【正文】
s application program interface calls Windows API functions to perform the received mand. When the controlled unit receives the data, they begin to send the host puter operation. To do this: Read identification control code _ + implementation of the corresponding control code for a procedure or function to achieve the appropriate API function. 3 Conclusion Although the remote control can easily manipulate the remote puter, to bring a lot of convenience, but it also the resulting security risks. As the market matures remote control, work security bees more important, only solve this critical issue, to really go for remote control applications. 。 it allows the server and Clipboard passed between the client can also be transmitted to achieve mon document. In addition, some set of remote control, data munications and file transfer and other functions into one, with high data transmission efficiency and system security remote control system is being promoted. Development and implementation of the actual needs of the remote control Develop their own remote control, involving the host puter and controlled machines, so the use of Client / Server structure. Delphi programming environment can be used separately on two different puters to be controlled preparation of control and procedures, one for Clientdpr. exe, installed in the controlled machine。s desktop, but also can set different permissions for multiple users so that they are under the authority of the server39。s technical support work remote control methods are: LAN, WAN, dialup Inter way. In addition, some remote control software also supports serial, parallel, infrared port to control a remote machine. Remote control to overe regional differences in the operation brought the inconvenience, make the work to play a greater efficiency. 2 remote control technology Principles of remote control