Sunday, September 1, 2013

How to Set Up Remote Desktop Access

There are several reasons why you might want to either view a remote PC's screen across the Internet or actually take control of a faraway computer. The most common need for remotely connecting to a PC is when you're trying to fix a less sophisticated user's system. Another is that you may simply want to access a desktop machine at work from home or from the road. There are several tools for accomplishing this, ranging from those that merely let you see the other PC's screen to those that actually let you control and even reboot it.

A bunch of third-party software and Web service options do a great job of connecting you remotely to a PC, including the excellent (and free for non-commercial use) TeamViewer and the also excellent LogMeIn, and GoToMyPC. Some of these offer accessories like file transfer, video chat, and mobile apps that offer remote connection. You can read more about these third-party offerings in Remote-Control Software for Your PC.

Windows has two built-in tools for handling this, though, called Remote Desktop Connection and Remote Assistance. Since these are included with every Windows installation, that's what we'll be using to make the connection for the purposes of this article. Setting up Remote Assistance is much easier, while Remote Desktop is more of an IT chore, requiring knowledge of port forwarding, firewalls, and router settings. The Remote Assistance feature does let you see the screen of and take control of another PC, so it serves our purposes well. One advantage of Remote Connection over Remote Assistance is that no one has to be sitting at the host PC.

Prerequisites for Connecting to a PC using Remote Connection

Since most Windows users are still on Windows 7, I'll go through the process in that OS. Pretty much the same process works for Vista (in case you're still using that much-derided OS), and in Windows 8$119.99 at Microsoft Store. Windows 8 actually offers a new-style (formerly known as "Metro") app for remote desktop connections, too, and it works on Windows RT as well as Windows 8 and Windows 8 Pro.

1. Make sure both PCs are powered up and connected to the Internet. They can't be in Sleep or Hibernate state, either. To prepare the "host," or the machine that you'll be taking control of.

2. Enable Remote Assistance. Open the Control Panel, and type "Remote" in its search box. You could also right-click on Computer and choose Properties, and then choose Remote settings on the left panel. You'll open a Properties sheet with the top choice of "Allow Remote Assistance connections to this computer." Make sure this box is checked.

3. Ask someone to connect. At the computer to be controlled, type "Remote Assistance" in the Start button's search box, and then click on Windows Remote Assistance. This opens the following dialog:

Click "Invite someone you trust to help you."

4. Send the Invitation. Next you'll see three options for sending the invitation:

You'll notice that the last (and best) option, Use Easy Connect, is grayed out on my screenshot: This will be the case if both computers aren't using Windows 7 or 8, with some corporate networks, and if your router doesn't support Peer Name Resolution Protocol. When I connected to a public Wi-Fi network, the option became available. In any case, send the invitation to the user of the computer that's going to do the remote controlling. And Easy Connect lives up to its name: If it's available, that's the one you should use.

5. Guest Connection. After the invitation to take control has been sent, the controller must start Remote Assistance just as in step 3, but choose "Help someone who has invited you." The first time you connect to a PC this way, you'll be asked to "Choose a way to connect to the other person's computer," with the choices being an invitation file and using Easy Connect. Choose the appropriate one:

helper connect

Note that after the first connection, the controller will see a different set of options: The login icons for computers he's already connected to and a blank one labeled "Help someone new." On a repeat connection using a contact's icon, the dialog will show a progress bar with the text " Searching for contact…"

6. Accept Connection. After the controller/guest has sent the request to view the host PC, the latter gets another confirmation. The controller/guest can then see the host's screen in a large window. He can view the other PC's screen to fit or at full size. Note that color settings were dumbed down for this to work, so don't expect to proof those pro photos. On a not-so-great Internet connection, the redrawing of the screen can also be painfully slow. A big help once this connection is made is that there's a chat box for both users. The controlled PC also has Pause and Stop Sharing buttons. Settings let him choose or turn off bandwidth-conserving features like color depth and window background. A fancy desktop wallpaper can slow down screen redrawing, so consider the dumbing-down options.

7. Request Control. The next step is to take control. The controller-guest has a big "Request control" button at top left. As with every step above, the user of the PC to be controlled has to confirm the request. One option here for the host/controlee's response, besides the simple yes and no, is the "allow user x to respond to user account controls." For detailed support, you'll probably want to check that box.

And that's it. Remember, the next time you want to connect the same user, you'll have fewer steps, especially if the host/controlee PC checks the option to add Easy Connect requester to his contacts. But keep in mind that this method always requires a request to be viewed and controlled, so you won't be able to connect to an unattended PC. For that, you'll need to use one of the third-party options above or Windows' Remote Desktop Connection, involving a more business IT–level setup.

Source: PC Mag

Saturday, January 14, 2012

How to Prevent Email Hacking

If someone were to hack your email account, it could mean big trouble. He could read your private messages, send out spam mail or make your messages public. Naturally, you want to take the steps necessary to prevent email hacking, but the process could be intimidating if you aren't technically gifted. Fortunately, by making smart choices and by using additional tools to scan for potential security holes, you can reduce the chances that a hacker can get into your account.

Instructions to prevent email hacking

1) Choose a complex password. If you use a simple password such as "password" or "princess," it makes it easy for people to guess your password. This is especially true if your potential hackers are friends and family members who might try to guess. Instead, choose a password that makes use of both capital and lower case letters, numbers and special characters like the percent or dollar sign.

2) Change your password regularly. Every month, make a point of changing your password to a new complex password.

3) Run anti-virus software. An anti-virus software program can help you to recognize unusual activity on your computer, which could be someone trying to hack your email account. The software will ask you whether you want to remove the program.

4) Use an anti-keylogger program. Anti-virus software doesn't always catch keylogging software, which records what you type on your computer--including passwords. Anti-keylogging software specifically scans your computer for this type of activity. There are many free versions of this program available.


Friday, August 20, 2010

How to Increase the Download Speed of Your Computer?

Do you want to increase the download speed of your computer? Everyone is constantly looking for information to improve his career. No doubt, information is the highway to greatness in life. In a bide to obtain such information one is forced to get it whenever it appears online. One is please and satisfy with the rate of such information transfer if it is very fast. But the reverse is case when the data transfer ( i.e. bits or bytes per second ) is very slow. One is bound to waste time to be used for other demanding issues on a slow data transfer. But you can get out of this mess and speed up the rate of data transfer of your computer by applying the tips in this article.

Change or upgrade your connection. Your internet service provider render service according to your subscription. There is a limit speed associated with each connection. So, go for subscription that meet up with your need. If you are using dial-up connection, make use of Broadband connection for faster speed output. The broadband has Direct Service Line ( DSL) or a cable connection to be chosen for maximum performance.

Download single file per time. Running multiple tasks on a computer at the same time generally slow down it speed. You can give preference to the file to be obtained in order of its priority attention.

Always scan your system with good and powerful antivirus. When there is any virus effects on your systems, it will affect the entire operation carry out on it including the speed of your computer.

Always maintain healthy window registry. Virtually all activities of your computer is center around the registry. It holds the setting and option needed for computer to run effectively. Any alteration in its code setting affects its performance. But you can not avoid activities that affect the registry. Activities such as installation/uninstallation of programs or configuration change have greater effect on the registry. They deposit invalid entries on it and slow down overall performance of the registry. So, you must regularly clean the registry. Registry cleaning can be done manually or with aid of a software. Manually clean is only good for experts who will not delete valid entries and infuse damage to the system.

If you are not expert, it is advisable for you to get a registry cleaner install on your PC. It will scan and free your computer from junk, obsolete and corrupt files. Back-up facilities is available on it to restored any deletion made in error. Basically, it will speed up the data released from your computer.

Franking speaking, application of this software is the most essential tips to fastest information transfer from any internet connection.

Do really want to increase the download speed of your computer? Then, get excellent registry cleaner who will not only increase the download speed of system, but it will increase the overall performance of your system.

Tuesday, August 17, 2010

How to fix the black screen on windows 7 at startup?

How to fix the black screen virus

Resetting the Bios Password

Thursday, August 12, 2010

How to Find the IP Address of a Printer?

Tuesday, August 10, 2010

How to avoid Website Hacking?

Website creation is a very popular activity on the internet. As more and more people discover the many possibilities of having their own website, more of these pages are being created on the internet. It is essential that a website is created in more than just a way that is attractive to visitors. It should also be protected in such a way that there is a higher level of security. There are many individuals who actually spend a majority of their time hacking various websites online. In this article, you will learn about the importance of website hacking prevention measures.

Website hackers use numerous kinds of computer programming languages in order to break down the security on websites on the internet. The most popular computer programming language that can be invaded is that which uses XXS. This is a cross scripting type of computer language that is often used to cross websites. When creating your online website, it is essential that you ensure that all fields and other areas of the website are properly protected from the potential hacker.

Many website owners have a special area on their website where they attempt to gather personal information from the visitors. This may include gathering an email address, an address, and other types of information. It is important that this part of the website is properly protected from hackers. Not only can this type of hacking jeopardize your website, but it can also jeopardize the personal information that your visitors enter on the website. It is important for you to make sure that this part of your website is properly encrypted by HTML.

Many website hackers engage in a practice that is commonly referred to as "Google Hacking". Individuals who use this type of hacking often attempt to discover information about a particular website that is listed on Google by searching for information that is normally considered to be unauthorized. They will attempt to retrieve information that pertains to the tracking tools that are often used by website owners. This information, when in the wrong hands, can actually jeopardize your website.

Individuals who gain access to information on a website through Google hacking techniques may get access to the following information:

- The cache of the website

- Various types of files that are listed on the website

- The link that is used to promote the website

- The intitle and the inurl may also be accessed

Many website owners create their website in such a way that they can access the information across many platforms. However, this can prove to be a danger when it comes to website hackers. By using Google hacking techniques, the pages that are on the website can be easily hacked because the pages are often available for editing purposes. If there is a query made into the search engine, these pages can easily be accessed. If a hacker accesses this information, they can do virtually anything to your website pages. This can prove to cause you financial loss. This is especially true if the hacker places information on your website that can hurt your reputation.

Luckily, there are many techniques that website owners can use to prevent the possibility of hacking. First, the data that you use to compile your website pages should never be allowed to sit on a server. This information should be saved locally. This means that it should be saved to your computer. In turn, you should make sure that the computer is protected by a password that contains alphanumeric characters. This way, if someone attempts to access your computer system remotely, they will be unable to do so.

You should also ensure that the password that you use to make changes to your website is also secure. When saving the documents that are part of your website, it is important that you create them in such a way that others are unable to access this information. Many tips for this include integrating a "disallow" function on the website and attached to all the documents. By taking these steps, and being aware of what the dangers are when you do not, you are sure to prevent the possibility of hackers.

Source: ezinearticles

Monday, August 2, 2010

Don't get Hooked by A Phishing Scam

How to access the sharing data offline?

Access the shared data offline allows you to keep using your shared files, folders and software programs when disconnected from the data server. When you reconnect to your data server, all files will be synchronized to the files on the network.

There are two types of configurations required to set the access shared folders offline available, one for data server and other for client computer.

Configuration on Data Server
  • First locate the folders that you would like to share or make new folders then share these folders so they can be accessible to any one on the network.
  • Now right click on that folder and click on the option "Sharing and security".
  • A small dialog box will appear with the title "data properties". Under the "Sharing" tab, select the check box "Share this folder on the network" under the "Network sharing and security".
  • Now set the share level permissions that you want to give the users on every folder. Enable cache of share folders by click on cache button (by default it will be enabled).
Configuration on Client Computer
  • On the client computer, first open My Computer then click on Tools.
  • In Tools menu bar, click on Folder Options, a window will appear with the title Folder Options.
  • Under the Offline File tab, check the option Enable Offline File. Here you can choose the synchronization process "Synchronize all offline files when logging on", "Synchronize all offline files before logging off" and others.
  • Click on Apply button to save the settings and then Ok button to close this window.
  • Now sitting on the client computer, try to access the shared folder from the data server.
  • First Right click on the shared folder and Click on Make available offline.
  • To synchronizing the offline work from client computer to data server, again open My Computer then click on Tools. Click on Synchronize then click on synchronizing button.
After that down to data server and then try to access share folders by give the UNC (Universal Naming Convention) path of data server. But it will be accessible weather the server is down or up.