Appropriate authentication mechanisms shall be used to control the access by remote users.
In desktop sharing, there are two separate parties: the host computer and the remote user.
This would provide a hacker with a lot of information about a remote user.
The host computer can also hand over keyboard and mouse controls to the remote user.
Others can create a backdoor, allowing a remote user to access the victim's computer system.
A successful attack would give the remote user the same rights as the local user.
Playing games with remote users through the internet or a dialup connection.
But libraries' investments in online services are aimed at more than just remote users.
You would normally not see that, for example, if some remote user had sent email directly to its target server.
No packets are sent to the remote user at any time.