For example, you might get a phone call purportedly from Microsoft, with a "security rep" telling you that your system is infected with a virus and you must install remote access software so he can remove it. Bad guys typically gain remote access to victims' computers through social engineering or phishing. The remote user is effectively giving over control of everything on his system to someone he can't see. Other applications include training and sharing of presentations or other documents.īut remote access can be dangerous. Instead of traveling to another city to fix a user's problem, a tech support rep can connect to the problematic computer using remote access software and debug it. Remote access software is often used for tech support. The user can point and click, run applications on the remote computer debug problems erase files alter the remote computer's registry install software and just about anything else that could be done if the computer was in the same room. To the user, the remote computer's display, mouse and resources are available just as if he or she were sitting in front of it, even though it could be thousands of miles away. Remote access software allows one computer to control another connected to the Internet. But before getting into TeamViewer's features, let's discuss what remote access software is, and the pros and cons of using it. Using TeamViewer, you can remotely control almost any computer (PC, Mac, smartphone or tablet) over the Internet. I've had that experience all too often, and TeamViewer is one excellent solution to this problem.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |