Remote administration software

The remote control software (English Remote Administration Tool translates to literally " remote administration tool " ) represents an application of the concept of remote maintenance for any computer or computer systems Represent is usually used in order to log in from remote locations on other computers to this - for repair or maintenance work - remotely.

Possible actions

There are, for example, the following actions are possible:

  • Screen capture ( screenshot )
  • File management ( uploading, downloading, renaming, creating files, etc.)
  • Control
  • Registration management
  • Other functions

Direct link

With a direct connection connect to one or more client computers directly to the server:

[Client] [Client]      | [ Client ] \      | / /      | / __ /      | / /      | / /    [Server ] ----- [Client] Opposite connection

Alternatively, the server can also connect to the client. In this way, for example, restrictions on Internet routers with port forwarding can be circumvented. Automated connections from multiple administrative server to a client also, for example, mass updates are possible.

Funct. Funct.    \ / Will. Funct.    [SERVER ] \ /      | [ SERVER]      | /      | /      | / Funct. Funkt.AKK      | / \ /    [ CLIENT ] ----- [ SERVER] Misuse, malicious software

Many Trojan horses and other similar malicious software have remote maintenance functions. Often, only one file needs to be opened or started before the Trojan gets access to the PC. Trojans usually spread through P2P networks, e- mail attachments or reckless downloads.

Most Trojans disguise themselves by fake error messages. Some turn off the firewall and the antivirus program so that it can no longer prevent you from accessing. Examples of the possible harmful effects of such programs are

  • Download, upload, delete, and modify files
  • Open / close the CD -ROM drive
  • Introduction of worms and viruses on the PC
  • Logging of keystrokes ( keylogger function)
  • Stealing passwords (for example, from the Internet Explorer)
  • Monitoring of the screen contents
  • Completion, start, monitor processes
  • Masking of desktop icons, Taskbar files
  • Text output
  • Issue of noise through the sound card
  • Monitoring and control of mouse and keyboard
  • Recording and transmission of audio signals such as a microphone connected
  • Webcam recording of signals.

To remove such a Trojan horse is often not easy, as they are often designed by their design in such a way to avoid access by the administrator or user.

332021
de