SlideShare a Scribd company logo
Remote Administration
 Remote administration can be broadly defined as
any method of controlling, monitoring a
networked device from a remote location.
However, it is the actual task at hand that
usually defines these roles more clearly
 Remote administration has developed and
evolved over recent years, and is no longer
simply about controlling a device over a network,
be it local or wide area.
 IT assets
 Companies are looking for ways to provide cost-
effective network access to their remote and
mobile employees. For chronic problems PCs,
applications as remote assistant “remote
administrator” can save time by giving you
access and control a remote PC via either a
network or a dial-up connection. If your friend’s
or relative’s PC is running Windows XP
professional, you can access the system
remotely for free with a computer running any
version of windows, including Windows 95.
Types of Remote Administration
 Administered remote users
Administered remote users are users that you
have defined as remote users Defining remote
users happens in two ways:
I. When you conduct remote updates, non
administered remote users become
administered remote users.
II. When you manually administer a remote user
rather than waiting for a remote update.
 Non administered remote users
I. Non administered remote users are remote
users that are unknown to the local INTUITY
AUDIX system. Non administered remote users
automatically become administered remote users
when the system goes through the remote update
process.
 Verified non administered remote users
I . Verified non administered remote users are
remote users who appear in the local INTUITY
AUDIX database only because they successfully
exchanged messages with the local system.
Installation of Remote Administration Service
 Microsoft Windows Millennium Edition (Me) does not
include the Remote Registry service. The Remote
Administration service is included with Windows 95 and
Windows 98
 Both computers involved in Remote Administration
must use the same level of security (either user-level or
share-level security).
Installation Steps:
i) Click Start, point to Settings, click Control Panel, and
then double-click Network.
ii) Click File And Print Sharing. Click both the I want to be
able to give others access to my files and I want to be
able to allow others to print to my printer(s) check
boxes to select them, and then click OK.
iii) In Control Panel, double-click Passwords.
iv) On the Remote Administration tab, click
the Enable remote administration of this
server check box to select it.
v) Set a password for Remote Administration
and then click OK.
How to install in windows server 2008:
I. Click Start, and then double-click Server Manager.
II. If the User Account Control dialog box appears,
confirm that the action it displays is what you
want, and then click Continue. If you are logged
on with an account that is not a member of the
built-in Administrators group, you may be
required to provide administrator credentials and
then click OK.
III.Under Features Summary, click Add Features.
IV. Double-click Remote Server Administration Tools,
double-click Role Administration Tools, double-
click Active Directory Domain Services Tools, and
then click Next.
V. Click Install.
Additional Features
Remote Administration Tools
You can access RSAT by navigating Control Panel ->
Administrative Tools -> Remote Desktop Services.
Features of Remote Administration
 Automated Tasks
Remote administration software that allows you to
automate tasks or jobs will very quickly and effectively
save time. Administration tasks can be automated over
as many computers or servers as required, and even
segmented into individual, group or global levels, to
ensure flexibility.
 Remote Control
The ability to remotely control a networked device is a
must have in any remote administration scenario. This
provides your administrators with the ability to remotely
control any computer, provided it is connected to the
internet.
 Multiple Sessions
By presenting your administrator with the ability to
handle concurrent problems affecting different users’
computers simultaneously, from his own workstation,
desk-side and off-site calls can be dramatically reduced.
This in turn leads to a reduction in resource costs,
human, energy and otherwise.
 Remote Power Control
A more advanced remote administration tool is the ability
to remotely power down, restart or power on a device.
Servers and workstations can be shut down on schedule
to reduce your energy costs, or on demand when required
 Online Inventory
A time consuming task that haunts any IT administration
team is keeping an up to date inventory of all devices on
their network. This job can be cut down considerably by
using a remote administration tool to compile the
inventory instead. Hardware (including: CPU type, hard
disk capacity/usage, RAM capacity/usage, etc) software
(ensuring that all necessary and authorised pieces of
software are installed) and Services, Patches and Hotfixes
can all be monitored and administrated remotely.
Remote Administration Tools
 Definition
A remote administration tool (RAT) is a piece of
software that allows a remote "operator" to control a
system as if he has physical access to that system.
While desktop sharing and remote administration have
many legal uses, "RAT" software is usually associated
with criminal or malicious activity. Malicious RAT software
is typically installed without the victim's knowledge, often
as payload of a Trojan horse, and will try to hide its
operation from the victim and from security software.
The operator controls the RAT through a network
connection. Such tools provide an operator the following
capabilities:
 Screen/camera capture or image control
 File management (download/upload/execute/etc.)
 Shell control (from command prompt)
 Computer control (power off/on/log off if remote
feature is supported)
 Registry management (query/add/delete/modify)
 Hardware Destroyer (over clocker)
 Other software product-specific functions
Remote Administration Tools in Android
AndroRAT - Remote Administration Tool for Android
 Androrat is a client/server application developed in Java
Android for the client side and in Java/Swing for the
Server.
 The name Androrat is a mix of Android and RAT
(Remote Access Tools)
 Features
Get contacts (and all theirs informations)
Get call logs
Location by GPS/Network
Monitoring received messages in live
 Monitoring phone state in live (call received,
call sent, call missed..)
 Take a picture from the camera
 Stream sound from microphone (or other
sources..)
 Streaming video (for activity based client
only)
 Send a text message
 Open an URL in the default browser
 Do vibrate the phone
Remote Administration Tools – Windows 8.1
How to Install ??
 To install RSAT download the executable from the
following
http://www.microsoft.com/enau/download/details.aspx
?id=39296
 Make sure that you download the 64bit or 32bit version
depending on which operating system that you are
running. RSAT will not install if you download the wrong
version.
 Once downloaded, run the installer for RSAT. RSAT is
essentially a Windows Update so the installer will ask if
you want to install RSAT and then ask you to accept the
license agreement. There are no other options that can
be configured.
Easy steps to Access Remote Administration
 Run Server Manager by right clicking the start
menu and selecting search. From search enter in
“server” and run server manager when it appears in
the search results.
 When Server Manager is run for the first time there
will be no servers listed. To add servers, right click
“all servers” found on the left hand side and select
the option Add Servers.
 If you right click on a server, this will display a list
of administration tools including command line tools
that are available on that server taking into account
any roles and features installed on that server. For
example, Active Directory Users and Computers will
connect to any writable Domain Controller which will
generally be that Domain Controller that is closest to
where you are.
 When running one of the admin tools, sometimes
additional options may be hidden from the view. To
see these options, select the menu view and then
select the option “Advanced Features”.
Hacking With Remote Administration Tools
Black Rat
Dark Comet
 There is no doubt that
Dark Comet is the best
Rat ever and a free
RAT too and also the
old one too and still
many users use it
because of its great
functions like in this
rat you dont have to
forward port it has
UNPN function enabled
which automatically
forward your port and
no need to forward
from the router plus it
is the most stable rat
REMOTE ADMINISTRATION TOOL INFECTION
 Remote Administration Tools must be installed on a
target system before they can be used by malicious
persons
 The easiest way for a malicious remote administration
tool to infect your system is to exploit certain ActiveX
controls and other security holes in your Internet
Explorer browser. By browsing insecure websites on
the internet, users may encounter various pop-ups,
which secretly install parasitic RATs on your computer
once clicked upon.
Thank
You !!!
R.Sujaritha 
14PCSA513

More Related Content

What's hot

Lecture 3
Lecture 3Lecture 3
Lecture 3
Education
 
Linux security
Linux securityLinux security
Linux security
trilokchandra prakash
 
An Introduction to Windows PowerShell
An Introduction to Windows PowerShellAn Introduction to Windows PowerShell
An Introduction to Windows PowerShell
Dale Lane
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
Carl Ceder
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
Linux basics
Linux basicsLinux basics
Linux basics
Santosh Khadsare
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Man in the middle attack .pptx
Man in the middle attack .pptxMan in the middle attack .pptx
Man in the middle attack .pptx
PradeepKumar728006
 
Windows Security
Windows Security Windows Security
Windows Security
Pooja Talreja
 
Network management
Network managementNetwork management
Network management
Mohd Arif
 
Cloud computing
Cloud computingCloud computing
Cloud computing
SalehaMariyam
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
Mohamed Loey
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administrator
Aisha Talat
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Remote desktop connection
Remote desktop connectionRemote desktop connection
Remote desktop connection
Jasleen Kaur (Chandigarh University)
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Catch Me If You Can: PowerShell Red vs Blue
Catch Me If You Can: PowerShell Red vs BlueCatch Me If You Can: PowerShell Red vs Blue
Catch Me If You Can: PowerShell Red vs Blue
Will Schroeder
 
Browser Security
Browser SecurityBrowser Security
Browser Security
Roberto Suggi Liverani
 
Community cloud
 Community cloud Community cloud
Community cloud
SNKN-CloudComputing
 

What's hot (20)

Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Linux security
Linux securityLinux security
Linux security
 
An Introduction to Windows PowerShell
An Introduction to Windows PowerShellAn Introduction to Windows PowerShell
An Introduction to Windows PowerShell
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Man in the middle attack .pptx
Man in the middle attack .pptxMan in the middle attack .pptx
Man in the middle attack .pptx
 
Windows Security
Windows Security Windows Security
Windows Security
 
Network management
Network managementNetwork management
Network management
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administrator
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Remote desktop connection
Remote desktop connectionRemote desktop connection
Remote desktop connection
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Catch Me If You Can: PowerShell Red vs Blue
Catch Me If You Can: PowerShell Red vs BlueCatch Me If You Can: PowerShell Red vs Blue
Catch Me If You Can: PowerShell Red vs Blue
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
Community cloud
 Community cloud Community cloud
Community cloud
 

Similar to Remote administration

The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!
Cireson
 
Webhawk as-software
Webhawk as-softwareWebhawk as-software
Webhawk as-software
Divyanisetia
 
remote desktop_control-by_shubhham_patel
 remote desktop_control-by_shubhham_patel remote desktop_control-by_shubhham_patel
remote desktop_control-by_shubhham_patel
Shubham Patel
 
Network_Administration_PPT
Network_Administration_PPTNetwork_Administration_PPT
Network_Administration_PPT
Abhishek Kumar Ravi
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
Concentrated Technology
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
Concentrated Technology
 
Datto RMM Datasheet
Datto RMM DatasheetDatto RMM Datasheet
Datto RMM Datasheet
Thomas Dodds
 
Empower your business with TeamViewer 13
Empower your business with TeamViewer 13Empower your business with TeamViewer 13
Empower your business with TeamViewer 13
Logicom Distribution
 
Romote PC Access
Romote PC Access Romote PC Access
Romote PC Access
Maheshwari Das
 
As4301234238
As4301234238As4301234238
As4301234238
IJERA Editor
 
Desktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 PresentationDesktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 Presentation
desktopalert
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
REMOTE DESKTOP COMPUTER SYSTEMS SERVICING.pptx
REMOTE DESKTOP COMPUTER SYSTEMS SERVICING.pptxREMOTE DESKTOP COMPUTER SYSTEMS SERVICING.pptx
REMOTE DESKTOP COMPUTER SYSTEMS SERVICING.pptx
jorindajose
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
eugeniadean34240
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoring
IAEME Publication
 
Vincent Haynes(Cis516 Assignment Week 9)
Vincent Haynes(Cis516 Assignment Week 9)Vincent Haynes(Cis516 Assignment Week 9)
Vincent Haynes(Cis516 Assignment Week 9)
vhaynes
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
theijes
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
theijes
 
OpManager Review
OpManager ReviewOpManager Review
OpManager Review
guesta265a9
 

Similar to Remote administration (20)

The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!
 
Webhawk as-software
Webhawk as-softwareWebhawk as-software
Webhawk as-software
 
remote desktop_control-by_shubhham_patel
 remote desktop_control-by_shubhham_patel remote desktop_control-by_shubhham_patel
remote desktop_control-by_shubhham_patel
 
Network_Administration_PPT
Network_Administration_PPTNetwork_Administration_PPT
Network_Administration_PPT
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Datto RMM Datasheet
Datto RMM DatasheetDatto RMM Datasheet
Datto RMM Datasheet
 
Empower your business with TeamViewer 13
Empower your business with TeamViewer 13Empower your business with TeamViewer 13
Empower your business with TeamViewer 13
 
Romote PC Access
Romote PC Access Romote PC Access
Romote PC Access
 
As4301234238
As4301234238As4301234238
As4301234238
 
Desktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 PresentationDesktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 Presentation
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
REMOTE DESKTOP COMPUTER SYSTEMS SERVICING.pptx
REMOTE DESKTOP COMPUTER SYSTEMS SERVICING.pptxREMOTE DESKTOP COMPUTER SYSTEMS SERVICING.pptx
REMOTE DESKTOP COMPUTER SYSTEMS SERVICING.pptx
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoring
 
Vincent Haynes(Cis516 Assignment Week 9)
Vincent Haynes(Cis516 Assignment Week 9)Vincent Haynes(Cis516 Assignment Week 9)
Vincent Haynes(Cis516 Assignment Week 9)
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
OpManager Review
OpManager ReviewOpManager Review
OpManager Review
 

Recently uploaded

Orca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container OrchestrationOrca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container Orchestration
Pedro J. Molina
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
Reetu63
 
DevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps ServicesDevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps Services
seospiralmantra
 
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and MoreManyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
narinav14
 
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio, Inc.
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
alowpalsadig
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
kalichargn70th171
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
vaishalijagtap12
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
OnePlan Solutions
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
Luigi Fugaro
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 

Recently uploaded (20)

Orca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container OrchestrationOrca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container Orchestration
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
 
DevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps ServicesDevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps Services
 
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and MoreManyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
 
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 

Remote administration

  • 2.  Remote administration can be broadly defined as any method of controlling, monitoring a networked device from a remote location. However, it is the actual task at hand that usually defines these roles more clearly  Remote administration has developed and evolved over recent years, and is no longer simply about controlling a device over a network, be it local or wide area.  IT assets
  • 3.  Companies are looking for ways to provide cost- effective network access to their remote and mobile employees. For chronic problems PCs, applications as remote assistant “remote administrator” can save time by giving you access and control a remote PC via either a network or a dial-up connection. If your friend’s or relative’s PC is running Windows XP professional, you can access the system remotely for free with a computer running any version of windows, including Windows 95.
  • 4. Types of Remote Administration  Administered remote users Administered remote users are users that you have defined as remote users Defining remote users happens in two ways: I. When you conduct remote updates, non administered remote users become administered remote users. II. When you manually administer a remote user rather than waiting for a remote update.
  • 5.  Non administered remote users I. Non administered remote users are remote users that are unknown to the local INTUITY AUDIX system. Non administered remote users automatically become administered remote users when the system goes through the remote update process.  Verified non administered remote users I . Verified non administered remote users are remote users who appear in the local INTUITY AUDIX database only because they successfully exchanged messages with the local system.
  • 6. Installation of Remote Administration Service  Microsoft Windows Millennium Edition (Me) does not include the Remote Registry service. The Remote Administration service is included with Windows 95 and Windows 98  Both computers involved in Remote Administration must use the same level of security (either user-level or share-level security). Installation Steps: i) Click Start, point to Settings, click Control Panel, and then double-click Network. ii) Click File And Print Sharing. Click both the I want to be able to give others access to my files and I want to be able to allow others to print to my printer(s) check boxes to select them, and then click OK. iii) In Control Panel, double-click Passwords.
  • 7. iv) On the Remote Administration tab, click the Enable remote administration of this server check box to select it. v) Set a password for Remote Administration and then click OK.
  • 8. How to install in windows server 2008: I. Click Start, and then double-click Server Manager. II. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue. If you are logged on with an account that is not a member of the built-in Administrators group, you may be required to provide administrator credentials and then click OK. III.Under Features Summary, click Add Features. IV. Double-click Remote Server Administration Tools, double-click Role Administration Tools, double- click Active Directory Domain Services Tools, and then click Next. V. Click Install.
  • 9.
  • 10.
  • 11.
  • 12. Additional Features Remote Administration Tools You can access RSAT by navigating Control Panel -> Administrative Tools -> Remote Desktop Services.
  • 13. Features of Remote Administration  Automated Tasks Remote administration software that allows you to automate tasks or jobs will very quickly and effectively save time. Administration tasks can be automated over as many computers or servers as required, and even segmented into individual, group or global levels, to ensure flexibility.  Remote Control The ability to remotely control a networked device is a must have in any remote administration scenario. This provides your administrators with the ability to remotely control any computer, provided it is connected to the internet.  Multiple Sessions By presenting your administrator with the ability to handle concurrent problems affecting different users’ computers simultaneously, from his own workstation, desk-side and off-site calls can be dramatically reduced. This in turn leads to a reduction in resource costs, human, energy and otherwise.
  • 14.  Remote Power Control A more advanced remote administration tool is the ability to remotely power down, restart or power on a device. Servers and workstations can be shut down on schedule to reduce your energy costs, or on demand when required  Online Inventory A time consuming task that haunts any IT administration team is keeping an up to date inventory of all devices on their network. This job can be cut down considerably by using a remote administration tool to compile the inventory instead. Hardware (including: CPU type, hard disk capacity/usage, RAM capacity/usage, etc) software (ensuring that all necessary and authorised pieces of software are installed) and Services, Patches and Hotfixes can all be monitored and administrated remotely.
  • 15. Remote Administration Tools  Definition A remote administration tool (RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, "RAT" software is usually associated with criminal or malicious activity. Malicious RAT software is typically installed without the victim's knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software.
  • 16. The operator controls the RAT through a network connection. Such tools provide an operator the following capabilities:  Screen/camera capture or image control  File management (download/upload/execute/etc.)  Shell control (from command prompt)  Computer control (power off/on/log off if remote feature is supported)  Registry management (query/add/delete/modify)  Hardware Destroyer (over clocker)  Other software product-specific functions
  • 17. Remote Administration Tools in Android AndroRAT - Remote Administration Tool for Android  Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.  The name Androrat is a mix of Android and RAT (Remote Access Tools)  Features Get contacts (and all theirs informations) Get call logs Location by GPS/Network Monitoring received messages in live
  • 18.  Monitoring phone state in live (call received, call sent, call missed..)  Take a picture from the camera  Stream sound from microphone (or other sources..)  Streaming video (for activity based client only)  Send a text message  Open an URL in the default browser  Do vibrate the phone
  • 19.
  • 20. Remote Administration Tools – Windows 8.1 How to Install ??  To install RSAT download the executable from the following http://www.microsoft.com/enau/download/details.aspx ?id=39296  Make sure that you download the 64bit or 32bit version depending on which operating system that you are running. RSAT will not install if you download the wrong version.  Once downloaded, run the installer for RSAT. RSAT is essentially a Windows Update so the installer will ask if you want to install RSAT and then ask you to accept the license agreement. There are no other options that can be configured.
  • 21. Easy steps to Access Remote Administration  Run Server Manager by right clicking the start menu and selecting search. From search enter in “server” and run server manager when it appears in the search results.  When Server Manager is run for the first time there will be no servers listed. To add servers, right click “all servers” found on the left hand side and select the option Add Servers.  If you right click on a server, this will display a list of administration tools including command line tools that are available on that server taking into account any roles and features installed on that server. For example, Active Directory Users and Computers will connect to any writable Domain Controller which will generally be that Domain Controller that is closest to where you are.
  • 22.  When running one of the admin tools, sometimes additional options may be hidden from the view. To see these options, select the menu view and then select the option “Advanced Features”.
  • 23. Hacking With Remote Administration Tools
  • 24.
  • 25.
  • 27.
  • 28. Dark Comet  There is no doubt that Dark Comet is the best Rat ever and a free RAT too and also the old one too and still many users use it because of its great functions like in this rat you dont have to forward port it has UNPN function enabled which automatically forward your port and no need to forward from the router plus it is the most stable rat
  • 29. REMOTE ADMINISTRATION TOOL INFECTION  Remote Administration Tools must be installed on a target system before they can be used by malicious persons  The easiest way for a malicious remote administration tool to infect your system is to exploit certain ActiveX controls and other security holes in your Internet Explorer browser. By browsing insecure websites on the internet, users may encounter various pop-ups, which secretly install parasitic RATs on your computer once clicked upon.