Description: can peeping into the opponent's desktop, set up by the time set. The mouse can be used to control each other's computer, including all the mouse operation. The keyboard can be used to control each other's computer, almost all the available buttons. Clients can establish multiple windows on multiple computers for monitoring and controlling. An order can run, for example, opened a notebook. Can lock/unlock each other's computers. The computer can let the other party (forced) cancellation/reboot/shutdown. transmission/delete/mobile computer on the other side of the paper. if necessary procedures can switch off the service. Do not reproduced and used for illicit purposes
File list (Check if you may need any files):