![google chrome desktop curtain mode google chrome desktop curtain mode](https://9to5mac.com/wp-content/uploads/sites/6/2019/11/chrome-remote-desktop-web-1.jpg)
Work from home: Securing RDP and remote access It’s time to disconnect RDP from the internet If it does, it’s just the beginning of your trouble.
![google chrome desktop curtain mode google chrome desktop curtain mode](https://cdn.stardock.us/forums/70/44/7044518/6e5c5f40-9fd7-46ed-849c-18a07255b3bf.png)
If you have a poorly configured RDP setup on your computer though, it may just let them in.
#GOOGLE CHROME DESKTOP CURTAIN MODE PASSWORD#
At this point, your computer will prompt them for a password – usually. To the remote user, they will be presented with a login screen to your desktop, often without you noticing (especially if your computer is on and you just happen to be away from it). How could this happen? If your computer is “listening” for an RDP signal (typically over port TCP 3389), and it is connected to the Internet, it will respond when a remote user asks it if it’s alive. Sadly, while RDP can serve a variety of useful purposes ranging from remote “hands-on” support to configuring and running servers, in the wrong hands it can be a remote control weapon that enables bad actors to zombify your computer and have it do their bidding. This is the powerful protocol which has been letting you view a Windows desktop “over the wire” on the other side of the globe (or back at your home from the office) for over a decade now. Lately, we’ve seen an increase in reports of malware being installed via Remote Desktop Protocol (RDP). With malicious remote access attacks of the rise it is time to check your computer’s RDP configuration and apply restrictions, like turning it off, limiting users, and applying strong passwords