Many of us are often faced with a situation when it is necessary to gain access to a computer, which we usually use at home. There can be many reasons for this, for example, you need to download a file from your home archive. But only a smartphone or someone else's / work computer is at hand. There are many ways to get this access.
Let's start with the most common programs and end with methods that don't require any third-party programs at all.
I would like to note that we will not consider IPMI modules and motherboards with IPMI support as part of the article, since this requires additional financial costs. But if your motherboard supports this technology, we advise you to read the user manual. Remote access to the machine will be much more functional than the methods described below.
Team Viewer
When it comes to remote access, most users are referring to this program. The name has become a household name for a reason - the program is simple to use and does not require any special settings or a white IP address.
1. You need to install this program on your home computer. This is done very simply: upon a corresponding request in a search engine, go to the official website, download the full distribution kit (not QS!) And install it with the option "install to control this computer remotely" and "personal non-commercial use".
2. After installation, you need to create an account in the Team Viewer system. This is necessary so that from anywhere you can enter your credentials into the program and gain access not only to the computer at home, but also to other necessary devices (the Team Viewer functionality allows you to do this).
3. After creating and confirming an account, you need to enter it (section "Contacts in the program interface") and link Team Viewer to the account, providing easy access (there is a corresponding inscription in the main program window).
4. Next, you need to decide on the device from which you need to have remote access. Let it be a telephone. In this case, you also need to install TeamViewer from the app store. After that, you must enter the credentials previously registered on the computer and access to contacts will appear, among which there will be a previously configured computer.
Remember that the use of this program for commercial purposes is prohibited not only by the rules of the agreement, but also technically: if the algorithm notices many connections and realizes that the program is not being used for personal purposes, the blocking of connections will turn on, the interval of which will increase with such use.
Any Desk
An excellent alternative to Team Viewer, which does not require installation on a PC (but has such an option).
1. Similarly to Team Viewer, go to the official website and download the application. It does not require installation, so the program can be launched immediately after downloading.
2. After launch, you can immediately see the intuitive text - your workplace is available at this address. You should write down the indicated numbers, because by this ID we will receive remote access.
3. Next, you should go to the program settings, on the "Security" tab and provide uncontrolled access there by inventing and writing down a password. It will be required in the future.
4. On the remote machine from which access will be carried out, you must complete step 1, then enter the home computer ID and password in the main window of the program. The screen of the remote machine should load.
RDP access
The difference between this method and the previous ones is that it does not require downloading any programs - as a rule, this technology is present in most modern Windows systems (Linux also has such an option). But RDP access requires a white IP address (in other words, one that is "visible" from the Internet). The details of this question can be checked with your provider, as well as address forwarding behind NAT. Without this, RDP access will not work. But having configured everything in the necessary way, it will be possible to get the most direct access to the machine, bypassing all third-party programs and services, as a result of which we get excellent performance and functionality.
1. We configure RDP on the home machine. First, let's check the Windows firewall. To do this, go to find the Windows Defender Firewall (can be found in the Network and Sharing Center), and the option "Allow interaction with the component ….". There it is necessary to open access opposite "Remote control of the desktop" by putting two corresponding checkboxes.
2. Go to computer properties and configure remote access. Here it is necessary to allow remote connections by adding a user under which we will gain access.
3. For access, you need to know your IP address. Usually this is not difficult, it is enough just to look at one of the resources on the network or check with the provider. On the desired machine, we are looking for a program for connecting to a remote desktop (can be found in the search), where we write the IP address of our home machine. If everything is configured correctly, then the program should ask for a login and password. We enter the credentials of the home computer (specifically, the user who was allowed access). After authorization, the PC screen will appear. You can also install the appropriate program on your mobile phone. After installation, the setup procedure is the same as this step. The mobile app works very well and scales the screen comfortably.
SSH
If you see these 3 letters for the first time, you can skip this step, because it mainly affects not Windows, but NIX systems. This method also requires a white IP address. In general, SSH is an excellent technology that allows you to get secure real-time access to a remote unix machine. Setting up SSH is very distro dependent. If you have CentOS, then most likely there will be no problems, ssh should be present in the system libraries and is available on port 22. If it's Debian or Ubuntu, then you should make sure that openssh is present (you can optionally select it when installing the system). In most cases, it is convenient to manage the server under the root user, but by default this authorization is closed on debian systems, so you should configure it.
1) Open the configuration file with the command sudo nano / etc / ssh / sshd_config (any editor will do)
2) Uncomment the Permit Root Login line and change the value to yes, then save the file
3) Restart the service with the command service sshd restart
The system will re-read the new settings and you can connect to the machine. The most common SSH program is Putty. It can be downloaded from the Internet without any problems, does not require installation and takes up very little space. In handling, it is just as simple: we drive in the IP address of the computer and click connect (the IP address in unix can be found with the "ip a" command). Note that the default port is 22, just like in the system. It is highly recommended to change the connection port in the configuration file, otherwise hundreds of bots will "knock" on your computer and scan the Internet using standard ports.
On a note
All described functions are present in the specified form only at the time of this writing. Do not forget that developers are constantly optimizing software, adding, removing or renaming functions. In this regard, it is recommended to understand the general technology of remote access and the principles of configuration, then they can be applied in most programs, because the mechanism of work is very similar everywhere.
Conclusion
Computer networks in our time are the foundation of the work of all technologies. They simplify the transmission and reception of the necessary data, therefore, having mastered the above methods, you can significantly optimize your work, expanding the storage and organizing their efficient processing.