(The flagship version of network man is the most stupid remote office, remote control software, remote computer monitoring and remote video monitoring software in China (free). It can penetrate the intranet without mapping and synchronously monitor QQ, MSN chat records and e-mail content. It also has screen monitoring, voice video monitoring, screen video, screen wall, video wall and other functions. It uses the world's fastest VNC core, remote control of the mouse and keyboard, and the speed of uploading and downloading files. It is a regular and legal software, which can customize whether to let the other party find it during monitoring, and will not be killed by anti-virus software as a virus. The remote boot can be realized by cooperating with the network operator boot card. The software can also be used as a reader to read the encrypted files generated by the timing screen recorder and keyboard recorder. [main functions] 1 Screen wall function: watch the screens of multiple computers at the same time to understand each other's computer usage. It can be used to supervise the work of employees. 2. keyboard record reading function: the keyboard record function can record all the contents entered by the keyboard of the controlled computer and store them in the specified file after encryption. It supports Chinese, English, Japanese, Korean and other languages. The ultimate version can read the encrypted file generated by the keyboard recorder and can view the keyboard record remotely. 3. screen timing video reading function: you can customize a certain time period to automatically record the screen of the monitored party, or you can set the other party to record the screen after opening a certain software. The video file is encrypted and saved. The flagship version can read the encrypted file and support remote viewing. It is mainly used for the supervision of parents over children, enterprises over employees, and the monitoring and management of computer classrooms and Internet cafes. 4. video wall function: turn on the cameras of multiple computers at the same time and watch the camera video at the same time. It can be used for safety monitoring of the surrounding environment. 5. batch management of computers: multiple computers can be shut down, restarted or cancelled at the same time to facilitate the unified management of the company's computers. 6. document distribution: distribute electronic documents in batches to multiple designated computers to save resources and time. 7. send broadcast: send text messages to multiple designated computers at the same time. It has the characteristics of wide range of information release and rapid dissemination. 8. access the desktop of the remote computer: you can use the local mouse and keyboard to operate the remote computer as if you were operating the local computer. Support file uploading and downloading, screen photographing, video recording, etc. It can be used for remote computer maintenance, remote technical support, etc. 9. turn on the remote computer camera: the camera with rotation function can be rotated up, down, left and right. Voice and video communication and text communication can be carried out, and video can be recorded. 10. manage remote computer processes and windows: perform various operations on remote computer processes and windows, such as ending, saving, etc. 11. support u-shield security login: you need to plug in u-shield to log in to the control end to operate on your controlled end, which provides e-banking security level protection for the software and greatly improves the security of the software. 12. support multiple administrator accounts (sub account function): multiple administrators can be set, and the permissions of each administrator can be limited. Each administrator can operate the controlled end. 13. support access permission setting: you can set the operation permission and function permission of visitors. [usage] install and run the ultimate version of the network man remote control software, and log in to the same member account at the control end and the controlled end at the same time. Without inputting the IP of the other party, multiple computers installed at the controlled end are displayed on the software interface of the control end. Select the computer and click the function key on the interface to realize the corresponding functions of the computer. Even if he is not in the company, he can handle all kinds of work and manage employees in time. It is more convenient and efficient to manage chain stores distributed in different locations.
This document contains the following attachments:
Ultimate control end rar
Ultimate controlled end rar
Must see before installation txt)