Intranet penetration tool: peanut shell box;
Mobile APP:Microsoft remote desktop.
Step 1, Intranet penetration
1, connect the network port of the peanut shell box with the router (or switch).
2. Enter the peanut stick login interface through the website b.oray.com;
3. Enter your sn code (behind the fuselage) and initial password to log in. The interface after logging in according to the prompts is as follows. You can see that the official has sent us a free domain name when purchasing the peanut shell box;
4. Then select "Intranet Penetration" and click "Add Mapping" in the lower right corner. Add a map for the remotely controlled machine, so that we can access this machine on the external network;
5. Select or fill in the following prompts: "application name", "domain name", "mapping type", "external network port", "internal network host" and "internal network port";
Note:
1, the default port of the remote desktop is 3389. If you have purchased a fixed port in official website, please fill in the purchased port with the fixed port for the external network port, otherwise, choose a temporary port.
2. The IP address of the intranet can be confirmed by entering cmd on the website server computer-Start-Run-and enter the command: ipconfig to find it in the pop-up interface.
6. After successful addition, an external network access address will be generated, which is used for remote access to the computer with the mobile App.
Step 2, the computer starts the remote control function.
1, in the controlled computer win 10 system operation is as follows: right-click "My Computer"-"Properties", click "Remote Settings", allow remote connection to the computer, and click OK;
Step 3, remote control of mobile phone.
1, download: Microsoft Remote Desktop on the mobile phone, click "+"plus sign in the upper right corner, then click "Desktop" to fill in the information of the accused computer, and fill in the external network access address we just generated on the peanut shell in the column of "PC name": "VP-youuserna-051.ticp.net: 2688.
2. Fill in the account name and login password of the accused computer in the column of "User Account" (that is, the account displayed every time the computer is turned on and the startup password required to be entered), and click Save.
3. In this way, the mobile phone can control your computer anytime and anywhere.