![]() This ranges from documents titled "Birthday present ideas for XXX" to material of a private or confidential nature, such as bank account data. Check whether your desktop and your document folders expose sensitive information you do not want to share. It's a scam.)Įven if the person who is helping you is trustworthy, you might want to do a little house-cleaning before starting a remote-access session. (If anybody calls you up from "Microsoft support" and offers to remotely "fix" a problem on your computer, say no thanks and hang up. Be sure the person you're granting remote access to is trustworthy. The person accessing your computer over a remote connection will have access to everything you have on your computer: photos, files, applications, the icons on your desktop. Before diving in, however, I'd like to give some words of advice for users receiving remote help. Most of this blog entry will cover the remote help process from the point of view of the helper. But getting to that point can be a challenge of its own. From that point on, the helper can see and control the other partner's desktop. ![]() The helper uses this code to connect to the target machine. In both applications, the helpee shares a numerical code with the helper. AnyDesk and TeamViewer are pretty much foolproof and perfectly suited for the purposes described here. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |