================
=Vortex Project=
================
The Vortex Server

**What is the Remote Access?**

Well for those of you that have never done remote access before, here is your chance to learn what its all about. Remote access is NOT hacking, which is a very popular misconception. Remote access is simply accessing a computer from a remote location, and giveing that computer commands. That is what the Vortex Project does. One person opens the server, he is the victim, while the other person opens the Client, he is the remote accessor. When the Client user finds out the server user's ip address, he can type it in and connect to the server user's computer. Once he is connected, the server will respond to anything the client tells it to do. This is how remote access works. Remote access can only work if the following conditions are met:

1. A computer is running a server, and has a valid Internet Protocol Address
2. The computer running the server has the neccessary files to run the server
3. The computer runs the server
4. Another computer runs the client, and types in the server's ip address
5. Both programs/computers are connected, and internet connection is not interrupted.

**What is the Vortex Server?**
The Vortex server is the application that allows the client application to connect to it, and allows it to run commands. The server does whatever the client tells it to do, no matter what the condition, unless internet connection is lost, or the programs connection is lost.

**How does the Vortex Server work?**
The Vortex server runs off of a basic concept. When the client user clicks a button on the client application, a text message is sent as data to the server application. According to what that message is, the server will exectute a command written into the server's program.

**Explanation**

The file.exe is the bare bones of the server. It is just the server by its self. It will work on any computer that has the following files:

1. MSWINSCK.OCX
2. MSVBVM60.DLL
3. WINSOCK.DLL

The file1.exe is the server with the above files packed inside of it, and they are extracted into their correct directories which follow:

1. C:\windows\system\MSWINSCK.OCX
2. C:\windows\system\MSVBVM60.DLL
3. C:\windows\WINSOCK.DLL

If you wish to use this on a person that might not have the above files, you might wish to send file1.exe, but if you know your victim has those files, then you should send file.exe.

**Concluding**

This entire project was created by ZXCVBNM!
I give thanks to ISPCHIP, for dealing with me, and MOBMAN for making remote access so popular as it is today.