Dumb question about Dell tech support and remote access...

1 Answer

Answer :

poofandmook, the techician can see everything on your computer right now. Everything. He’s using a remote assistance login, which gives him full control. If you want to see what he’s doing, you can bring up task manager to find out what processes he is running, but you have no way of knowing what his eyes are on. Your CC numbers should be safe. I say should be, because I don’t know how you’re storing them. Some per-user data is encrypted for your login ID, so even though the tech has an unrestricted account, he cannot see anything that is encrypted for your account.

Related questions

Description : If you provide tech support to family and friends, how do you set your boundaries?

Last Answer : I don’t provide tech support to family and friends.

Description : Question about the Dell Inspiron 519?

Last Answer : http://www.samsclub.com/shopping/navigate.do?dest=5&item=423070 Ports/Slots: # Dell 19-in-1 Media Card Reader # USB 2.0 Ports: 8: 2 front, 4 back, 2 top # Front: Microphone (1) and Headphone (1) # ... # Three 3.5 Bays (two internal, one external) # One 5.25 bay # Memory DIMM Slots: 4 available

Description : Some people say they have distrust and disdain for politicians, so should not those people be they the party of Twiddle Dee (Democrats) or the party of Twiddle Dumb (Republicans) support President Elect Trump for not being a career politician?

Last Answer : I generally dislike career politicians (there are exceptions). That statement in no way means that I think all non-career politicians would make good presidents. Your argument is logically invalid.

Description : A mentally retarded student attends your lecture and sit in a deaf and dumb manner. What will you do? Options: A) Make your lecture very simple and spare some extra time for him. B) You do not like ... individual. C) You pressurized the student to leave the class. D) You do not support him at all.

Last Answer : A) Make your lecture very simple and spare some extra time for him. 

Description : A student who is mentally retarded, cannot follow your lecture and sit in a deaf and dumb manner, when you recognise him, what will you do? Options: A) Make your lecture very simple and spare some extra ... ) You attempt in such a manner that he leaves your class D) You do not support him at all

Last Answer : A) Make your lecture very simple and spare some extra time for him 

Description : Are there any World of Warcraft people on here who might be able to answer a tech question for me?

Last Answer : Run a windows search for your WoW folder and see if it shows up twice. If it does, you’re safe to uninstall one. However it’s more than likely just a bug in Windows itself and nothing to really worry about.

Description : Access to raw material is the main basis for the location of- (1) Surgarcance industry (2) Aluminium industry (3) Electronic industry (4) Hi-tech industry

Last Answer : (1) Surgarcance industry Explanation: To retain the sugar content, the cane has to be processed as soon as possible after harvesting; therefore the processing plants (mills) are located near the major areas of sugar cane production. The sucrose content depletes very fast.

Description : Does Dell offer technical support after you buy their computer?

Last Answer : Yes. Dell computers provides technical support. They provide specific types however. They provide "hardware" fault diagnosis and repair service.

Description : Do Dell computers support Sims games?

Last Answer : Almost all Dell computers will support playing The Sims, with the notable exception of the Dell Mini.

Description : Is computer support from Dell available 24/7?

Last Answer : Yes, Dell offers support on a 24/7 basis from their support center in India. You can get the support you need via telephone or open a chat session. If you are having issues with your computer the chat might be preferred as they can remotely look at your system (with your permission of course).

Description : Can anyone explain to math-dumb people like me how computers can generate random numbers?

Last Answer : Random numbers generated by computers aren’t truly random (they couldn’t be), but they’re effectively random for most purposes.

Description : Boring question #143: Who is more boring to talk about, Democrats (the party of Twiddle Dee), or Republicans (the party of Twiddle dumb)?

Last Answer : Either. Talking about either makes me want to bash my head against a ferrocrete wall.

Description : This may seem like a dumb question, but why are a lot of companies headquartered in CA?

Last Answer : Whatever your industry, you want to locate where your employee base is. For tech companies, that's Silicon Valley in CA. Older established companies are based wherever they originally started, I ... other hand, tend to congregate in VA because that state has the most lenient banking regulations.

Description : What's an example of a "dumb" question that a youngster might ask?

Last Answer : “Why?”...makes me furious, it never stops. I find myself saying “Just because!!!” after the twentieth “why?”

Description : Dumb FB Question.

Last Answer : It’s most likely a part of that person’s privacy settings.

Description : Ok, really dumb car question here, about gasoline?

Last Answer : Right.

Description : Which has been the most stupid dumb question here on ask-public? and Which has been the best question ever asked that generated the most discussion?

Last Answer : This one is currently in the lead with number of responses, I believe: http://www.ask-public.com/disc/11805/what-are-you-listening-right-now/ and it may be the answer to all of your questions – depending on your POV

Description : Can you answer a question question in Answers(sorry if the question is dumb I'm new to this )?

Last Answer : YOU KNOW WHAT, SCREW DIS I JUST FIGURED OUT SORRY.

Description : Should a school district be able to monitor students via remote access to laptops?

Last Answer : No…Hell no.

Description : Best networkable + remote access storage compatible with Mac?

Last Answer : a .mac account gives you 10GB of storage accessible anywhere in the world, but if you are going to be video-heavy, then you'll need some sort of NAS system; btw, Leopard allows remote ... This feature allows remote access to your home mac's directories from anywhere on the internet from any mac.

Description : is it possible to access my vista pc using remote desktop software on a windows mobile 6 pro pda phone?

Last Answer : I do this on my WM2003 PDA with www.logmein.com. It’s works great for. You should check it out.

Description : How to Get Internet Access in Remote Areas with Satellite Internet Providers?

Last Answer : As technological innovations sweep across the globe, there are still areas of country that remain without top quality coverage from cable and internet companies. Residential and business customers in ... high speed satellite internet service to residential and business customers in rural areas. S

Description : How to Configure Remote Access?

Last Answer : the computer world, you may come across a situation in which you need to get files from another computer but don't have physical access to it, such as while on vacation. Luckily, there is a ... will not be an issue.Open the Start Menu and open the Control Panel. Navigate to the Performance and

Description : How do i block remote access?

Last Answer : There are many electronic devices that block remote access. You can check online or at local electronic stores to find something to block remote access.

Description : How do you get access to remote places in national parks?

Last Answer : Many remote places in public parks are inaccessable to the general public as these places are maintained to be a pristine location. Contacting the park ranger will give you an idea of which areas are compleatly closed to the public, and which ones you may access through special means.

Description : How do you set up remote access on a PC?

Last Answer : remote access on a PC is mainly used for 2 things * accessing files remotely * accessing and controlling the desktop remotely. The idea of remote desktop software is to enable you to operate your ... also be enabled to access the PC remotely. For Linux and Mac systems the Technology is called VNC

Description : What is the best way to remote access files from another computer?

Last Answer : Crossloop is a free online program which anyone can use to access ones files remotely from another computer.You find a helper, share your screen and fix the problem at hand.

Description : I purchased a dvr on ebay to expand with directv, the remote is not working on this unit but it works on the others in my house. Do you do repair work If you do when can I bring it in and do you have access cards for DirecTV?

Last Answer : Generaly speaking there is no repair needed some remotes just will not work with older or newer machines.

Description : What is free remote access and will it take over the world?

Last Answer : Remote access is good for business people who might need something off their computers at work while at home or traveling. It's also good if you have an issue with your computer and tech support ... for people to randomly take over peoples computer there should be some kind of code or lock out.

Description : How do I get remote access to my computer?

Last Answer : CNET.com has a wonderful list of both freeware and for-purchase options for accessing your computer remotely at http://download.cnet.com/windows/remote-access/. Their list is very PC-centric; if you have a Mac, a list of remote access options can be found at http://www.pure-mac.com/remote.html.

Description : How do I get remote access to another computer?

Last Answer : Setting up the Remote Desktop Connection program will allow you to gain remote access to another computer. This can be found under the "Accessories" item in your Start menu.

Description : What is the definition of remote access?

Last Answer : Remote access is having the ability to gain access to a computer or network from another location. So, if you setup your computer for remote access, you can go on vacation and still gain access to files in your computer. However, you will have to use another computer to gain access.

Description : Prior to the invention of time-sharing, the prevalent method of computer access was ____________ a) batch processing b) telecommunication c) remote access d) all of the mentioned

Last Answer : a) batch processing

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system

Last Answer : Run on single operating system

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access

Last Answer : b. Remote attack