|
· Open/close the CD-ROM once or in intervals (specified in seconds). · Show optional image. If no full path of the image is given it will look for it in the Patch-directory. The supported image-formats is BMP and JPG. · Swap mouse buttons - the right mouse button gets the left mouse button's functions and vice versa. · Start optional application. · Play optional sound-file. If no full path of the sound-file is given it will look for it in the Patch-directory. The supported sound-format is WAV. · Point the mouse to optional coordinates. You can even navigate the mouse on the target computer with your own. · Show a message dialog on the screen. The answer is always sent back to you. · Shutdown the system, logoff the user etc. · Go to an optional URL within the default web-browser. · Send keystrokes to the active application on the target computer. The text in the field "Message/text" will be inserted in the application that has focus. ("|" represents enter). · Listen for keystrokes and send them back to you. · Get a screendump (should not be used over slow connections). · Return information about the target computer. · Upload any file from you to the target computer. With this feature it will be possible to remotely update Patch with a new version. · Increase and decrease the sound-volume. · Record sounds that the microphone catch. The sound is sent back to you. · Make click sounds every time a key is pressed. · Download and deletion of any file from the target. You choose which file you wish to download/delete in a view that represents the harddisks on the target. · Keys (letters) on the keyboard can be disabled. · Password-protection management. · Show, kill and focus windows on the system. · Find NetBus servers with the ultra-fast Port scanner. · Redirect data on a specified TCP-port to another host and port. · Redirect console applications I/O to a specified TCP-port (telnet the host at the specified port to interact with the application). · Configure the server-exe with options like TCP-port and mail notification. · Possibility to restrict access to only a few IP-numbers (but be prepared for IP-spoofing). |