Is the use of remote access software viable?

  • Thread starter WWGD
  • Start date
  • Tags
    Software
Google.com would not show you while still utilising the powerful search facilities of Google's search.
  • #1

WWGD

Science Advisor
Gold Member
6,724
9,671
TL;DR Summary
Concern about security issues related to programs that allow/provide remote access. Thinking mostly about the likes of RDP and Team Viewer 12
Hi,
The issue of granting/using remote access to a computer came about today re the topic of RDP ( Remote Desk Protocol) and Team Viewer. Obviously some security measures are needed to prevent 3rd party access . Any comments on the level of security needed for a stand alone PC? How about for add ins that provide the remote access but are not the actual RDP?
Edit: I also am considering whether its worthwhile shelling out some extra money for Windows Office ( instead of home) since office includes RDP while home does not. I am considering using it as a client.
 
Last edited:
Computer science news on Phys.org
  • #2
Many corporations routinely use remote desktop software like RDP or VNC. If proper security protocols are followed it would be difficult to crack them.

As an example, some companies have an airgapped internal network and use remote desktop sw to access external company computers connected to the internet.
 
  • Like
  • Informative
Likes Oldman too and WWGD
  • #3
If your not really a techy then Teamviewer may be the easier path to follow. RDP required an inbound connection from the internet and depending on how you configure this at the router's end, you may be unwittingly opening up your home computer to more than you bargained for.

Teamveiwer does not need an inbound connection I believe. It forms an outbound connection to Teamviewer's network and when you connect you do so via Teamviwer's network so you do not need to change anything on your router configuration. Teamviewer when installed properly and not just run in portable mode starts with your computer so you can restart the computer remotely and re-connect to it afterwards.

If your technically minded I would configure a VPN on your home router and VPN into your home network. From there you could just open a regular RDP connection to your home computer, that's the way I do it.
 
  • Like
  • Informative
Likes Oldman too and WWGD
  • #4
RDP is typically used with a VPN.
We've used TeamViewer when we've had customer owned equipment on-site and needed a way for their engineers to access it; our IT department (which are very security conscious) seemed to be happy with this solution as long as the customer's equipment was connected to our "guest" network,
 
  • Like
Likes WWGD
  • #5
Remote Desktop and VPN. Remote client may need to know IP of PC on remote LAN. Also, the remote user's Windows account must specifically be given permission on that PC for remoting in.
 
  • Like
Likes WWGD
  • #6
Thank you all. Is Team Viewer as bad as I've heard in terms of security gaps?
 
  • Like
Likes neutrinospin
  • #7
Not heard anything specifically bad with regard to Teamviewer. All programs have undiscovered holes in the programming but as Teamviewer is under constant support and frequently upgraded I see no reason not to use it, many companies do.
 
  • Like
Likes WWGD
  • #8
Tt
MikeeMiracle said:
Not heard anything specifically bad with regard to Teamviewer. All programs have undiscovered holes in the programming but as Teamviewer is under constant support and frequently upgraded I see no reason not to use it, many companies do.
Thanks, forgot @f95toli had. endorsed it too.
 
  • #9
I use it on mobile also, have it installed on my Mum's phone and Tablet so I can remote in and sort out any problems.
 
  • Like
Likes WWGD
  • #10
MikeeMiracle said:
I use it on mobile also, have it installed on my Mum's phone and Tablet so I can remote in and sort out any problems.
Someone in IT had recommended Google remote as an alternative.
 
  • #11
Even though I use Android I try and avoid Google elseware for privacy reasons, their business model relies on sucking up information about you and using it to feed you adverts. I have no intention of using their services on a PC, I don't even search using Google.com as it tailors results based on what it thinks you want to see.

I use Startpage.com as a browser, they are EU based and keep no data about you or what you search. The plus being they don't index the web themselves, they send the search request off to google so you get back pure unfiltered results. They still have a "filters" section but you can turn off to find all sorts of stuff which Google.com would not show you while still utilising the powerful search facilities of Google's search.
 
  • Like
  • Informative
Likes Oldman too, sysprog and WWGD
  • #12
MikeeMiracle said:
Even though I use Android I try and avoid Google elseware for privacy reasons, their business model relies on sucking up information about you and using it to feed you adverts. I have no intention of using their services on a PC, I don't even search using Google.com as it tailors results based on what it thinks you want to see.

I use Startpage.com as a browser, they are EU based and keep no data about you or what you search. The plus being they don't index the web themselves, they send the search request off to google so you get back pure unfiltered results. They still have a "filters" section but you can turn off to find all sorts of stuff which Google.com would not show you while still utilising the powerful search facilities of Google's search.
Sorry for necropost. Duckduckgo is good too, and does not track you either.
 
  • Like
Likes Oldman too and anorlunda
  • #13
WWGD said:
Thank you all. Is Team Viewer as bad as I've heard in terms of security gaps?
You are right. For example - https://www.cnn.com/2021/02/10/us/florida-water-poison-cyber/index.html

As for me, I usually use SO Viewer ( https://so-viewer.com/ ) or AnyDesk ( https://anydesk.com ).
But SO Viewer seems to be more secure, I made an investigation, it turns out that it encrypt everything and everywhere on users machine. Also it doesn't provide user to create weak passwords for unattended access, it uses some kind of sophisticated algorithm to generate it's own access passwords.
 
  • Like
Likes WWGD
  • #14
neutrinospin said:
But SO Viewer seems to be more secure, I made an investigation, it turns out that it encrypt everything and everywhere on users machine. Also it doesn't provide user to create weak passwords for unattended access, it uses some kind of sophisticated algorithm to generate it's own access passwords.
And when you have a crash are you...?

rtising-p536biuj6pzz12iyuceb28g0ntyxpbr1ux43l76gm4.jpg
 
  • Informative
Likes Oldman too
  • #15
Tom.G said:
And when you have a crash are you...?

View attachment 299997

Yeah, unfortunately if you want to be secured, sometimes you need to be a bit paranoid.
 
  • Like
Likes Oldman too
  • #16
neutrinospin said:
Yeah, unfortunately if you want to be secured, sometimes you need to be a bit paranoid.
Tell us what you are trying to protect yourself from? I'll give two choices.
  1. The US hates you as much as they hate Edward Snowden. They will unleash the full power of NSA to steal your secrets.
  2. Hackers in Russia are looking to steal money by finding 1 million credit card numbers on people's computers.
 
  • Like
Likes WWGD
  • #17
anorlunda said:
Tell us what you are trying to protect yourself from? I'll give two choices.
  1. The US hates you as much as they hate Edward Snowden. They will unleash the full power of NSA to steal your secrets.
  2. Hackers in Russia are looking to steal money by finding 1 million credit card numbers on people's computers.
We just stick to our corporate security rules. We have to use highly secured software or have to use nothing. Nobody wants to be in situation like Florida city's water supply was, when they were using TeamViewer. And I bet the hackers (in Florida city's water supply incident) was just script- kiddies without target.
 
  • Like
Likes WWGD
  • #18
neutrinospin said:
Nobody wants to be in situation like Florida city's water supply was, when they were using TeamViewer. And I bet the hackers (in Florida city's water supply incident) was just script- kiddies without target.
I bet they weren't, and I bet it had nothing to do with TeamViewer either.

All the security breaches I have personal knowledge of were down to some form of phishing or social engineering, or lost or stolen hardware.
 
  • Like
Likes WWGD and anorlunda
  • #19
neutrinospin said:
We just stick to our corporate security rules.
OK, but that seems to contradict your earlier statements. Corporate security rules usually give you no choice on what software to use, and they strongly discourage non-cybersecurity staff from conducting security investigations on their own.

neutrinospin said:
As for me, I usually use SO Viewer ( https://so-viewer.com/ ) or AnyDesk ( https://anydesk.com ).
neutrinospin said:
But SO Viewer seems to be more secure, I made an investigation
 
  • #20
pbuk said:
I bet they weren't, and I bet it had nothing to do with TeamViewer either.

All the security breaches I have personal knowledge of were down to some form of phishing or social engineering, or lost or stolen hardware.
I think you are maybe right. But they will not tell us what was really happening there. We can make only theory about that incident.
But I figured it out, many remote desktop software allow user to create simple passwords which every beginner hacker can brute-force via dictionary. It's very bad idea as for me.
 
  • Skeptical
Likes pbuk
  • #21
anorlunda said:
OK, but that seems to contradict your earlier statements. Corporate security rules usually give you no choice on what software to use, and they strongly discourage non-cybersecurity staff from conducting security investigations on their own.
Yes, that is right. I have direct relation to cybersecurity in my company
 
  • #22
But most attacks (75% IIRC) do not elicit a response (meaning legal action) and are dealt with internally. So how can we reliably talk about security of certain programs/resources?
 
  • Like
Likes pbuk
  • #23
pbuk said:
I bet they weren't, and I bet it had nothing to do with TeamViewer either.

All the security breaches I have personal knowledge of were down to some form of phishing or social engineering, or lost or stolen hardware.
The lesson here seems to be, update and patch, remove outdated programs and don't forget there are plenty of black hats stealing login info and tokens. That is how the solar winds hackers got busted, using a stolen token to register a new device on the attackers network.

Here's a few links on the topic to discuss.
https://itsg.com/cybersecurity/why-cybersecurity-experts-hate-teamviewer/
https://www.cnn.com/2021/02/10/us/florida-water-poison-cyber/index.html
And then there's RDP. (and too many more to mention)
https://www.beyondtrust.com/blog/entry/what-is-rdp-how-do-you-secure-or-replace-it
 
  • Like
Likes WWGD
  • #24
WWGD said:
But most attacks (75% IIRC) do not elicit a response (meaning legal action) and are dealt with internally. So how can we reliably talk about security of certain programs/resources?
Exactly! Only we can do here is using the most secure software at current time (it helps to reduce amount of attack vectors) update frequently and always be ready for potential attack.
 
  • Like
Likes Oldman too and WWGD

1. What is remote access software and how does it work?

Remote access software is a type of technology that allows users to access and control a computer or network from a remote location. It works by establishing a connection between the two devices, usually through the internet, and transmitting data between them.

2. Is remote access software safe to use?

The safety of remote access software depends on the security measures in place. It is important to use a reputable and secure remote access software, as well as implementing strong passwords and other security protocols to protect the connection. It is also recommended to only grant access to trusted individuals.

3. What are the benefits of using remote access software?

Remote access software offers numerous benefits, such as increased flexibility and productivity, as it allows users to access their work or personal computer from any location. It also reduces the need for physical travel, saving time and money. Additionally, it can facilitate remote technical support and troubleshooting.

4. What are the potential drawbacks of using remote access software?

One potential drawback of using remote access software is the risk of security breaches if proper precautions are not taken. It also requires a stable internet connection, which may not always be available. Furthermore, some remote access software may have limited features or compatibility with certain devices, limiting its usefulness.

5. In what situations is remote access software most useful?

Remote access software can be useful in a variety of situations, such as when working from home or on the go, providing technical support to remote users, and accessing files or programs on a different computer. It is also commonly used by businesses to allow employees to work remotely or access company resources from outside the office.

Suggested for: Is the use of remote access software viable?

Back
Top