Remote administration and web conferencing software
This article is about the distant access and remote control software. For the external engineering company, see TeamViewer ( company )
TeamViewer is a remote control access and remote control condition calculator software, allowing maintenance of computers and other devices. [ 8 ] [ 9 ] It was first gear released in 2005, [ 10 ] and its functionality has expanded dance step by tone. [ 11 ] TeamViewer is proprietary software, but does not require registration and is free of charge for non-commercial use. [ 12 ] It has been installed on more than two billion devices. [ 13 ] TeamViewer is the core intersection of developer TeamViewer AG. [ 14 ] [ 15 ]

history [edit ]

Rossmanith GmbH released the first base adaptation of TeamViewer software in 2005, at that prison term hush based on the VNC project. [ 16 ] The IT military service supplier wanted to avoid unnecessary trips to customers and perform tasks such as installing software remotely. [ 17 ] The development was very successful and gave ascent to TeamViewer GmbH, which today operates as TeamViewer Germany GmbH and is part of TeamViewer AG. [ 18 ]

Operating systems [edit ]

TeamViewer is available for all desktop computers with common operating systems, [ 19 ] including Microsoft Windows and Windows Server, vitamin a well as Apple ‘s macOS. [ 20 ] There are besides packages for several Linux distributions and derivatives, for model, Debian, [ 21 ] Ubuntu, [ 22 ] Red Hat, [ 23 ] and Fedora Linux. [ 24 ] Besides, there is Raspberry Pi OS, a Debian random variable for the Raspberry Pi. [ 25 ] TeamViewer is besides available for smartphones and tablets running Android or Apple ‘s io / iPadOS operating system, identical limited functionality on Linux based operating systems. [ 26 ] Support for Windows Phone and Windows Mobile has been phased out after Microsoft discontinued defend for the two operating systems. [ 27 ]

functionality [edit ]

The functionality of TeamViewer differs depending on the device and variant or interpretation of the software. The core of TeamViewer is outside access to computers and other endpoints adenine well as their operate and sustenance. [ 28 ] After the connection is established, the outback screen is visible to the user at the other end point. Both endpoints can send and receive files equally good as entree a shared clipboard, for model. [ 29 ] Besides, some functions facilitate team collaboration, such as audio and video transmissions via IP telephone. [ 30 ] In recent years, the functionality of the software has been optimized in particular for use in large companies. [ 31 ] For this purpose, the enterprise form TeamViewer Tensor was developed. [ 32 ] With TeamViewer Pilot, [ 33 ] TeamViewer sells software for remote control support with augment reality elements. [ 34 ] TeamViewer offers interfaces to other applications and services, for exercise from Microsoft ( Teams ), [ 35 ] [ 36 ] Salesforce, [ 37 ] and ServiceNow. [ 38 ] The solution is available in about all countries and supports over 30 languages. [ 39 ]

license policy [edit ]

secret users who use TeamViewer for non-commercial purposes may use the software free of charge. [ 40 ] [ 41 ] Fees must be paid for the commercial use of the software. Companies and other commercial customers must sign up for a subscription. [ 42 ] A erstwhile buy of the application is no longer possible since the switch from a license to a subscription mannequin. [ 43 ] The prices for using the software are scaled according to the number of users angstrom well as the issue of coincident sessions. [ 40 ] Updates are released monthly and are included for all users. [ 7 ]

security [edit ]

Incoming and extroverted connections are equally possible via the Internet or local anesthetic networks. If desired, TeamViewer can run as a Windows system service, which allows unattended access via TeamViewer. There is besides a portable version of the software that runs completely without installation, for case via a USB data carrier. [ 44 ] The connection is established using automatically generated singular IDs and passwords. Before each connection, the TeamViewer network servers check the robustness of the IDs of both endpoints. Security is enhanced by the fingerprint, which allows users to provide extra proof of the outback device ‘s identity. Passwords are protected against beastly violence attacks, particularly by increasing the waiting clock time between connection attempts exponentially. [ 45 ] TeamViewer provides extra security features, such as two-factor authentication, blockage and allow lists. Before establishing a connection, TeamViewer first checks the configuration of the device and the network to detect restrictions imposed by firewalls and other security systems. normally, a direct TCP / UDP joining can be established then that no extra ports need to be opened. Otherwise, TeamViewer falls rear on early paths such as an HTTP tunnel. [ 46 ] regardless of the connection type selected, data is transferred entirely via secure data channels. TeamViewer includes end-to-end encoding based on RSA ( 4096 bits ) and AES ( 256 bits ). [ 47 ] According to the manufacturer, man-in-the-middle attacks are chiefly not possible. This is to be guaranteed by the signed key exchange of two keystone pairs. [ 48 ]

mistreat [edit ]

Support victimize [edit ]

TeamViewer and similar programs can be abused for technical support scams. [ 49 ] In this procedure, attackers pretend to be employees of well-known companies to gain control over their victims ‘ computers. They then use a guise to obtain money from their victims. [ 50 ] For this reason, the british Internet supplier TalkTalk temporarily blocked the software ‘s datum traffic. [ 51 ] TeamViewer condemns all forms of misuse of the software, provides tips for safe function, and provides a way to investigate corresponding incidents. [ 52 ]

Account access [edit ]

In June 2016, hundreds of TeamViewer users reported having their computers accessed by an unauthorized address in China and trust accounts misappropriated. [ 53 ] TeamViewer attributed the result to user ‘s “ careless password use ” and denied all duty, saying “ neither was TeamViewer hacked nor is there a security system hole, TeamViewer is dependable to use and has proper security measures in place. Our evidence points to careless consumption as the causal agent of the report return, a few supernumerary steps will prevent potential abuse. ” [ 54 ]

See besides [edit ]

References [edit ]