Software for local network operation. Local network remote control programs. Creating an access point with Virtual Router

Today on forums you can increasingly find topics such as “Suggest programs for system administrators”, “Which network programs are better”, “Help me choose programs for a network consisting of N number of computers, servers and such and such number of users”, etc. .d. What is the meaning of the concept of “network programs” and what are they for?

Network programs is software responsible for the stable operation of an organization’s computer park. I think there is no point in explaining that all computers in the organization must be part of a common local network, which is why programs of this kind are called network programs.

The network performs in the company two main functions. Firstly, it allows the company's employees to work as a single team. And, secondly, the network helps to use available resources more efficiently and helps share limited or expensive resources among employees. For example, a printer for each workplace is expensive and ineffective. Sharing a printer on a network saves on hardware costs.

Network programs are designed to solve many tasks and problems related to the network, such as: problems with equipment, hardware and software, ensuring company information security, equipment inventory, organizing a common enterprise file system, and much more. And although the variety of computer networks is now enormous, the problems that arise everywhere are approximately the same. Network programs are designed to deal with them as quickly as possible.

It is necessary to protect the network, first of all, from external threats: hacker attacks, viruses, sniffers, etc. But most importantly, the system administrator sometimes has to protect the network from internal users. Some people think that since they have been given a personal computer, access to the Internet and access to documents, they can perform various actions without being subject to any criticism or punishment. Well, for example, download a couple of films. So what, the Internet in the organization is unlimited, more gigabytes, less gigabytes, what's the difference? Or take a brand new video card home and put your old one in its place. Anyway, no one will see, which means no one will know. Network programs will find out.

You can harm the system unconsciously, without any second thought. For example, bring infected files from home on a flash drive and drop them into a shared folder. Viruses have the dangerous property of spreading across the network at the speed of light, and protection against them usually appears a day or two later. Information security specialists have already realized that it is pointless to always catch up with hacker technologies; computer attackers are always one step ahead. Therefore, new techniques are increasingly based on the preventive detection of violations in information systems.

In order for an administrator to be aware of everything that is happening in his computer park, network programs must respond to everything unusual on the network. For example, if the response time of any equipment is exceeded, because this may indicate either a breakdown or a failure of a service important for the operation of the equipment.

Network programs must respond to exceeding the traffic limit allocated to an organization or office, or to a drop in Internet connection speed. There can be many reasons for these phenomena: from a not very conscientious employee who downloads movies and downloads a channel during the working day, and problems with network equipment, to a not too honest provider.

Most often, in organizations, network programs are designed to help the system administrator or IT manager take inventory of equipment and supervise it. In this case, when it comes to the company’s intangible assets, its property, it is important to notify the system administrator about any problems that have arisen. After all, we are talking about the honesty and reliability of employees!

From all of the above, a completely obvious conclusion follows: network programs are designed not to prevent equipment breakdowns or solve all problems that arise on the network, but to warn the administrator in time about a problem that has arisen - even before complaints from users that “ doesn’t work”, “doesn’t come in”, “slows down”.

Size: 56.57 Mb, Eng, Cracked

DameWare NT Utilities - remote management of corporate systems on the Windows NT/2000/XP/2003/Vista platform, allowing administrators to bypass the limitations of Microsoft Management Console (MMC). DNTU includes a large number of Microsoft Windows NT administration tools, combined under one common centralized interface, and allows you to remotely manage Windows servers and workstations. Almost all of the standard utilities included with DNTU are accessible through an Explorer-style interface, and most have been enhanced to provide superior performance, added functionality, and ease of use.

TeamViewer 7.0.14563 Final RePack by elchupakabra

Size: 5.55 Mb, Rus, Free

TeamViewer (teamviewer) is a software package for remote control of computers, file exchange between control and managed machines, video communications and web conferencing. TeamViewer runs on Windows, Mac OS X, Linux, iOS and Android operating systems. In addition to a direct connection, access is possible through a firewall and NAT proxy, and it is possible to gain access to a remote machine using a web browser. TeamViewer GmbH was founded in 2005 in Germany. According to company press releases, TeamViewer is used on more than 15 million computers operating in 50 countries.

Updated version from 10/13/2012!

Hamachi 2.1.0.215

Size: 3.7 Mb, Rus, Free

Hamachi is software designed to build a VPN. Hamachi allows you to create your own secure network of computers connected via the Internet, as if they were connected by one physical local network. Hamachi allows you to create a local area network (LAN) on top of the Internet. Most often, Hamachi networks are used to connect servers with gray IP and client computers. By the way, this method significantly complicates the decryption of client traffic. Any applications that run over a local network can run over Hamachi networks, while the transmitted data will be protected and the exchange between them will be carried out in a peer-to-peer style.

10-Strike LANState Pro 6.11

Size: 13.34 Mb, Rus, Cracked

LANState Pro is a program for administering and monitoring servers, computers, and other network devices. The program can be useful for administrators and ordinary users of Microsoft Windows networks. Using LANState, you can monitor the current state of the network in graphical form, changing in real time, manage servers and workstations, and monitor remote devices by periodically polling computers. The monitoring mechanism with alarms allows you to receive timely alerts about various events - network problems, lack of space on servers, service failures, and so on.

MyLanViewer 4.9.3 + Rus

Size: 4.68 Mb, Rus/Eng, Cracked

MyLanViewer 4.9.3 - A program for scanning and monitoring computers on a network, with the ability to search for publicly available files in their shared resources. It shows computers in an easy to view view that contains the computer name, IP address, MAC address, shares and other details for each computer. Using it, you can monitor computers on the network and receive an alert when the state of one of them changes. You can also see and manage your shared resources, deny them and close sessions to them. The program is easy to install and use, has a friendly and beautiful interface. After replacing the file, enter any registration data.

NetSetMan 3.0.2

Size: 2.82 Mb, Rus, Free

NetSetMan 3.0.2 - A new version of NetSetMan has been released, a free program that allows you to quickly switch between six different network configurations. The program will be especially useful for those who often switch from one network to another, because every time you need to connect to one specific network, you have to set the settings it needs. NetSetMan allows you to set parameters such as IP address, subnet mask, gateway, DNS server, computer name, workgroup, running scripts (BAT, VS, JS, ...), default printer, etc. in each configuration ., and then switch between them in one click.

Radmin 3.4 RePack

Size: 15.23 Mb, Rus, Free

Raadmin 3.4 (Remote Administrator 3.4) - A program for remote computer management, allows you to work on a remote computer as if it were your own: its desktop will appear on your monitor screen (in a window or full screen), and your mouse and keyboard will replace the mouse and keyboard controlled computer. The Radmin program works so quickly that it allows you to control a remote computer even through a modem - the update rate even in this case can reach 5-10 frames per second; if the work is carried out via a local network, then it is possible to achieve real update time (about 100 - 500 frames per second). Russian and English versions of Radmin Server 3.4, which do not require

Radmin 3.4 RePack + Network Utilities

Size: 23.94 Mb, Rus, Free

Radmin 3.4 (Remote Administrator 3.4) - This is a remote access system that allows you to work on a remote computer. You see the remote computer's screen in your own window or on its full screen. Your mouse or keyboard movements are transmitted to the remote computer. The Radmin program works so quickly that it allows you to control a remote computer even through a modem - the update rate even in this case can reach 5-10 frames per second; if the work is carried out via a local network, then it is possible to achieve real update time (about 100 - 500 frames per second). Russian registered version!

Lizard Systems Network Scanner 3.0.1 Build 135

Size: 2.06 Mb, Rus, Free

Network Scanner 3.0.1 - Allows you to scan your network and create a list of all machines currently connected to the network, with their IP addresses and host names. The program can scan each device for NetBios resources and\or HTTP and FTP server services and allows you to connect to context menu resources. Other features include multi-stream scanning for quick results display and export to html, txt and xml formats. Previously, the program was released under the name LanScope. The program remains free for home users, although free registration is now required.

Size: 14.8 Mb, Rus/Eng, Cracked

MyLanViewer 4.7.2 - A program for scanning and monitoring computers on a network, with the ability to search for publicly available files in their shared resources. It shows computers in an easy to view view that contains the computer name, IP address, MAC address, shares and other details for each computer. With it, you can monitor computers on your network and receive an alert when the status of one of them changes. You can also see and manage your shared resources, deny them and close sessions to them. The program is easy to install and use, has a friendly and beautiful interface.

Size: 3.94 Mb, Rus/Eng, Cracked

MyLanViewer 4.5.8 - A program for scanning and monitoring computers on a network, with the ability to search for publicly available files in their shared resources. It shows computers in an easy to view view that contains the computer name, IP address, MAC address, shares and other details for each computer. With it, you can monitor computers on your network and receive an alert when the status of one of them changes. You can also see and manage your shared resources, deny them and close sessions to them. The program is easy to install and use, has a friendly and beautiful interface.

MyLanViewer 4.5.2 + Rus

Size: 3.72 Mb, Rus, Free

MyLanViewer 4.5.2 - A program for scanning and monitoring computers on a network, with the ability to search for publicly available files in their shared resources. It shows computers in an easy to view view that contains the computer name, IP address, MAC address, shares and other details for each computer. With it, you can monitor computers on your network and receive an alert when the status of one of them changes. You can also see and manage your shared resources, deny them and close sessions to them. The program is easy to install and use, has a friendly and beautiful interface.

MyLanViewer 4.5.0 + Rus

Size: 3.92 Mb, Rus, Cracked

MyLanViewer 4.5.0 - A program for scanning and monitoring computers on a network, with the ability to search for publicly available files in their shared resources. It shows computers in an easy to view view that contains the computer name, IP address, MAC address, shares and other details for each computer. With it, you can monitor computers on your network and receive an alert when the status of one of them changes. You can also see and manage your shared resources, deny them and close sessions to them. The program is easy to install and use, has a friendly and beautiful interface.

Size: 4.09 Mb, Rus, Free

MyLanViewer 4.3.0 - A program for scanning and monitoring computers on a network, with the ability to search for publicly available files in their shared resources. It shows computers in an easy to view view that contains the computer name, IP address, MAC address, shares and other details for each computer. With it, you can monitor computers on your network and receive an alert when the status of one of them changes. You can also see and manage your shared resources, deny them and close sessions to them. The program is easy to install and use, has a friendly and beautiful interface.

Radmin 3.4 + Network Utilities

Size: 6.82 Mb, Rus, Cracked

Radmin 3.4 (Remote Administrator 3.4) - Remote administration programs for the Windows platform, which allows you to fully work on several remote computers at once using a conventional graphical interface. Along with support for the NT security model and localization into any languages, it is possible to work in file exchange and Telnet modes, which allows Radmin to be considered as an integrated solution for remote management of an organization of any size.

UserGate Proxy & Firewall 5.2.711

Size: 18.09 Mb, Rus, Cracked

UserGate - A program for connecting local users to the Internet via one external IP address. The proxy server keeps accurate traffic records (NAT), has a built-in firewall, Port mapping, Internet statistics system and Kaspersky Anti-Virus. The built-in firewall prevents unauthorized access to server data and local network by prohibiting connections on certain ports. The firewall functionality controls access to the necessary ports, for example, to publish a company's web server on the Internet.

Local networks are no longer something unusual, as they were at the dawn of their creation. The advantages of such networks are obvious. Users of computers connected to a single local network will have access to shared files and folders and can easily exchange necessary information, edit documents, play games using command modes, etc. However, this only applies to computers that are connected to each other using wires and quite a large amount of “iron” equipment. But what to do when the computers are quite far from each other? This is where software products for creating virtual local networks come to the rescue. Among them, quite often there are completely free programs. Downloading free programs for creating local networks and installing them on your computer is not a problem now. As they say, there would be a desire. Among the free burnouts for local networks of such applications, two main types can be distinguished. The first type allows you to create a virtual private network in such a way that one of the computers will act as a server. And this also includes programs that use computers alternately as the main server. Data exchange in this case is carried out using P2P (peer-to-peer) technologies, that is, using the universal BitTorrent protocol. The second type includes programs where the role of the central server is performed by a remote server of the software manufacturer. Here you only need to register on the manufacturer’s website. If we talk about free programs of this kind, then, in comparison with paid analogues, they allow you to create networks with the connection of about one and a half dozen computers or accounts. It is clear that paid analogues can create networks connecting even several hundred computers. However, for home use or small offices, 15-20 users are completely sufficient. It must be said that networks created using such applications have all the capabilities of conventional wired networks. And the setup, in most cases, is very similar. The difference in such programs may also be that sometimes one computer is bound to only one specific IP address. In some other cases, the IP address may be assigned automatically. To work on such a network, you will only need a program installed on your computer. Some free programs for creating private virtual networks even allow you to use the registration data of many Internet messengers, for example, Jabber accounts. However, the capabilities of such programs are quite similar. Some additional features may differ, such as the presence of built-in chats or short text messaging capabilities. It seems that today, virtual networks are still preferable, since they allow computers located even in different parts of the globe to be united into a single network. On our website you can download the most modern programs for creating local networks.

Free network utilities from Nirsoft

    Brief description and links to download a set of utilities from the site nirsoft.net. All programs are distributed free of charge. For almost all utilities, it is possible to download an installation file or a portable version of the program, packaged in a zip archive. At the end of each page describing the program on the nirsoft.net website there is a link to download support packages for various languages, including Russian. The Russification process is very simple - unzip the language support archive and copy the resulting ini file to the directory with the program.

CurrPorts CurrPorts(cports.exe) is a program for monitoring network connections. Allows you to view a list of active connections and open TCP/IP and UDP ports on a given computer. For each port, information about the process that opened the port is displayed, including the name, path to the executable, version and additional information, when the process was created, and the user account that created the process.
Additionally, CurrPorts allows you to close an unwanted connection and forcefully kill the process that created it. It is also possible to save monitoring data in HTML, XML, TXT format.
SmartSniff SmartSniff allows you to intercept TCP/IP packets traveling through the selected network adapter and view the intercepted data as a sequence of data exchange sessions between the client and the server. The data can be presented as ASCII text or as a hexadecimal dump.
NetworkTrafficViewNetworkTrafficView is a utility for collecting statistical data about network traffic for the selected adapter. Statistics are displayed on source and destination addresses, ports, protocols, maximum data transfer rates, connection durations, identifiers and names of programs that exchanged data via the TCP protocol.
HTTPNetworkSniffer v1.00 HTTPNetworkSniffer a packet sniffer that intercepts all data exchanged between the browser and the web server via the HTTP protocol. For each HTTP request, information is displayed about the host name (Host Name), HTTP method (GET, POST, HEAD), URL path, User Agent field, Response Code, Response String, Content Type, Referer fields , Content Encoding, Transfer Encoding, Server Name, Content Length, Cookie String, etc.
It is possible to export sessions to the clipboard or text/html/xml/csv file.
AdapterWatch AdapterWatch displays general information about the network adapter - IP address, MAC address (Hardware address), WINS server, DNS server, MTU value, number of received/transmitted bytes, current transmission speed, TCP/IP/UDP/ICMP statistics.
DownTester DownTester- allows you to determine the download speed for web servers, the list of which is specified as a URL manually or in the contents of a text file. The results can be saved in html/xml/csv/text format
Wireless Network Watcher Wireless Network Watcher- a small utility for scanning a wireless network and creating a list of computers and devices connected to it, displaying IP and MAC addresses, network adapter information and computer name. The list can be exported to an html/xml/csv/text file, or copied to the clipboard for further pasting into Excel pages or another application.
NetResView NetResView- a small program for displaying a list of network resources on a local network, including computer names, operating system versions, information about network printers and directories.
PingInfoView PingInfoView a small utility for polling hosts by name or IP address with the ability to set the number and ping intervals. An analogue of the standard console program ping.exe. The results can be saved to an html/xml/csv/text file.
FastResolver FastResolver a small utility for quickly determining host names by IP addresses. For a local network, it allows you to quickly obtain a list of IP and MAC addresses of computers.
BluetoothView BluetoothView is a small program that runs in the background to monitor the activity of Bluetooth devices. For each detected device, the Device Name, Bluetooth Address, device type, first and last detection time are displayed.
BluetoothView can alert the user when a new Bluetooth device is detected with a short beep and a pop-up window.
WirelessNetView WirelessNetView- a small program that runs in the background to detect Wi-Fi wireless networks within the reach of a given computer. For each node, the name, MAC address, signal strength, authentication algorithm, number of channels, etc. are displayed.
IPNetInfo IPNetInfo- a program that allows you to quickly obtain detailed information about a specific IP address. Information about the owner, country, subnet address range, and contact information is displayed.
WhoisThisDomain WhoisThisDomain allows you to quickly obtain information about a registered domain. Automatically connects to the WHOIS server of the corresponding domain and displays the WHOIS record.
DNSDataView DNSDataView- an alternative to the standard console utility nslookup.exe. Allows you to retrieve DNS records for a given domain name. The results can be saved to a text/xml/html/csv file
NetRouteView NetRouteView- GUI analogue of the standard console program route.exe of the Windows OS family. Displays the current routing table and allows you to easily add new routes as well as modify and delete existing ones.

Free network programs Virtual Network Computing (VNC).

    Virtual Network Computing (VNC)- a system for remote access to a computer desktop using the RFB (Remote FrameBuffer) application layer protocol. Control of a remote computer is carried out by transmitting keystrokes on the keyboard and moving the mouse pointer from one computer to another through the network. The managed computer uses the VNC server part (VNC server), and the manager uses the client part (VNC viewer). VNC is independent of the systems in which it operates and, for example, a Linux client can connect to a VNC server running in a Windows environment. There are also VNC implementations for Java, including for mobile phones.

The RFB protocol was developed relatively long ago and initially used a simple encoding method to transmit the screen buffer Raw Encoding- when the server transmitted screen points to the client in order from left to right and top to bottom. After transmitting the first buffer, in order to minimize traffic, only changed pixels were transmitted. With this encoding method and a small degree of image change, traffic is minimal, however, for example, when watching a video, the load on the transmission channel increases sharply, since almost all pixels in the screen buffer will change. To minimize exchange traffic, VNC systems began to use various methods of encoding and compressing transmitted data. Not all methods are standard for every VNC implementation. While the RAW Encoding method can be used in any VNC system, the specific methods (CopyRect, Zlib, CoRRE, etc.) depend on the software used and may differ for different versions of VNC. The client and server agree on the possibilities for encoding transmitted data when establishing a connection.

By default, the range of TCP ports from 5900 to 5906 is used for data exchange via the RFB protocol. Each port corresponds to its own graphical server screen (in Linux - terminals 0 - 6 of the X server, in Windows - the desktop with display number 0 and TCP port 5900 ). In some VNC implementations, it is possible to connect back from the server to the client via TCP port 5500.

Many free VNC implementations have a commercial version that provides additional features for ease of use, increased security, and performance.

One of the simplest and most convenient representatives of the VNC family is RealVNC. The product is available in 3 versions:

- Free Edition- free version with support for basic server and client capabilities.
- Personal Edition- paid version for use at home and in small businesses. Added data encryption capabilities, chat, remote printing.
- Enterprise Edition- commercial version with improved authentication, data encryption, remote printing, chat, file transfer.

The installer includes both server and client parts. The server can be configured to run in user mode (User-Mode) or as a system service (Service-Mode). In system service mode, the server starts automatically when Windows boots. In this mode, the VNC server is ready to accept incoming connections without the user logging in or taking any action. In user mode, the server is started manually or via autostart, like a regular application program.

The VNC server is configured either by calling the context menu by right-clicking on the icon in the Windows taskbar (menu item "Options"), or by launching using shortcuts in the "Programs" menu - "RealVNC" - "VNC-Server: " - "Configure VNC Server" . During the server configuration process, minimal settings are made - authentication method and password for connection (tab Authentication):

No Authentication- the password request when connecting the client to the server is not performed.
VNC Password Authentication- connection to the server with verification of the password specified in the server settings. The password is set when the button is pressed Configure. Many free versions of VNC use an 8 character password. If you specify a longer password, the first 8 characters will still be used for verification, which makes such a server very vulnerable to hacking using password guessing. Moreover, the number of password entry attempts is not checked. In paid versions, security is significantly improved, since you can use long passwords, data encryption and access verification using Windows tools ( NT Logon Authentication mode)

Connection settings are made on the tab Connections:

Accept connection on port- accept connections on TCP port 5900. The port number can be changed if necessary.
Disconnect idle client after (seconds) - client inactivity time in seconds, after which the connection will be reset.
Serve Java viewer via HTTP on port- serve connections from a Java client connecting via HTTP to port 5800. When using this configuration item, connecting to a VNC server is possible in a browser window with Java support.
In field Access Control You can set connection processing rules for individual IP addresses or subnets. For each entry, there are 3 options for a predefined action:

Allow- Allow connection. In the window with a list of addresses, it is displayed with the sign + before the address.
Deny- Deny connection. In the window with a list of addresses, it is displayed with the sign - before the address.
Query- Issue a request for connection permission.. In the window with a list of addresses, it is displayed with a sign ? before the address.

Client connection service modes are configured on the tab Sharing:

Always treat new connection as shared- always treat a new connection as shared.
Never treat new connection as shared- never treat a new connection as shared.
Use client's preferred sharing settings- use client settings to define a shared connection.
Non shared connection replace existing ones- a non-shared connection replaces an existing one. When this mode is installed, a new client connects with the sign of a non-shared connection, the server will reset all other connections. To connect multiple clients to one server, the checkbox must be unchecked.

Tab Desktop defines the parameters for processing the desktop buffer when VNC clients connect, and the actions performed after the last one is disconnected from the server. .

While connected- actions when connecting a client to a VNC server
Checking the checkboxes for each of the fields reduces traffic when sharing the desktop buffer, but simplifies its appearance a little. It is advisable to enable it when the speed of the data transmission channel is low.

When last client disconnects- when the last client disconnects.
- Do nothing - do nothing.
- Lock Workstation - lock the desktop. The user's session does not end, but a user name and password must be entered to continue using the desktop.
- Logoff user - log the user out of the system.

Tab Modes Inputs define the interaction between the client and the server when processing keyboard and mouse events. The "Disable local inputs while server in use" mode disables the keyboard and mouse on the remote computer when connected to the VNC server.

Tab Capture method sets the desktop image processing mode when transferring data from the server to the client and the processing of transparent windows (Alpha - blended windows). Changing modes affects the amount of traffic between the client and server, as well as the degree of CPU resource utilization when processing the desktop buffer.

RealVNC server settings are stored in the registry key HKLM\SOFTWARE\RealVNC\WinVNC4

Client Real VNC Viewer After launch, it displays a window for connecting to the server. The input field uses the name or IP address of the remote computer, and, if necessary, the port number, for example 5909:

Button Options allows you to configure modes for the RealVNC client part. There is a tab in the settings window Load/Save with which you can save the current settings to a file with the extension .vnc or load previously saved settings from a file. This allows you to have multiple settings profiles for connecting to different VNC servers. The default settings are designed for average performance and average desktop display quality.

Tab Color & Encoding allows you to select the data encoding mode when transferring the desktop buffer and its color depth. It is possible to select one of 3 preferred encoding types or set the mode Auto Select- when the selection is made automatically when a connection to the VNC server is established.

Color depth Color Level determines the quality of the remote desktop display and the amount of data transferred from the server to the client. Minimal traffic and worst image matches the mode Very Low (8 colors

Tab settings Inputs are in many ways similar to the server settings and relate to the parameters of input devices - keyboard and mouse

Field Menu Key- defines a special key to call the menu for client interaction with the remote desktop. Used to pass special key codes (CTRL, ALT, CTRL-ALT-DEL:) The default menu key is F8. In addition to transmitting special key codes, pressing F8 allows you to call up the client settings menu, go to full-screen mode, create a new connection and view information about the current one (Connection Info:). Information about the current connection includes the IP address and name of the remote server, screen resolution, pixel format, encoding method, protocol used, and approximate data transfer speed.

    To install the server part on a remote computer, you can use a free utility pushVNC. The program allows system administrators to install a VNC server on a remote computer over a local network without any end user intervention.

An account with administrator rights is required to connect to a remote computer. In addition, the hidden network resources ADMIN$ and IPC$ must be accessible on the remote computer and the Remote Registry Management service must be running. The program copies several of its files to create a VNC server to a remote computer, registers a new PushVNC service in the registry and launches it. A normal client connection is then made to the remotely created server. If the mode is not set Leave Service, then after the session ends, the created server and the files copied over the network are deleted.

RealVNC is one of the simple and convenient free VNC implementations. In addition to it, there are several dozen more, differing to an insignificant degree. For example, the popular UltraVNC package has almost the same settings as RealVNC, but allows you to use a greater number of data encoding methods, encryption even in the free version, you can use a special proprietary driver to process the desktop buffer. And just like RealVNC, the UltraVNC server in the free edition truncates the password to 8 characters. Below are links and a brief description of free VNC implementations on the SourceForge project.

Programs of the VNC family of the SourceForge.net project

    SourceForge.net is one of the world's largest websites for open source software developers, operated by SourceForge, Inc. and uses SourceForge's proprietary system. On this site, developers can post and collaborate on their software projects. SourceForge.net hosts more than 230 thousand projects, and the number of registered users is about 2 million people.
Many projects published on sourceforge.net have their own website, a link to which is located on the page with a brief description of the software product.

TightVNC- the most popular product of the VNC family, an improved implementation with “Tight” encoding, which reduces traffic between the client and server, and the ability to transfer files.
TigerVNC- VNC implementation based on the refinement of the TightVNC and TurboVNC projects. Features improved JPEG compression.
EchoVNC- implementation of a VNC client with improved security. There is support for connections to VNC, Remote Desktop, and RAdmin servers. An extended toolbar allows you to optimize your work with the selected server.
Flashlight-VNC- client (VNC Viewer), written in Flash.
Flashlight VNC Recorder- addition to the project Flashlight VNC with the ability to record the session.
Delphi VNC Server VNC server written in Delphi.
MultiVNC VNC client with support for a large number of data encoding methods
LightVNC implementation of a VNC server only supporting connections via HTTP and HTTP(S) protocols. A web browser is used as client software. Allows you to connect to a remote desktop for devices that do not have a VNC client - smartphones, game consoles, tablet computers.
ThinVNC is a VNC implementation using HTML5 and AJAX technology. A browser with HTML5 support must be used as a client - Mozilla FireFox, Chrome, Opera.
pushVNC7- remote installation over a local network and launching a VNC server on Windows 7 workstations. Implementation of the pushVNC project for Windows 7.
A simple set of tools for installing UltraVNC on a remote computer without any user action and without being noticed by the user.

Programs necessary for working on the Internet, including for browsing websites, receiving and sending mail or text messages, as well as for transferring files over the Internet.

    Browsers

Browsers are special programs for viewing Internet pages.

    Messengers

Programs for communication and communication over the Internet or local networks.

    Mail clients

Programs for sending and receiving email.

    Download Managers

Programs for managing file downloads, allowing you to resume them in the event of a connection break.

    p2p clients

Programs for receiving files from networks using p2p technology.

    FTP clients

Programs for transferring files via FTP.

    Browser Add-ons

Various programs that are built into browsers and expand their functionality.

10. Classification and characteristics of computer viruses. Methods of protection against computer viruses.

Computer virus is a specially written, small-sized program (i.e., a certain set of executable code) that can “attribute” itself to other programs (“infect” them), create copies of itself and inject them into files, system areas of the computer, etc. .d., and also perform various unwanted actions on the computer. There are many different ways to classify computer viruses. One way to classify computer viruses is to divide them according to the following main characteristics:

 habitat

 features of the algorithm

 methods of infection

 degree of impact (harmless, dangerous, very dangerous)

Depending on the environment, the main types of computer viruses are:

 Software viruses (affect files with the extension .COM and .EXE)

 Boot viruses

 Macroviruses

 Network viruses

Software viruses is a malicious program code that is embedded inside executable files (programs). Viral code can reproduce itself in the body of other programs - this process is called replication. After a certain time, having created a sufficient number of copies, a software virus can proceed to destructive actions - disrupting the operation of programs and the operating system, deleting information stored on the hard drive. This process is called a virus attack. Boot viruses– it is not program files that are affected, but the boot sector of magnetic media (floppy and hard disks). Macro viruses– affects documents that were created in application programs that have tools for executing macro commands. Such documents include documents from the word processor WORD and spreadsheet processor Excel. Infection occurs when a document file is opened in a program window, unless the ability to execute macro commands is disabled in the program. Network viruses sent from computer to computer using computer networks, email and other channels for distribution.

Computer viruses are classified according to their operating algorithms:

 Worms (sent from computer to computer via computer networks, email and other channels)

 Invisible viruses (Stealth viruses)

 Trojan horses

 Programs are mutants

 Logic bombs

Currently, the most common types of malware include: worms, viruses, and Trojan horses.

It is advisable to prevent viruses from appearing on your PC, but if your computer is infected with a virus, it is very important to detect it. The main signs of a virus appearing on a PC:

 slow computer performance

 freezes and crashes in the computer

 changing file sizes

 reducing the size of free RAM

 significant increase in the number of files on the disk

 disappearance of files and directories or corruption of their contents

 changing the date and time of file modification

And other signs.

Methods of protection against computer viruses One of the main ways to combat viruses is timely prevention. To prevent virus infections and Trojan horse attacks, you must follow some recommendations:

 Do not run programs received from the Internet or as an attachment to an e-mail message without checking for viruses.

 You should check all external drives for viruses before you copy or open the files they contain or boot your computer from such drives.

 You must install an antivirus program and use it regularly to scan your computers. Promptly update your antivirus program database with a set of virus signature files as soon as new signatures appear

 It is necessary to regularly scan your hard drives for viruses. Scanning usually occurs automatically every time you turn on your PC and when you place an external drive in the reader. When scanning, an antivirus program looks for a virus by comparing the program code with the codes of viruses known to it, stored in the database

 create strong passwords so that viruses cannot easily guess the password and gain administrator permissions. Regular archiving of files will minimize the damage from a virus attack

 The main means of protecting information is backing up valuable data stored on hard drives

There are quite a lot of antivirus protection software available. Modern antivirus programs consist of modules:

 Heuristic module – to identify unknown viruses

 Monitor – a program that is constantly located in the PC’s RAM

 A control device that runs anti-virus programs and updates the virus database and components

 Mail program (checks email)

 Scanner program – checks, detects and removes a fixed set of known viruses in memory, files and system areas of disks

 Firewall – protection against hacker attacks

The most effective and popular anti-virus programs include: Kaspersky Anti-Virus 7.0, AVAST, Norton AntiVirus and many others.

List of sources used:

    Solomenchuk V. Internet: A short course. – St. Petersburg: Peter, 2002.

    Guk M. IBM PC hardware. / St. Petersburg, St. Petersburg, 1999

    Kaspersky E. Computer viruses in MS-DOS. / M., “EDEL” - “Renaissance”, 1992.

    Explanatory dictionary of computer technology. / St. Petersburg, LLP “Channel Trading LTD”, 2000.

    Workshop on economic informatics: Textbook in 3 parts - M.: Perspective, 2002.

    Basics of working on a personal computer: Textbook / ed. prof. A.V.

    Yurkova. – St. Petersburg: NIIMM, 2004.

    Khoroshilov A.V., Seletkov S.N. World information resources: Textbook. – St. Petersburg: Peter, 2004.

    Potapkin A. Basics of Visual Basic for the Microsoft Office package.

    M., 1996.

    Dubnov P.Yu. Access 2000. Database design.

    Eco 2000.

    Reitinger M., Much G. Visual Basic 6.0. Student library. BHV 2000.

    Kopylov V.A. Information law. M., “Yurist”, 1997.