Jump to content

Remote computer: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
Merged content to Remote desktop software#Uses, redirecting; 2020 proposal with consensus; see Talk:Desktop virtualization#Merge proposal (easy-merge)
Tag: New redirect
 
(28 intermediate revisions by 21 users not shown)
Line 1: Line 1:
#REDIRECT [[Remote desktop software#Uses]]
{{Multiple issues|refimprove = July 2007|advert = June 2011|original research = December 2011}}


{{R from merge}}
{{R to section}}
A '''remote computer''' is a [[computer]] to which a user does not have physical access, but which he or she can access or manipulate via some kind of [[computer network|network]].

Remote desktop software allows a person to control a computer from another computer; this allows the user to change anything on the linear computer, and access all of the file contents.

Remote desktop is a software application that turns one computer into the boss of another or a series of others. Remote desktop is sometimes found as part of a suite of other administrative applications; other times, remote desktop is its own entity, doing nothing but what it is supposed to do. Remote desktop software is available for all computer platforms.{{Citation needed|date=December 2011}}

Remote desktop requires that the “master” and “slave” computers be connected to the same network. This remote desktop network can be wired or wireless. Wired networks can use direct connections or connections through routers. Wireless networks can be formed using routers or the Internet.

Advanced security protocols are standard practice inclusions in remote desktop software, especially when the network is a wireless and/or Internet one. The latest versions of remote desktop software have 128-bit encryption protocols. Older versions might have protection of a lesser nature. If you{{Who|date=December 2011}} are running remote desktop software, even if your connection is direct wired, you need to run advanced security protocols as well. Not to do so is to invite piracy.{{Citation needed|date=December 2011}}

Once the administrator has entered the correct password, the remote desktop software enables that administrator to access the target computer. Then, uploads, downloads, file transfers, and software maintenance can take place. Indeed, software maintenance is one of the most common uses of remote desktop software. Often, the administrator will shut down a malfunctioning software application or install a software upgrade using remote desktop software. This saves the time that it would take the administrator to physically insert a CD into the target computer or to do a manual software upgrade download.

The target computer in a remote desktop scenario is still able to access all of its core functions. Many of these core functions, including the main clipboard, can be shared between target computer and administrator, however. Certain safety features can be built into the remote desktop software protocols such that the administrator is not able to delete or otherwise alter files without the target user’s permission. One other rather revolutionary{{Says who|date=December 2011}} thing that remote desktop software can do is to allow the administrator to run an audio or video application on a remote computer and have the sights and/or sounds redirected to the administrator’s computer.

There are many tools to remotely access the computers, such as [[VNC]], RemotePC, [[LogMeIn]], [[TeamViewer]], [[GoToMyPC]], etc.

Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days where security was just a matter of the highest degree of encryption.{{Citation needed|date=December 2011}} Today, a truly secure remote support solution will allow organizations to centrally control who can do what and where safe in the knowledge that when each remote session has finished it should be able to document what actually took place.

For systems in environments that need to meet and maintain compliance requirements,<ref>{{cite web | title=Compliance and Security Challenges with Remote Control| publisher=[[SANS Analyst Program]] | url=http://www.sans.org/reading_room/analysts_program/netop-02-2011.pdf |format=[[portable document format|PDF]]}}</ref> remote administration software must have strict security control.

It is necessary to examine<ref>{{cite web | title= Insiders’ Guide to Evaluating Remote Control Software | publisher=[[Netop Business Solution]] | url=http://www.netop.com/fileadmin/netop/resources/products/administration/remote_control/whitepapers/Insiders%20Guide%20to%20Evaluating%20Remote%20Control%20Software.pdf |format=[[portable document format|PDF]]}}</ref> the remote control software functionality that best serves organizations that need a highly secure tool that crosses all platforms and devices and is completely scalable in any environment. It will help IT professionals select a remote control solution that increases productivity and customer satisfaction, as well as enhances the flexibility of the IT organization and improves the company’s risk profile.

== References ==
<references/>


[[Category:Classes of computers]]
[[Category:Classes of computers]]
[[Category:Computer networking]]
[[Category:Computer networking]]
[[Category:Remote desktop]]
[[Category:Remote desktop]]
[[Category:Telnet]]

[[es:Escritorio remoto]]
[[fr:Bureau à distance]]
[[it:Desktop remoto]]
[[ja:リモートデスクトップ]]
[[pt:Ambiente de trabalho remoto]]

Latest revision as of 21:23, 22 May 2021

  • From a merge: This is a redirect from a page that was merged into another page. This redirect was kept in order to preserve the edit history of this page after its content was merged into the content of the target page. Please do not remove the tag that generates this text (unless the need to recreate content on this page has been demonstrated) or delete this page.