How do you set up remote access on a PC?

1 Answer

Answer :

remote access on a PC is mainly used for 2 things * accessing files remotely * accessing and controlling the desktop remotely. The idea of remote desktop software is to enable you to operate your home computer as if you were seated in front of it, from a remote, internet-enabled computer.To setup remote access in PC includes lot of steps. The website http://www.pcstats.com/articleview.cfm?articleID=1441 gives you detailed information on this. The specifics of remote access vary between operating systems, but for most Windows PCs you use Remote Desktop, which uses it'sown protocol and must beenabled in both the firewalland Computer Properties dialog. The users of the PC must also be enabled to access the PC remotely. For Linux and Mac systems the Technology is called VNC

Related questions

Description : is it possible to access my vista pc using remote desktop software on a windows mobile 6 pro pda phone?

Last Answer : I do this on my WM2003 PDA with www.logmein.com. It’s works great for. You should check it out.

Description : What is the best program for remote connection to my pc?

Last Answer : answer:For a remote desktop type of setup: There are several flavors of VNC that can be secure as long as you set it up properly. then there are some of pay/free hosted services: Logmein Gotomypc TeamViewer Or even using RDP with some precautions in place.

Description : Should a school district be able to monitor students via remote access to laptops?

Last Answer : No…Hell no.

Description : Dumb question about Dell tech support and remote access...

Last Answer : poofandmook, the techician can see everything on your computer right now. Everything. He's using a remote assistance login, which gives him full control. If you want to see what he's doing, ... though the tech has an unrestricted account, he cannot see anything that is encrypted for your account.

Description : Best networkable + remote access storage compatible with Mac?

Last Answer : a .mac account gives you 10GB of storage accessible anywhere in the world, but if you are going to be video-heavy, then you'll need some sort of NAS system; btw, Leopard allows remote ... This feature allows remote access to your home mac's directories from anywhere on the internet from any mac.

Description : How to Get Internet Access in Remote Areas with Satellite Internet Providers?

Last Answer : As technological innovations sweep across the globe, there are still areas of country that remain without top quality coverage from cable and internet companies. Residential and business customers in ... high speed satellite internet service to residential and business customers in rural areas. S

Description : How to Configure Remote Access?

Last Answer : the computer world, you may come across a situation in which you need to get files from another computer but don't have physical access to it, such as while on vacation. Luckily, there is a ... will not be an issue.Open the Start Menu and open the Control Panel. Navigate to the Performance and

Description : How do i block remote access?

Last Answer : There are many electronic devices that block remote access. You can check online or at local electronic stores to find something to block remote access.

Description : How do you get access to remote places in national parks?

Last Answer : Many remote places in public parks are inaccessable to the general public as these places are maintained to be a pristine location. Contacting the park ranger will give you an idea of which areas are compleatly closed to the public, and which ones you may access through special means.

Description : What is the best way to remote access files from another computer?

Last Answer : Crossloop is a free online program which anyone can use to access ones files remotely from another computer.You find a helper, share your screen and fix the problem at hand.

Description : I purchased a dvr on ebay to expand with directv, the remote is not working on this unit but it works on the others in my house. Do you do repair work If you do when can I bring it in and do you have access cards for DirecTV?

Last Answer : Generaly speaking there is no repair needed some remotes just will not work with older or newer machines.

Description : What is free remote access and will it take over the world?

Last Answer : Remote access is good for business people who might need something off their computers at work while at home or traveling. It's also good if you have an issue with your computer and tech support ... for people to randomly take over peoples computer there should be some kind of code or lock out.

Description : How do I get remote access to my computer?

Last Answer : CNET.com has a wonderful list of both freeware and for-purchase options for accessing your computer remotely at http://download.cnet.com/windows/remote-access/. Their list is very PC-centric; if you have a Mac, a list of remote access options can be found at http://www.pure-mac.com/remote.html.

Description : How do I get remote access to another computer?

Last Answer : Setting up the Remote Desktop Connection program will allow you to gain remote access to another computer. This can be found under the "Accessories" item in your Start menu.

Description : What is the definition of remote access?

Last Answer : Remote access is having the ability to gain access to a computer or network from another location. So, if you setup your computer for remote access, you can go on vacation and still gain access to files in your computer. However, you will have to use another computer to gain access.

Description : Prior to the invention of time-sharing, the prevalent method of computer access was ____________ a) batch processing b) telecommunication c) remote access d) all of the mentioned

Last Answer : a) batch processing

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system

Last Answer : Run on single operating system

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access

Last Answer : b. Remote attack

Description : when a hackers attempt to attack a host via the internet is the know as what type of attack (a) remote attack (b) local access (c) internal attack (d) physical access

Last Answer : (a) remote attack

Description : what type of ethical hack test access to the physical infra structure (a) internal network (b) remote network (c) external network (d) physical network

Last Answer : (d) physical network

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : Answer. Option D.

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack

Last Answer : A. Remote attack

Description : What type of ethical hack tests access to the physical infrastructure? ∙ A. Internal network ∙ B. Remote network ∙ C. External network ∙ D. Physical access

Last Answer : D. Physical access

Description : How to Access a Remote Desktop ?

Last Answer : How to Access a Remote Desktop For systems administrators and people who need to access their computer files from a distant location, Remote Desktop is a useful way to access files, documents and ... you can easily access important files and documents from a static computer from anywhere you may be.

Description : How do I set up a Universal Remote Control to my Suddenlink cable box?

Last Answer : answer:

Description : I want to set up either a video feed or a stream from my computer, visible to someone at a remote site. What's the easiest way to do this?

Last Answer : I would think that using skype between your two computers would be a LOT easier than streaming video on two different machines... and you'd get better synchronicity. What kind of computers do you have? What kind of cameras?

Description : Nikhil and Neha went to a remote village in Kerala to meet their grandmother. They were surprised to see a biogas plant in Mr. Nair's house in the neighbourhood. There were plenty of livestocks ... given by Nikhil and Neha to the sarpanch to convince him to set up community biogas plant. -Science

Last Answer : (a) Mr Nair: Higher degree of general awareness, helping nature. Nikhil and Neha: Knowledge sharing. helping nature. concern for community advantage. (b) Possible arguments given by Nikhil ... . Basically they discuss and explain the advantages of community bio gas plant for the'entire village.

Description : how to set up a logitech universal remote

Last Answer : Need Answer

Description : How to Set Up a Remote Desktop Connection in Windows 7?

Last Answer : Remote desktop connections are great for connecting users together on your network so that you can easily share files, make changes, and use one device while controlling a completely different one. In this ... ll be able to select, "Connect" and then you can sign on with the proper credentials!

Description : What does TV remote control unit use to operate a TV set?

Last Answer : Radio waves

Description : Why can't I access coupons.com (the site, not the coupon printer) from my PC?

Last Answer : Is your computer set to “popups okay”?

Description : How can I safely remove Ubuntu 10.10 from my PC / or How do I access Ubuntu files from inside Windows 7?

Last Answer : answer:I'm used Ubuntu a couple of times, but it's not my distro of choice so some of this may be a bit off. I had thought Ubuntu already had what it needed to read from a Windows partition (these ... to boot from the CD in Recovery mode, I think it's called, and re-write the MBR from there.

Description : Is it straight forward to have a linux machine access the data held on a PC running Windows?

Last Answer : I’m not sure what you mean by “access our home PC,” but it shouldn’t be a problem.

Description : Can I access information from my POS machine on my pc?

Last Answer : Book Your Luxury Flats/ Apartments in Mapsko Mount ville in Gurgaon best of location in delhi ncr. Mapsko Mount Ville is an unmatched residential property in Sector 79, Gurgaon. This project offers plenty of benefits that includes kids play , top level connectivity.