Question about security using remote assistance

If I use my PC remotely, help another computer that I suspect is infected by a virus, are there chances to infect my computer?

Not usually.  I would use a software reliable connection remote/assist.  My favorite is TeamViewer, but he has no other choice.  Or those yet integrated.

But is generally not a risk especially if you do not have any file transfers.  Remote Desktop and programs like it have the ability to share disks and transfer files, but if you just display and control of the screen, the program would ignore any request from nothing else to do.  And of course your local machine still has the firewalls and security software.

Tags: Windows

Similar Questions

  • Unable to connect to a Windows XP Pro SP3 machine using remote assistance

    Remote Assistance XP Pro sp3 and Windows 7Any

    I realize account of Windows 7 is still in RC, so if that's the answer, that's what it is. :-)

    Trying to help MOM with assistance remotely.  She is under XP Pro sp3, and I'm running a box fully patched Windows 7.  When she sends the invitation of the RA, the box 7 attempts to connect says it is connected and then is waiting for response from the user.  However, she never had a guest on his machine to accept the request.

    Now, I know what you think, so take that into consideration.  When it does work, I broke out my other laptop under XP Pro SP3 and was immediately able to get on her box without any problem, that is to say, just behaved as expected.

    Any suggestions for W7 to connect to a box of XP Pro sp3 with RA?  I can see it as an ISP thing - maybe - 7 using a protocol of its blocks to ISP (as cox communications blocks port 80 on residential users), perhaps a DCOM conflict or something like.  I really hope that this isn't just stupidity on my part, but it would not be the first time. ;-D

    Any input appreciated

    Thank you

    Joe

    PS we also tried the direct connection to the net - no device between us other than (his end) DSL modem and modem cable (my thesis).

    Forum Windows 7:

    http://social.answers.Microsoft.com/forums/en-us/GettingReadyforWindows7/threads

    Link above is "Preparing for Windows 7" Forum.

    http://social.technet.Microsoft.com/forums/en/category/w7itpro/

    Link above is Windows 7 Forum, to more technical questions about windows 7.

    Windows 7 questions should be directed to the it.

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    XP discussion groups:

    http://www.Microsoft.com/windowsxp/expertzone/newsgroups/reader.mspx?DG=Microsoft.public.WindowsXP.General

    Link above is to the XP newsgroups.

    There is a list of groups of discussion XP to the bottom of the left column.

    You get the help you need there.

    Here is the Vista Forums.

    See you soon

    Mick Murphy - Microsoft partner

  • Can I disable the Terminal Services if I don't use remote assistance/remote desktop?

    I use can I have Vista 32 bit home premium

    I thought that Vista have no remote desktop? Is not Terminal identical remote desktop services?

    When I go

    MyComputer > right click > properties > remote adjustment

    the box for "Allow remote Assisnatnce" is NOT COCHEE

    But when I run Netstat - ano, I see that port 3389 is listening svchost.exe process when I checal what services are related to this particular svchost.exe, I see the following services:

    Cryptographic services
    DNS client
    network location awareness
    KtmRm for distributed transaction coordination
    telephony

    and Terminal Server services

    Seems to be at a point several years ago, I allowed someone from microsoft to help me through the assistance at a distance could therefore have enabled or downloaded services Terminal Server?

    In any case, I think that Terminal Services is initially port 3389 to remain open and thus get an unsolicited connection attempts from different IP addresses.

    I tried a little experiment and finished the Terminal Services and changed the status of manual start-up. When I still ran netstat - ano, he showed no listening on port 3389

    However, when I rebooted my computer Terminal Server was running again. So I ended it again but this time off the service. When I fell net stat - ano he showed terminal services does not. then when I restarted my computer, Terminal Server services do not have turn on port 3389 has not been shown that listening

    SO my question is, as a user of Vista which doesn't use remote help desk or remotely.

    1. I CAN keep the disabled Services Terminal Server?

    2. it cause me any problem of operation or security if she stays in the disabled state?

    3 have disabled will cause me to not be able to get the scheduled updates?

    Thank you

    But I have been informed by Norton Personal asa require a Terminal Server Services be, nit for the part of remote assistance, but for other reasons. They say I can't turn off

  • A few questions about the use of data and Cliq

    I have the cliq, however I chose to not get 3G (so I bought full fare). So I have a few questions about the phone and the use of 3G / 2 G/Edge:

    1 - is possible to disable completely the 2G / 3 G/Edge? I know you can switch between them, but are anyway just tell the phone to stop using them altogether since I'm not subbed to the service?

    2. when the update takes place, I guess we'll have to reconnect motoblur and etc, but if I don't have 3 G will I have motoblur connection problems after the update? Or he keeps the latest wifi settings so that it would connect to wifi to connect. When I first got my phone it was not a problem b/c I had 3G for the first month.

    I hope that makes sense, thanks!

    To stop all the data, I would like to download an application called APNDroid. He cut them all down. When you log on to blur you have 3G or WIFI doe this without getting a timeout error. During the process of setting up your Blur account, you can press the menu button and set up your wifi to work, this will connect you to Blur and your phone will be connected to the blur. If I were you I would be rethinking to do a data plan since you are really losing out on most of your main features of phones. It's your choice, however.

  • Question about the use of OdiOSCommand to run remote commands

    Hi all

    I have a query on OdiOSCommand


    I have two following servers.
    A server running and odi agent
    Server B agent running odi - but no a pots to odi - and odiparams.sh set up correctly.

    Now I regularly invoke scripts on server B (using startscen.sh) that use the agent on the server. It works fine - once odiparams.sh is correctly set up for standards etc.

    Now I have a new scenario that has an order of OdiOSCommand. Yet once again, I invoke the script from Server B, to use the agent on the server. The OdiOSCommand passes just a shell script, and there is no problem of permission.
    I expect the command to execute on the server where the agent is running (e.g., Server A) - but its execution on the server where I invoke the script (IE Server B). I can prove it by temporarily replacing the calling script with a mkdir test_dir schell.

    Is it possible in odi to invoke a command on a remote linux server - when the remote server is running an odi agent. I know there are other ways to do this - ssh etc. - but I try to keep this reality to a package of odi of maintainability.

    Thanks for the research!

    This thread responds to what you are looking for:
    Re: Startscen using an existing running agent could process

    Basically, startscen.sh branches off to a local agent on server B, and so the script also runs on server B.
    You must use startcmd.sh instead.

  • Question about the use of Apple Remote Desktop on the Internet

    Hi all

    I used ARD for a few months with the local network.

    Recently, my parents (living in a different city) decided to get an iMac. And they would sometimes help me with the software and everything.

    So I set up a VPN connection between their house and mine, using OpenVPN and TunnelBlick for Mac OSX

    Here's how I plan to do works:

    1 / my parents begin the VPN connection from the iMac to my home networks. Using TunnelBlick, they can do it with just 1 click and it works OK

    3.8.5 2 / my laptop (Macbook Pro), ARC running, I try to look for "local area network", but ARD could not pick up my parents iMac.

    I thought that if my parents iMac connects to my home via VPN network, their iMac will be treated as a "local network" computer just like my Macbook Pro and they should be?

    Could you please let me know where I need to check and what should I look for to make it work?

    Thank you very much

    James

    I thought that if my parents iMac connects to my home via VPN network, their iMac will be treated as a "local network" computer just like my Macbook Pro and they should be?

    ... Yes and no.

    Yes, are vresque on the local network and can access resources on your home network. However, by default, and not without a lot of work, auto-discovery protocols (for example, Hello/zeroconf) do not reach over the VPN connection. It is, in part, because they use broadcast traffic, and the VPN does not pass broadcast traffic because it could overwhelm the WAN link.

    Instead, you must know the LAN IP address assigned to the VPN connection (you will find this in the VPN server log), and then enter your ARD to connect to this IP address. Then you'll be ready.

  • I have questions about the use of Microsoft Windows for computer repair purposes...

    I'm about to start a computer like Geeksquad repair business. If I need to re - install Windows on computers is a specific copy, I need to get Microsoft for use of technician? I want to make sure I'm following all the recommendations of Microsoft.

    Hello

    I suggest you to post your questions in the TechNet Forums for a better answer.

    http://social.technet.Microsoft.com/forums/en-us/category/w7itpro

  • Question about the use of recovery disks Vista Bus on T500 with XP Pro downgraded

    I searched to see if this has been addressed already and I don't see anything about it. I also looked through the Lenovo support site and could not find any documentation with specific information, that I'm looking. So, if all goes well, the people here will have an idea.

    I have a T500 which was ordered with retired on WinXP Pro. It also came with a set of Vista Business (four discs) recovery disks. I plan to get my machine with Vista business records and down XP Pro, but I had a few questions.

    1. as it currently stands, I guess that the R & R partition that is on the HARD drive at this time restoring a WinXP Pro system if I start and get back with her. Is this correct?

    2. If I boot from the recovery disc Vista Business and use it for the recovery of the system, it creates a new partition 'Factory' R & R which would incorporate a Vista Business install?

    I may be wrong on my assumptions and even after the start of the R & R partition, it is really the recovery disks that I choose to use that would dictate if I found myself with a XP or Vista Bus. System.

    For what it's worth, I created a set of recovery disc R & R for the installation of WinXP Pro in case I need to revert to this version.

    I hope that my question is logical and that someone out there has an answer for me.

    Thanks in advance!

    jskang, welcome to the forum,

    Yes on both counts.

    Removal of all the hard drive recovery disks, create the service partition and then the system installs from the recovery with the flavor of windows partition, so that the discs are.

    It was a good idea to create the XP discs.

  • Question about the use of an Ad Hoc network on J4680 (wireless)

    I'm helping someone to set up it wireless printer J4680 there new HP laptop. Basically, I need to know if I created it with a 'ad hoc network' if she will be able to connect to the internet and use the printer at the same time?

    It has a network card from Sprint to connect to the internet, she's so not a modem or a router. Ive been reading about ad hoc networks which will allow him to connect to the printer wireless to your laptop without using a router... but I was also told that if it connect 2 devices to ad hoc aid which she had to disconnect from the internet, anytime she wants to print something. Can someone confirm this please?

    If this is true, and she can't use both at the same time... is there anyway that it can connect a router to his laptop computer when you are using a network adapter for the internet service?

    Sorry if this is a noob question or miss important info, im fairly new to all this. Any help would be greatly appreciated.

    Thank you.

    Imprezd02 wrote:

    It has a network card from Sprint to connect to the internet, she's so not a modem or a router. Ive been reading about ad hoc networks which will allow him to connect to the printer wireless to your laptop without using a router... but I was also told that if it connect 2 devices to ad hoc aid which she had to disconnect from the internet, anytime she wants to print something. Can someone confirm this please?

    It is correct. You cannot use the printer and internet connection at the same time. I think that there is a router where you could plug the internet card to get wireless connectivity and connect other devices to it wireless. Although I'm not sure about this. Check with the manufacturers of modern like Linksys, D-Link or Netgear router if they have such a router.

  • Question about the use of APEX_UTIL. Prepare_URL

    Using APEX 4.26, on a Linux-based server with IE and Firefox...  I have a link that I need to change to have a checksum added (because of necessary security checksums for pages and items on the page).

    The current code is: < a hrefXX = "f?" p = & APP_ID.:110: & SESSION. : & DEBUG. : P110_IAYEAR: "> change < /a >"

    (XX added to string to prevent browsers trying to act on href...)

    Now, I have tried different methods to produce the checksum and all have failed.

    Link is in the Post of a view page item item text box

    Someone has a simple solution?

    Thank you

    Tony Miller
    Software LuvMuffin
    Salt Lake City, UT

    Thank you Paul, I guess that 'she' is!

    As Scott said, the level of assistance for text attribute item Post (and in fact the text of item Pre) item mentions shortcuts, and 4.2 and 5.0.  However, visitors may not noticed, so let us ensure that the shortcuts documentation correctly reflects this support. I've added a note to the corresponding section in chapter 18 of the User Guide, so I hope that our doc team will be able to update to the next revision of this book.

    Scott & Dene, thanks for your comments on this thread, that we hope Tony will find it useful... as will other users, probably.

    Kind regards

    Hilary

  • Question about security lines filters group

    Hello
    I put a lot of filters of the time lines for my groups in 'Administration tool'.
    (Manage-> Security-> Permissions-> filters) without problem.
    But now, I want to better understand behavior. When I click on the Add button
    I see a window where I can select the objects to be filtered.
    In the lower left corner there are two tabs 'Présentation' and 'Business '.
    Model ". What is the difference? What happens if I select an object
    the first tab? And what about the other? To avoid any problems, I always
    selected object in both tabs.

    Thank you

    Giancarlo

    The MDB one business model layer can be a source of more of a catalog of presentation, so their might two catalog users who use the same logic table MDB, however, a user must now be restricted. Placing the restriction to the MDB will layer affect users, putting the presentation layer will affect the selected user.

    I hope this makes sense

  • Question about "Menory use (average)"... in graphic

    Hello.

    Please, I have a basic question... Please, see the picture I have attached, consider with the virtual Center...

    Grafica, jpg - & gt; Real time

    grafica_2 - & gt; last month (it's the only Foundation Center Virtual value show me.)

    It is a picture of a debian 4.0 etch VM with 1 vcpu and 1024M... and a reserve of 1024M and limit: unlimited

    This machine is NOT running vmware tools

    1 - why this table show me that 100% of the 2 G memory and not 1 G? that's because the limit is 'unlimited '?...

    and, although the operating system have assigned only 1 G... He can get more memory, if the limit is unlimited?

    2. - why the virtual machine has used more than 1024 M which is I assignet him remember?

    3. - in the entrance... "Use of memory (on average)"... What does that mean? ... Please see the high value of 75%... of what? the host esx amount total memory?

    the total memory that is never used by the virtual machine?

    because if you please... . See the grafica_2... How can I know the value of the average of memory reference?

    4 - in grafica_2... What is the reference?

    Thanks 1million

    It is a picture of a debian 4.0 etch VM with 1 vcpu and 1024M... and a reserve of 1024M and limit: unlimited

    This machine is NOT running vmware tools

    OK, first of all there is a misconception and confusion around the whole thing 'unlimited '.  The unlimited by VM's is a way to dynamically throttle the RAM. If you need to leave it to "unlimited".  If you allocate 1 G to the virtual machine and it is set to 'unlimited' means that the virtual computer has access to his assignment, not the full set of what's on the ESX host.

    Tools mean nothing either, the tools allows the ESX host to 'see' what is the virtual machine making (ip address, host name, etc.) and improve the drivers for the video, network and disk optimize for the virtual machine in ESX.  And as a matter of principle, you should ALWAYS use the tools.

    1 - why this table show me that 100% of the 2 G memory and not 1 G? that's because the limit is 'unlimited '?...

    and, although the operating system have assigned only 1 G... He can get more memory, if the limit is unlimited?

    The virtual machine can NEVER go beyond its initial allocation.  You set the parameters and it is limited to 1 G. You can uncheck 'unlimited' and change the memory within the virtual machine and change the memory between minimum required for the virtual machine and is the current distribution of max in this case 1 G.  So, in essence, that you can change the memory while the VM is running using this, otherwise, leave on 'unlimited '.

    2. - why the virtual machine has used more than 1024 M which is I assignet him remember?

    Where are you more than 1 G?  I don't see that.  In fact, according to the table, you're on allocating memory, cut in two because it is not used.  Also do not forget that these paintings is from the point of view NOT HOST the virtual machine.  So this means that the HOST must allocate memory X to give the virtual machine, he needs to RAM, which means most of the time you don't give RAM at least that what needs the virtual machine.  So, generally (inside the prompt), you will see virtual machines with 1 G of RAM and the host is only showing 300Meg allocated, for example, but only spikes active for this virtual machine rarely... and even then it's barely more than 50%.

    Average memory is the distribution of ESX for this virtual machine (it is hard to really judge it).  So for the 1 G you have allocated, it is only actively using 25%.  If you turn off, change to 512 and the power on, you will see this graph set now at about 75-80%.

  • Question about the use of secondary indexes in application

    Hi, I'm a newbie to Berkeley DB. We use Berkeley DB for our application that has tables in the following structure.

    Key to value1 value2
    ------- --------- ----------
    1) E_ID-> E_Attr, A_ID - where A_ID is String for example. A_ID = A1; A2; A3
    -where E_ID is unique but for example A1 or A2 may be part of multiple F_VITA say E1, E3, E5 etc.


    So my question is that it is possible to create secondary indexes on individual items of Value2 (e.g., A1, A2 or A3)?


    Another question, lets say we have two tables

    Key to value1 value2
    ------- --------- ----------
    2) X_ID-> X_Attr, E_ID

    E_ID-> E_Attr, A_ID - where A_ID is String for example. A_ID = A1; A2; A3

    In this case, can create us E_ID as a secondary Index but with primary Table-> E_Attr, A_ID E_ID?

    While X_ID given, we can get the chronogram, E_ID-> E_Attr, table allocation A_ID?

    Don't know if its possible.

    Thanks for reading.

    (1) when talking about data & Index, I was referring to READ ONLY BDB with no. UPDATES where you download entire files allows for example on a weekly basis. In this case, I believe that the data will be stored directly in the tree. It will not be stored in the transaction as such logs. This hypothesis is correct?

    # Storage I is nothing other than a transaction log. Read the white paper, that I mentioned.

    (2) and about the Garbage Collection operation, I meant BDB 'Cache éviction' algorithms. Sorry I have not communicated before.

    I use an LRU algorithm. What do you need exactly to know, that you can not get the doc?

    -mark

  • Question about the use of JavaScript in Managed Bean

    Hello

    I have two questions... The reason for these questions is: we have a requirement that we have executed successfully using jsp and javascript. Now, we are unable to be implemented using the framework of the ADF. It is why would have a jsp with javascript page to reach the requirement.

    The condition is:
    1. to print a page. This page should be displayed with a customer bills. If the customer has 3 invoices (html content), these 3 bills needs displayed on the screen with a page break.
    2. because the page has a lot of data, certainly there will be a right of the page scroll bar to scroll down to see the data.
    3. now, the user clicks on the file--> print available on the browser / provided a "print" button with < af:showPrintablePageBehavior / >. When this happens, it is able to print the data that is displayed on the screen, not all 3 bills.

    This kind of requirement we already implemented using legs force Framework(jsp,java script).

    Now my question to you is:
    how we can open a new window bowser using java from a managed bean script.
    Let me know if you need more information about it.

    Thank you and best regards,
    Kiran kristelle

    the PDF version of the documentation:
    http://download.Oracle.com/docs/CD/E14571_01/Web.1111/b31973.PDF

    Kind regards
    Branislav

  • Question about the use of the Satellite Pro A60 fan

    Hello

    I intend to get a Satellite Pro A60 and I was wondering how much the fan turns on.

    Could someone comment if the fan turns on when the machine is totally inactive, and how he lights up when the machine is used for word processing and surfing the web?

    For example, when using normally does the fan turn on 1/10th of the time, or 1/2 time etc.?

    Thanks in advance,
    Pete.

    Hello

    Sorry I can't give you specific information about the cooling fan. A60 is known to me. It's a very nice laptop. Cooling vent is in reverse I am a pretty that there is no background noise.

    If you make the decision to buy it, look at what the capacity of the HARD drive is too high and that the DVD-ROM can burn a lot of different formats (DVD Super Multi drive).

    Have lots of fun with it.

Maybe you are looking for

  • Cannot permanently delete files in the trash

    I have a file in the Recycle Bin that contains 2 other empty folders. When I try to empty the trash he says that the top folder is in use.  When I try to permanently delete the folders below it says that I don't have permission even if I read / write

  • Queues do not work in my object-oriented design

    I'm developing an application in real time, and I'm using an object-oriented approach. The design model is similar to the framework of the actor, but made to measure. The class structure is configured to support several different subsystems, with the

  • Download XPsp3 error 'file corrupted '.

    I ran "SP3: http://www.microsoft.com/en-us/download/details.aspx?id=24 ' Microsoft Download site and saved on PC & tried to run. In both attempts, I got an error 'file corrupted '. Is there a suggestions on how to get the update of XP?

  • Help... I have now three email accounts!

    Ive had a yahoo email account for many years without any problems.  5 days ago, I decided to do a right click on a page on the web and e-mail it to myself, so I ended up opening an e-mail account that I thought would be great to use after too many wi

  • How to install the Hebrew Language Pack.

    Separated from this thread. IME is NOT the installation of the Hebrew Pack, I know I type in English and my English is OK is a problem, why can't someone to provide me Hebrew pack for windows 7 Pro SP1 edition windows?