PC control
The question here is control what?.. Simple access to files or run
a program on a remote machine, or use the remote PC as a server.
Telnet is a terminal program that is secure and easily set up. Secure is the key here. Log in, access files, and run a program, no problem. No it is not graphical. You have to know the command structure. Not a big deal. If you want graphics then remote desktop and VNC are best. VNC is "virtual network computing", and has little protection. It is rated "10" (scale 1 to 10 ) on easiest to Hack.
Every "How to on hacking" deals with this and how to access these boxes. "Hacking Exposed" by Mclure and Kurtz explain how to hijack a windows box with VNC. Passwords are stored in the registry. They can be decripted with programs like vncdec. Remote desktop is not a good idea for full time internet connections.
If your just moving files, use FTP.
Accessing files, running programs, use Telnet.
If you want graphical interface use VNC but follow these guides for your passwords
1) Use at least 10 characters.
2) Mix numbers and letters.
3) Never use combinations that are parts of a number set.
like prime numbers, fabonicci sequences or magic square combinations.
4)Make sure the letter combinations are not found in any dictionary.
Even with this you will be hacked... but at this level, most people will not be destructive, just nosey, they want to know whats on your box. They download pictures, read text files and just snoop. The idea is to make it hard enough to keep the kids off your box.
I use Linux as a chaching proxy, with 5 Windows boxes behind it. When I get hacked, they only see the Linux box. Someone downloaded last years christmas pictures I had on the Linux box. No big deal, hope they enjoyed them. Maybe they thought There was a nude picture or it was a famous person. Boy they must have been disappointed. My dog was the only nude. I can access my windows machines from the internet. I must enable the daemon to use it, I never allow it to run all the time.
A word of wisdom here... "if it is simple to set up and access, you will be hacked in under 24 hours." In most cases people do not know they have been explored. You need software that tells you what was running when, and who was running the application. Windows has no real good logs of these events. Even the servers, if the log daemon is enabled, can be easily compromised, it is possible to delete the log files.
Dont be afraid to try others. Just shut your computer down when you are not using it.
Computers are fun.... Experiment and try new things. Just be warned, you may have to rebuild your computer after a learning episode.
Bruce