Implementation of Windows 98 Remote Control
Updated: November 3, 2006 00:00:00 Author:
A friend of the author works a lot of work in the unit where he works through a local area network. Because he is a network maintenance officer in the unit, he often finds that some computers have system instability, crashes, and application software cannot be used because of incorrect operation of users. Because the optical drive is not easy to use, the computer cannot install the operating system and other application software normally. What should I do now? Sharing is certainly a way, but it is not the safest. In fact, there is another better method. What I want to introduce to you here is a more ideal method - using remote control to realize file sharing. The following operations take the example of both computers being Windows 98 systems. 1. Settings Set the controlled party. Because it is using a LAN and is in the same domain, it is necessary to fill in the user, password and domain first to enter the domain where it is located. Enter the "Control Panel" to open the "Password" option, click the "Remote Management" tab, tick the "Enable Remote Management of this Server" option, and enter the control password in the Password and Confirm Password column. Tip: People who don’t know the password cannot control the computer. After setting this item, you can set up remote control with peace of mind. Set the control party。 Also, you must first enter the domain you are in, then enter the "Control Panel" to open the "Add/Remove Programs" option, select the "Windows Installer" tab, tick "System Tools", click "Detailed Information" to enter, tick "Network Monitor" in the "System Tools" component, and click "OK". Tip: If you need Windows 98 system files, please put the Windows 98 installation CD into the optical drive. 2. Use Click "Programs → Accessories → System Tools" to open the network monitor. After entering the network monitor, click "Server → Select Server" in the menu bar, enter the remotely controlled computer name in the prompt bar of the page that appears, or click Browse to find this computer. After confirming, a prompt box will appear, asking you to enter your password. The password here is the password you set on the computer you are under control. At the same time, the checkmark "Please save password to password list" will be removed under the prompt box. Tip: If you sign it, other people can remotely control the computer next time without entering a password. At this time, you can see that you have connected the controlled computer. You can see "1 Connect to \\XX" on the title bar (XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX From your online neighbors, you can see that all the hard drives of that computer are completely shared, but at this time, other computers in the same domain cannot see any trace of the sharing of this computer. Now you can copy the required files to the controlled computer. Tip: After solving the problem, be sure to uninstall "Network Monitor". The method is to go to "Control Panel → Add/Remove Programs → System Tools" and remove the hook in front of "Network Monitor". Summarize Through the above three methods, we can see how the three commonly used desktop operating systems can realize remote control. If you master these skills proficiently, you can seek help from each other on the Internet, which will also facilitate and solve the difficulties we encounter in actual use. In fact, in addition to the functions that come with the system itself, remote control can also be implemented through some tool software, such as Glacier, Red Spider, Pcanywhere, Netmeeting, RemotelyAnywhere, etc.
Related Articles
Kingsoft Anti-Virus 20041219_Daily
Kingsoft Anti-Virus 20041219_Daily...2006-11-11Anti-virus is not safe. What else should I prevent from network security?
Anti-virus is not safe. What else should I prevent from network security?...2006-11-11Kingsoft Anti-Virus 20041224_Daily
Kingsoft Anti-Virus 20041224_Daily...2006-11-11BBS3000 Vulnerability
BBS3000 vulnerability...2006-11-11Antispyware from Microsoft AntiSpyware
Antispyware produced by Microsoft AntiSpyware...2006-11-11Kingsoft Anti-Virus 20041226_Daily
Kingsoft Anti-Virus 20041226_Daily...2006-11-11How to share ADSL under WIN2000
How to share ADSL under WIN2000...2006-11-1149. Log in to NTS4.0 server from DOS workstation
49. Log in to the NTS4.0 server from the DOS workstation...2006-11-11System Security: Talking about Windows Service Backup
System Security: Talking about Windows Service Backup...2006-11-11IT World and Kingsoft Weekend Joint Forecast 1218
IT World and Kingsoft Weekend Joint Forecast 1218...2006-11-11