mRemoteNGDocumentation/external_tools_cheat_sheet.rst
Common External Tool Configurations
The list below of various examples is by no means a full list of ways to use External Tools but gives you a idea of how it can be used in different ways.
.. note::
These examples use variables like %HOSTNAME%, %USERNAME%, etc.
For a complete list of available variables, see the :ref:variables_reference page.
Ping a server via cmdline.
Run a traceroute via cmdline.
WinSCP <https://winscp.net/eng/index.php>_WinSCP is a free GUI Secure Copy program.
FileZilla S/FTP <https://filezilla-project.org/>_Free and open source FTP client for most platforms.
Firefox <https://www.mozilla.org/en-US/firefox/new/>_Don't like the built-in browser support? Integrate with the Mozilla Firefox browser directly!
Google Chrome <https://www.google.com/chrome/browser/desktop/index.html>_Google Chrome is a freeware web browser developed by Google.
Internet Explorer <http://microsoft.com/ie>_Standard browser included with Windows installation.
MySql Workbench <http://www.mysql.com/products/workbench/>_MySQL Workbench provides data modeling, SQL development, and comprehensive administration tools for server configuration, user administration, backup, and much more. You will be prompted for a password when starting the connection.
VNC Viewer <https://www.realvnc.com/download/viewer/>_Zenmap GUI <https://nmap.org/zenmap/>_Zenmap is a GUI front-end for nmap.
UltraVNC <https://nmap.org/zenmap/>_UltraVNC is a free and open source program for connection to remote machines using the VNC protocol.
This will allow you to connect to a specific COM serial port using PuTTY.
Create a new connection entry with the following information:
Windows PowerShell <https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/powershell>_Windows PowerShell is a task-based command-line shell and scripting language designed especially for system administration.
Running with suggested argument will open a PS session connected to a host. No prompt for credintials will popup.
Windows PowerShell (ISE) <https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/powershell_ise>_Windows PowerShell Integrated Scripting Environment (ISE) is a graphical host application that enables you to read, write, run, debug, and test scripts and modules in a graphic-assisted environment.
It’s could be very useful for database and application servers to know all windows file systems attributes of the remote server, the size in mb, free space in mb and free % including all lettered drives ( e.g c: ) as well as mounted drives. Mounted drives are tricky to find and interrogate by other means.
You must run mR as a user with appropriate permission on the remote server: shortcut = C:\Windows\System32\runas.exe /user:domain\ntuser "C:\Program Files\mRemoteNG\mRemoteNG.exe"
Result will be similar to this:
.. figure:: /images/external_tools_win-resurces.png
You do not need to be logged into the remote server – just highlight the name.
(suggested by: Ray Miller)