Internet based remote desktop using INDY and socket component


  • Robbi Rahim
  • Janner Simarmata
  • Anita Purba
  • Muhammad Andi Prayogi
  • Andy Sapta
  • Oris Krianto Sulaiman
  • Muhammad Ardiansyah Sembiring
  • Rahmi Ramadhani
  • Anna Riana Suryanti Tambunan
  • H Hasdiana
  • Pomarida Simbolon
  • Siti Aisyah
  • J Juliana
  • S Suharman



Remote Desktop, Control, Server, Client.


Remote Desktop is now a very necessary thing for many companies who want to control or know all the activities happen-ing on the client computer both office employees, as well as computer clients that are very far away as local server (client) that exist in large companies, to control the computer distance can be done by making an application by using Delphi pro-gramming language by using component of INDY and Socket Component, based on testing done by remote process can be done well and remote speed depends on internet network connectivity.




[1] S. J. Lee, Y. H. Kim, S. S. Kim, and K. S. Ahn, “A Remote Monitoring and Control of Home Appliances on Ubiquitous Smart Homes,†Network, pp. 1–6, 2008.

[2] E. Otero-muras, “Pose-corrected Face Processing on Video Sequences for Webcam-based Remote Biometric Authentication,†Network, pp. 1–22, 2007.

[3] C. Gilmore, D. Kormann, and A. D. Rubin, “Secure remote access to an internal Web server,†IEEE Netw., vol. 13, no. 6, pp. 31–37, 1999.

[4] M. Dowling, “Enabling remote working: Protecting the network,†Netw. Secur, vol. 2012, no. 3, pp. 18–20, 2012.

[5] K. Bager, “Remote access: Don’t be a victim,†Netw. Secur, vol. 2012, no. 6, pp. 11–14, 2012.

[6] D. Lazim et al., “Information Management and PSM Evaluation System,†Int. J. Eng. Technol., vol. 7, no. 1.6, pp. 17–19, 2018.

[7] F. A. A. Fauzy et al., “Registration System and UTM Games Decision Using the Website Application,†Int. J. Eng. Technol., vol. 7, no. 2.2, pp. 45–47, 2018.

[8] R. Rahim, H. Nurdiyanto, A. S. Ahmar, D. Abdullah, D. Hartama, and D. Napitupulu, “Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm,†J. Phys. Conf. Ser., vol. 954, no. 1, 2018.

[9] T. Listyorini and R. Rahim, “A prototype fire detection implemented using the Internet of Things and fuzzy logic,†World Trans. Eng. Technol. Educ., vol. 16, no. 1, pp. 42–46, 2018.

[10] S. Network and M. Protocol, “Simple Network Management Protocol,†RFC 1157, vol. 3, no. 1098, pp. 69–150, 2006.

[11] M. Alizadeh et al., “Data center TCP (DCTCP),†ACM SIGCOMM Comput. Commun. Rev., vol. 40, no. 4, p. 63, 2010.

[12] R. Yadav, “Client / Server Programming with TCP/IP Sockets,†Client / Serv. Program. with TCP/IP Sockets, p. 24, 2007.

[13] R. Rahim, “Man-in-the-middle-attack prevention using interlock protocol method,†ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp. 6483–6487, 2017.

[14] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,†Int. J. Secur. Its Appl., vol. 10, no. 8, pp. 173–180, Aug. 2016.

[15] R. Rahim, M. Dahria, M. Syahril, and B. Anwar, “Combination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression,†World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp. 292–297, 2017.

[16] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,†J. Phys. Conf. Ser., vol. 930, no. 1, p. 012005, Dec. 2017.

[17] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing steganography with government standard algorithm,†in 2017 3rd International Conference on Science in Information Technology (ICSITech), 2017, pp. 366–371.

[18] E. Kartikadarma, T. Listyorini, and R. Rahim, “An Android mobile RC4 simulation for education,†World Trans. Eng. Technol. Educ., vol. 16, no. 1, pp. 75–79, 2018.

[19] Dhanamma et al., “Classification of TCP Variants inside Wireless Networks,†Classif. TCP Var. Insid. Wirel. Networks, vol. 4, no. 4, pp. 340–347, 2014.

[20] K. R. Fall and R. W. Stevens, “TCP: The Transmission Control Protocol (Preliminaries),†in TCP/IP Illustrated, Volume 1: The Protocols, 2011.

[21] M. Fairuzabadi, “Implementasi Kriptografi Klasik Menggunakan Borland Delphi,†J. Din. Inform. vol. 4, no. 2, pp. 65–78, 2010.

[22] B. Delphi, “Sistem Monitoring Kendali Pintu Air Jarak Jauh Berbasis,†Sist. Monit. Kendali Pintu Air Jarak Jauh Berbas, No. X, Pp. 1–6, 2008.

[23] R. Rahim, I. Zulkarnain, and H. Jaya, “A review: search visualization with Knuth Morris Pratt algorithm,†in IOP Conference Series: Materials Science and Engineering, 2017, vol. 237, no. 1, p. 012026.

[24] R. Rahim et al., “Searching Process with Raita Algorithm and its Application,†J. Phys. Conf. Ser., vol. 1007, no. 1, p. 012004, Apr. 2018.

[25] R. Rahim, S. Nurarif, M. Ramadhan, S. Aisyah, and W. Purba, “Comparison Searching Process of Linear, Binary and Interpolation Algorithm,†J. Phys. Conf. Ser., vol. 930, no. 1, p. 012007, Dec. 2017.

[26] R. Rahim, I. Zulkarnain, and H. Jaya, “Double hashing technique in closed hashing search process,†IOP Conf. Ser. Mater. Sci. Eng., vol. 237, no. 1, p. 012027, Sep. 2017.

[27] R. Rahim et al., “Block Architecture Problem with Depth First Search Solution and Its Application,†J. Phys. Conf. Ser., vol. 954, no. 1, p. 012006, 2018.

[28] R. Rahim, Nurjamiyah, and A. R. Dewi, “Data Collision Prevention with Overflow Hashing Technique in Closed Hash Searching Process,†J. Phys. Conf. Ser., vol. 930, no. 1, p. 012012, Dec. 2017.

[29] R. Rahim, A. S. Ahmar, A. P. Ardyanti, and D. Nofriansyah, “Visual Approach of Searching Process using Boyer-Moore Algorithm,†J. Phys. Conf. Ser., vol. 930, no. 1, p. 012001, Dec. 2017.

View Full Article: