Main functions of the software:

Screen control, file management, video communication, screen wall, video wall, desktop screen video, video communication video, remote system process management, remote uninstall, file distribution (support bulk operation), access permission settings, text broadcast notification, remote reboot, shutdown (support bulk operation), remote uninstall, support multiple Administrator account ( Multi-many-to-many management and monitoring at the same time, supporting the continuation of the breakpoint. Computer knowledge

Software operation and Setup

1, member Login and Setup

Log in at the control end using the registered or purchased membership number and password. No ID can be clicked on the Software Member registration button, register a trial member number, the accused end also use the same account login:

2. Main function and operation of the control terminal

(1) Online Status detection: Click on the "online host" at the control end to view the computer's online status, computer-related information and software status.

(2) Administrator rights Change Password: Can be in the control side of the option--settings--Modify the password to modify the administrator login password

(3) Centralized management of controlled-end functions: Check multiple computers, click on "Screen Wall", you can view multiple computer screen at the same time, click "Distribution File" can distribute files to all selected hosts, click "Send Broadcast" can send radio commands to more than one computer, but also to many computers to achieve batch restart, cancellation, Shutdown, uninstall function.

(4) Screen interception function Select a single computer, click "Screen Control", you can remote operation of this computer, including running the program, text input, modify files, upload download files, screenshots, screen video, like in front of the computer to operate as convenient.

(5) Process detection function: System control:

You can monitor the system process of the computer being controlled and the windows that have been opened on the desktop.

(6) Administrator Rights Management function: The network person remote software also supports many to many control function, after landing the software in the main interface has a "sub-account Management" option, the administrator clicks on (the site on the application of the default account is the Administrator account), the right mouse button can add a child account, to achieve multiple accounts at the same time login control side, Jointly manage multiple controlled computers. The following figure: The administrator added a child account named 1, then the control-side input zcn@1 can also log in to the software, the same managed to manage the end. Administrator account (ZCN) can add, delete, modify the password of the child account and other operations. The administrator also has the ability to modify the password of the child account at any time, forcing the withdrawal of the online sub account.

It should be noted that when using a child account login should fill in the full sub-account name zcn@1 that is, in front of the child account 1 plus the main account ZCN, and the @ symbol to separate the two, the following figure: Login with a child account

4, the control of the end of the settings

(1) Administrator identification:

An administrator who can set up an authorization has the right to control a computer that is being charged. Password authentication is performed on the authorized administrator.

(2) Audit data generation function:

Both the control end and the controlled end will generate an encrypted log file, recording the software's startup and shutdown, and the success of the admin landing and other important operations, such as controlling the landing, exiting, connecting, and the operation of file management. The date and time of occurrence of the event, the description of the event, are recorded in each log record, and the administrator can make the log "Save as", "Clear Day", and so on.

(3) The engine's own protection function: the software process and the startup item protection: After the controlled software installs the operation, its installation directory below "Grdassist.exe", "Grdhost.exe", "Prthost.exe" will the software process, The main program under the Startup Software installation directory protects against unauthorized users from forcibly deleting and disabling software programs and startup items. Only the enterprise version of the control terminal authorized users to the controlled software to achieve a remote uninstall operation, to achieve the control of the end of the exit protection.

5. Software Security Introduction: Remote Secure Transmission:

Software file transfer using Blowfish encryption technology, that is, the use of listening software to detect are some of the encrypted data, and the user's password is encrypted using MD5 encryption.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.