Jump to content

Remote desktop software: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
I've added the historical context and development of this protocol and also some important security considerations while using this protocol.
Tags: Reverted Visual edit
Restored revision 1244686813 by TheCatCollective (talk): Spam as cite
 
Line 20: Line 20:


Since the onset of [[COVID-19 pandemic|COVID-19]], the shift to remote-work environments has led many to work from home with devices without enterprise IT support. As a result, these workers are reliant on remote desktop software to collaborate and keep their systems available and secure.<ref>{{Cite journal |last=Manson |first=Jonathan |date=2022-04-03 |title=Remote Desktop Software as a forensic resource |url=https://www.tandfonline.com/doi/full/10.1080/23742917.2022.2049560 |journal=Journal of Cyber Security Technology |language=en |volume=6 |issue=1–2 |pages=1–26 |doi=10.1080/23742917.2022.2049560 |issn=2374-2917|doi-access=free }}</ref>
Since the onset of [[COVID-19 pandemic|COVID-19]], the shift to remote-work environments has led many to work from home with devices without enterprise IT support. As a result, these workers are reliant on remote desktop software to collaborate and keep their systems available and secure.<ref>{{Cite journal |last=Manson |first=Jonathan |date=2022-04-03 |title=Remote Desktop Software as a forensic resource |url=https://www.tandfonline.com/doi/full/10.1080/23742917.2022.2049560 |journal=Journal of Cyber Security Technology |language=en |volume=6 |issue=1–2 |pages=1–26 |doi=10.1080/23742917.2022.2049560 |issn=2374-2917|doi-access=free }}</ref>

== Historical Context ==
Remote desktop technology has its roots in the 1980s and 1990s, with early development efforts focusing on enabling remote access to systems across networks.

'''1990s: Pioneering Protocols''' Two significant technologies emerged in the 1990s that laid the foundation for modern remote desktop software: Microsoft’s Remote Desktop Protocol (RDP) and Virtual Network Computing (VNC).

* '''Remote Desktop Protocol (RDP):''' Introduced by Microsoft in 1998 as part of Windows NT 4.0 Terminal Server Edition, RDP was designed to allow users to access a remote computer's graphical user interface (GUI) over a network. RDP evolved rapidly, becoming integral to Windows operating systems, with features such as secure data transmission, clipboard sharing, and support for multiple monitor configurations. Over time, RDP became a widely adopted protocol for enterprises, allowing for remote access, support, and administration of Windows-based environments.
* '''Virtual Network Computing (VNC):''' Developed at the Olivetti Research Laboratory in 1998, VNC introduced a platform-independent way to share a desktop remotely. VNC works at the framebuffer level, transmitting pixels from the host to the client, enabling it to run across multiple operating systems like Linux, macOS, and Windows. The open-source nature of VNC led to many derivatives, and it became popular for its simplicity and flexibility across platforms, making it a staple in remote access solutions for non-Windows systems.

'''2000s-2010s: The Rise of Cloud-based Remote Solutions''' In the 2000s, with the growth of cloud computing, the concept of remote desktops expanded beyond direct peer-to-peer connections to cloud-based environments. Virtual Desktop Infrastructure (VDI) became a game-changer, allowing users to access virtual machines hosted in data centers.

* '''Citrix and VMware Solutions:''' Citrix, with its Independent Computing Architecture (ICA) protocol, and VMware with PC-over-IP (PCoIP), contributed heavily to remote desktop technologies. These solutions allowed organizations to deploy applications and desktops in virtualized environments, centralizing resources while giving users remote access from thin clients or personal devices.
* '''Cloud-based Desktops:''' By the 2010s, services like Amazon Workspaces and Microsoft Azure Virtual Desktop brought remote desktops into the cloud era. These solutions allowed users to run powerful desktop environments from the cloud, which could be accessed from any device with an internet connection. This model provided greater scalability and flexibility, removing the need for high-end local hardware.

The transition from early protocols like RDP and VNC to modern cloud-based solutions illustrates the technological evolution that has enabled seamless remote work and access across devices. Today, remote desktop technology continues to evolve, incorporating AI, enhanced security, and integration with cloud infrastructure.


== Uses ==
== Uses ==
Line 46: Line 31:


[[Technical support scam|Tech support scammers]] use remote desktop software to connect to their victim's computer and will often lock out the computer if the victim does not cooperate.
[[Technical support scam|Tech support scammers]] use remote desktop software to connect to their victim's computer and will often lock out the computer if the victim does not cooperate.

A more recent innovation in the field is cloud-based remote desktops, which allow users to run high-performance computing environments entirely from the cloud. Services like Vagon<ref>{{Cite web |title=High Performance Cloud Desktops for Creatives, Gamers & Engineers - Vagon |url=https://vagon.io/cloud-computer |access-date=2024-09-27 |website=vagon.io |language=en-US}}</ref>, Citrix and Nutanix offer cloud computers tailored for designers, engineers, and gamers. Users can access powerful hardware remotely, enabling tasks such as 3D rendering, CAD design, or gaming on any device without needing dedicated local hardware.


== Protocols ==
== Protocols ==
Line 81: Line 64:
* [[PoisonIvy (Trojan)|PoisonIvy]]
* [[PoisonIvy (Trojan)|PoisonIvy]]
* [[Sub7|Sub Seven]]
* [[Sub7|Sub Seven]]

== Security Considerations ==
While remote desktop software offers significant convenience and flexibility, it also poses security risks if not properly configured. To mitigate these risks, several key security measures have become essential for protecting remote desktop connections, including encryption methods, multi-factor authentication (MFA), and best practices for secure access.

# '''Encryption (TLS/SSL)''': Encryption protocols like '''Transport Layer Security (TLS)''' protect data during transmission by encrypting the connection between the client and the remote server. This prevents unauthorized interception of sensitive information.
# '''Multi-Factor Authentication (MFA)''': Adding '''MFA''' provides an extra layer of security by requiring users to verify their identity with something beyond just a password, such as a code sent to a mobile device.
# '''Best Practices''':
#* Use '''VPNs''' to create a secure, encrypted tunnel when accessing remote desktops.
#* Implement '''strong password policies''' and regularly update them.
#* Limit access by '''IP addresses''' and use '''Network Level Authentication (NLA)''' to prevent unauthorized logins.
#* Monitor sessions with '''audit logs''' to detect suspicious activity.

These steps reduce the risk of unauthorized access and help secure remote desktop environments effectively.


== See also ==
== See also ==

Latest revision as of 13:29, 27 September 2024

In computing, the term remote desktop refers to a software- or operating system feature that allows a personal computer's desktop environment to be run remotely from one system (usually a PC, but the concept applies equally to a server or a smartphone), while being displayed on a separate client device. Remote desktop applications have varying features. Some allow attaching to an existing user's session and "remote controlling", either displaying the remote control session or blanking the screen. Taking over a desktop remotely is a form of remote administration.

Overview

[edit]

Remote access can also be explained as the remote control of a computer by using another device connected via the internet or another network. This is widely used by many computer manufacturers and large businesses help desks for technical troubleshooting of their customer's problems.

Remote desktop software captures the mouse and keyboard inputs from the local computer (client) and sends them to the remote computer (server).[1] The remote computer in turn sends the display commands to the local computer. When applications with many graphics including video or 3D models need to be controlled remotely, a remote workstation software that sends the pixels rather than the display commands must be used to provide a smooth, like-local experience.

Remote desktop sharing is accomplished through a common client/server model. The client, or VNC viewer, is installed on a local computer and then connects via a network to a server component, which is installed on the remote computer. In a typical VNC session, all keystrokes and mouse clicks are registered as if the client were actually performing tasks on the end-user machine.[2]

Remote desktops also have a major advantage for security development, companies are able to permit software engineers who may be dispersed geographically to operate and develop from a computer which can be held within the companies office or cloud environment.

The target computer in a remote desktop scenario is still able to access all of its core functions. Many of these core functions, including the main clipboard, can be shared between the target computer and remote desktop client.

Since the onset of COVID-19, the shift to remote-work environments has led many to work from home with devices without enterprise IT support. As a result, these workers are reliant on remote desktop software to collaborate and keep their systems available and secure.[3]

Uses

[edit]

A main use of remote desktop software is remote administration and remote implementation. This need arises when software buyers are far away from their software vendor. Most remote access software can be used for "headless computers": instead of each computer having its own monitor, keyboard, and mouse, or using a KVM switch, one computer can have a monitor, keyboard, mouse, and remote control software, and control many headless computers. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there.

Remote desktop software can be used to access a remote computer: a physical personal computer to which a user does not have physical access, but that can be accessed or interacted with.[4] Unlike servers, remote computers are mainly used for peer to peer connections, where one device is unattended. A remote computer connection is generally only possible if both devices have a network connection.

Since the advent of cloud computing remote desktop software can be housed on USB hardware devices, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, and wake on LAN equipment, to establish a virtual private network (VPN) connection with the router over the Internet if not connected to the LAN, switch on a computer connected to the router, then connect to it.)

Remote desktop products are available in three models: hosted service, software, and appliance.

Tech support scammers use remote desktop software to connect to their victim's computer and will often lock out the computer if the victim does not cooperate.

Protocols

[edit]

Remote desktop protocols include the following:

Malicious variants

[edit]

A remote access trojan (RAT, sometimes called creepware)[6] is a type of malware that controls a system through a remote network connection. While desktop sharing and remote administration have many legal uses, "RAT" connotes criminal or malicious activity. A RAT is typically installed without the victim's knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from computer security software and other anti-virus software.[7][8][9][10][11][12]

Notable examples

[edit]

See also

[edit]

References

[edit]
  1. ^ "Remote Desktop Software". ITarian.com. Retrieved 1 May 2019.
  2. ^ Virtual Network Computing (VNC): Making Remote Desktop Sharing Possible. Businessnewsdaily.com (2013-11-07). Retrieved on 2014-02-27.
  3. ^ Manson, Jonathan (3 April 2022). "Remote Desktop Software as a forensic resource". Journal of Cyber Security Technology. 6 (1–2): 1–26. doi:10.1080/23742917.2022.2049560. ISSN 2374-2917.
  4. ^ "What is Remote Computer? – Definition from Techopedia". Techopedia.com. Retrieved 10 June 2020.
  5. ^ "VMware Announces Strategic Licensing and Co-development Agreement with Teradici for True Remote PC User Experience Further Bolstering its vClient Initiative". VMware News Releases. VMware. Retrieved 1 June 2013.
  6. ^ "Creepware — Who's Watching You?". Symantec Security Response. 10 December 2013.
  7. ^ "Remote Server Administration Tools for Windows 7". Microsoft TechNet. Microsoft. 4 June 2009. Retrieved 4 February 2011.,
  8. ^ "Danger: Remote Access Trojans". Microsoft TechNet. September 2002. Retrieved 5 February 2011.
  9. ^ "Understanding the Windows NT Remote Access Service". Microsoft TechNet. Microsoft. Retrieved 5 February 2011.
  10. ^ "Netsh commands for remote access (ras)". Microsoft TechNet. Microsoft. 21 January 2005. Retrieved 5 February 2011.
  11. ^ "RAS Registry Modification Allowed Without Administrative Rights". Microsoft TechNet. Microsoft. Retrieved 5 February 2011.
  12. ^ "Computer RATS – Protecting Your Self". HowTheyHack. July 2013. Archived from the original on 14 March 2016. Retrieved 17 July 2013.
  13. ^ "Code Access Security and bifrost". CodingHorror.com. 20 March 2007. Retrieved 5 February 2011.
  14. ^ "BlackShades: Arrests in computer malware probe". BBC News. Retrieved 20 May 2014.
  15. ^ "Remarks Prepared for Delivery by Special Agent in Charge Leo Taddeo at Blackshades Press Conference". fbi.gov. Federal Bureau of Investigation. Retrieved 20 May 2014.
  16. ^ Denbow, Shawn. "pest control: taming the rats" (PDF). Retrieved 5 March 2014.
  17. ^ Aylward, Laura. "Malware analysys – Dark Comet RAT". Contextis. Archived from the original on 26 April 2014. Retrieved 5 March 2014.
  18. ^ "Brisbane teenager built spyware used by domestic violence perpetrators across world, police allege". the Guardian. 30 July 2022. Retrieved 23 September 2022.
  19. ^ "Advice for potential victims of IM-RAT malware". Australian Federal Police. 29 November 2019. Retrieved 23 September 2022.
  20. ^ "International crackdown on RAT spyware, which takes total control of victims' PCs". Europol. Retrieved 23 September 2022.
  21. ^ "Cybercrime Network focuses on support to victims of malware". European Union Agency for Criminal Justice Cooperation. Retrieved 23 September 2022.
[edit]