I must say this protocol design sounds a bit risci.
You need to make sure its doing a hell of a lot validating on the commands its recieved else this is a wide open door into your computer.
Make sure that whatever code some one is sendgin you never ever get exceptions on those, else it can be abbused.
Other than this, it is a good idea to have a program like this.
Some managemnt in allowing wich client to do this might not be a bad idea also, I can imagine that many people have a home network with multiple pc's for their kids etc, you dont want them to run a client like this ;-)
You need to make sure its doing a hell of a lot validating on the commands its recieved else this is a wide open door into your computer.
Make sure that whatever code some one is sendgin you never ever get exceptions on those, else it can be abbused.
Other than this, it is a good idea to have a program like this.
Some managemnt in allowing wich client to do this might not be a bad idea also, I can imagine that many people have a home network with multiple pc's for their kids etc, you dont want them to run a client like this ;-)