In
computing
Computing is any goal-oriented activity requiring, benefiting from, or creating computer, computing machinery. It includes the study and experimentation of algorithmic processes, and the development of both computer hardware, hardware and softw ...
, the term remote desktop refers to a
software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications.
The history of software is closely tied to the development of digital comput ...
- or
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
feature that allows a
personal computer
A personal computer, commonly referred to as PC or computer, is a computer designed for individual use. It is typically used for tasks such as Word processor, word processing, web browser, internet browsing, email, multimedia playback, and PC ...
's
desktop environment
In computing, a desktop environment (DE) is an implementation of the desktop metaphor made of a bundle of programs running on top of a computer operating system that share a common graphical user interface (GUI), sometimes described as a graphi ...
to be run remotely from one system (usually a PC, but the concept applies equally to a
server or a
smartphone
A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
), while being displayed on a separate
client device. Remote desktop applications have varying features. Some allow attaching to an existing user's
session and "remote controlling", either displaying the remote control session or blanking the screen. Taking over a desktop remotely is a form of remote administration.
Overview
Remote access can also be explained as the remote control of a computer by using another device connected via the internet or another network. This is widely used by many computer manufacturers and large businesses help desks for technical troubleshooting of their customer's problems.
Remote desktop software captures the mouse and keyboard inputs from the local computer (client) and sends them to the
remote computer (server). The remote computer in turn sends the display commands to the local computer. When applications with many graphics including video or 3D models need to be controlled remotely, a remote workstation software that sends the pixels rather than the display commands must be used to provide a smooth, like-local experience.
Remote desktop sharing is accomplished through a common client/server model. The client, or
VNC viewer, is installed on a local computer and then connects via a network to a server component, which is installed on the remote computer. In a typical VNC session, all keystrokes and mouse clicks are registered as if the client were actually performing tasks on the end-user machine.
Remote desktops also have a major advantage for security development, companies are able to permit software engineers who may be dispersed geographically to operate and develop from a computer which can be held within the companies office or cloud environment.
The target computer in a remote desktop scenario is still able to access all of its core functions. Many of these core functions, including the main
clipboard, can be shared between the target computer and remote desktop client.
Following the onset of
COVID-19
Coronavirus disease 2019 (COVID-19) is a contagious disease caused by the coronavirus SARS-CoV-2. In January 2020, the disease spread worldwide, resulting in the COVID-19 pandemic.
The symptoms of COVID‑19 can vary but often include fever ...
, the shift to remote-work environments has led many to work from home with devices without enterprise IT support. As a result, these workers were reliant on remote desktop software to collaborate and keep their systems available and secure.
Uses
A main use of remote desktop software is remote administration and remote implementation. This need arises when software buyers are far away from their software vendor. Most remote access software can be used for "
headless computers": instead of each computer having its own monitor, keyboard, and mouse, or using a
KVM switch, one computer can have a monitor, keyboard, mouse, and remote control software, and control many headless computers. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there.
Remote desktop software can be used to access a remote computer: a physical personal
computer
A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic set ...
to which a user does not have physical access, but that can be accessed or interacted with. Unlike
servers, remote computers are mainly used for peer to peer connections, where one device is unattended. A remote computer connection is generally only possible if both devices have a
network connection.
Since the advent of
cloud computing
Cloud computing is "a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand," according to International Organization for ...
remote desktop software can be housed on
USB hardware devices, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, and
wake on LAN equipment, to establish a
virtual private network
Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not con ...
(VPN) connection with the router over the Internet if not connected to the
LAN, switch on a computer connected to the router, then connect to it.)
Remote desktop products are available in three models: hosted service, software, and appliance.
Tech support scammers use remote desktop software to connect to their victim's computer and will often lock out the computer if the victim does not cooperate.
Protocols
Remote desktop
protocols
Protocol may refer to:
Sociology and politics
* Protocol (politics), a formal agreement between nation states
* Protocol (diplomacy), the etiquette of diplomacy and affairs of state
* Etiquette, a code of personal behavior
Science and technology
...
include the following:
*
Apple Remote Desktop
Apple Remote Desktop (ARD) is a Macintosh application produced by Apple Inc., first released on March 14, 2002, that replaced a similar product called ''Apple Network Assistant''. Aimed at computer administrators responsible for large numbers of ...
Protocol (ARD) Original protocol for
Apple Remote Desktop
Apple Remote Desktop (ARD) is a Macintosh application produced by Apple Inc., first released on March 14, 2002, that replaced a similar product called ''Apple Network Assistant''. Aimed at computer administrators responsible for large numbers of ...
on
macOS
macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
machines.
*
Appliance Link Protocol
The Sun Ray is a stateless server, stateless thin client computer (and associated software) aimed at corporate environments, that was originally introduced by Sun Microsystems in September 1999 and discontinued by Oracle Corporation in 2014. It ...
(ALP) a
Sun Microsystems
Sun Microsystems, Inc., often known as Sun for short, was an American technology company that existed from 1982 to 2010 which developed and sold computers, computer components, software, and information technology services. Sun contributed sig ...
-specific protocol featuring audio (play and record), remote printing, remote
USB
Universal Serial Bus (USB) is an industry standard, developed by USB Implementers Forum (USB-IF), for digital data transmission and power delivery between many types of electronics. It specifies the architecture, in particular the physical ...
, accelerated video
*
HP Remote Graphics Software
HP ZCentral Remote Boost, formerly known as HP Remote Graphics Software or HP RGS, is a client-server remote desktop software developed by HP Inc. Launched in 2003. HP RGS enables remote access to workstations (or virtual workstations) from ma ...
(RGS) a
proprietary protocol
In telecommunications, a proprietary protocol is a communications protocol owned by a single organization or individual.
Intellectual property rights and enforcement
Ownership by a single organization gives the owner the ability to place restricti ...
designed by
Hewlett-Packard
The Hewlett-Packard Company, commonly shortened to Hewlett-Packard ( ) or HP, was an American multinational information technology company. It was founded by Bill Hewlett and David Packard in 1939 in a one-car garage in Palo Alto, California ...
specifically for high end workstation remoting and collaboration.
*
Independent Computing Architecture (ICA) a
proprietary protocol
In telecommunications, a proprietary protocol is a communications protocol owned by a single organization or individual.
Intellectual property rights and enforcement
Ownership by a single organization gives the owner the ability to place restricti ...
designed by
Citrix Systems
*
NX technology (NX) a
proprietary protocol
In telecommunications, a proprietary protocol is a communications protocol owned by a single organization or individual.
Intellectual property rights and enforcement
Ownership by a single organization gives the owner the ability to place restricti ...
designed by
NoMachine with open-source derivatives available from other forked projects.
*
PC-over-IP (PCoIP) a
proprietary protocol
In telecommunications, a proprietary protocol is a communications protocol owned by a single organization or individual.
Intellectual property rights and enforcement
Ownership by a single organization gives the owner the ability to place restricti ...
used by
VMware (licensed from
Teradici
Teradici Corporation was a privately held software company founded in 2004, which was acquired by HP Inc. in October 2021.
Teradici initially developed a protocol (PCoIP) for compressing and decompressing images and sound when remotely accessing ...
)
*
Remote Desktop Protocol
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft Corporation which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this pu ...
(RDP) a
Windows
Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
-specific protocol featuring audio and remote printing
*
Remote Frame Buffer Protocol (RFB) A framebuffer level cross-platform protocol that
VNC is based on.
*
SPICE
In the culinary arts, a spice is any seed, fruit, root, Bark (botany), bark, or other plant substance in a form primarily used for flavoring or coloring food. Spices are distinguished from herbs, which are the leaves, flowers, or stems of pl ...
(Simple Protocol for Independent Computing Environments) – remote-display system built for virtual environments by
Qumranet, now
Red Hat
Red Hat, Inc. (formerly Red Hat Software, Inc.) is an American software company that provides open source software products to enterprises and is a subsidiary of IBM. Founded in 1993, Red Hat has its corporate headquarters in Raleigh, North ...
*
Splashtop a high performance remote desktop protocol developed by Splashtop, fully optimized for hardware (H.264) including Intel / AMD chipsets, NVIDIA / ATI GPU & APU, Qualcomm Snapdragon, and NVIDIA Tegra. By optimizing for different profiles of media codecs, Splashtop can deliver high frame rates with low latency, and also low power consumption.
*
Xpra a protocol originally developed for forwarding X11 application seamlessly with audio, video, remote printing, etc. – extended to support
Windows
Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
and
macOS
macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
servers
*
X Window System
The X Window System (X11, or simply X) is a windowing system for bitmap displays, common on Unix-like operating systems.
X originated as part of Project Athena at Massachusetts Institute of Technology (MIT) in 1984. The X protocol has been at ...
(X11) a well-established cross-platform protocol mainly used for displaying local applications; X11 is
network-transparent
*
Wake-on-LAN
Wake-on-LAN (WoL) is an Ethernet or Token Ring computer networking standard that allows a computer to be turned on or awakened from sleep mode by a network message.
The message is usually sent to the target computer by a program executed on a d ...
a standard protocol for remotely waking up computers that are in low-power mode (turned off, but still have access to a power source).
Malicious variants
A (, sometimes called ) is a type of
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
that controls a system through a remote network connection. While
desktop sharing and
remote administration have many legal uses, "RAT" connotes criminal or malicious activity. A RAT is typically installed without the victim's knowledge, often as payload of a
Trojan horse
In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer, Homer's ''Iliad'', with the poem ending ...
, and will try to hide its operation from the victim and from
computer security software and other anti-virus software.
Notable examples
*
Back Orifice
*
Back Orifice 2000
*
Beast Trojan
*
Bifrost
*
Blackshades
*
DarkComet
*
Havex
*Imminent Monitor
*
NjRAT
*
PoisonIvy
*
Sub Seven
See also
*
Chrome Remote Desktop
*
Comparison of remote desktop software
*
Comparison of screencasting software
This page provides a comparison of notable screencasting software, used to record activities on the computer screen. This software is commonly used for desktop recording, gameplay recording and video editing. Screencasting software is typically li ...
*
Desktop virtualization
Desktop virtualization is a software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.
Desktop virtualization can be used in conjunction with applicati ...
*
Extranet
An extranet is a controlled private computer network that allows communication with business partners, vendors and suppliers or an authorized set of customers. It extends intranet to trusted outsiders. It provides access to needed services for au ...
*
FreeRDP
*
Remote administration
*
Remote desktop protocol
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft Corporation which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this pu ...
*
Technical support scam
A technical support scam, or tech support scam, is a type of scam in which a scammer claims to offer a legitimate technical support service. Victims contact scammers in a variety of ways, often through fake Pop-up ad, pop-ups resembling error ...
*
Virtual Desktop Extender
*
Virtual Desktop Infrastructure (VDI)
*
Virtual machine
In computing, a virtual machine (VM) is the virtualization or emulator, emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer. Their implementations may involve ...
*
Software as a service
Software as a service (SaaS ) is a cloud computing service model where the provider offers use of application software to a client and manages all needed physical and software resources. SaaS is usually accessed via a web application. Unlike o ...
(SaaS)
References
External links
*
*
{{Information security