How to Access a Remote Desktop ?

1 Answer

Answer :

How to Access a Remote Desktop
For systems administrators and people who need to access their computer files from a distant location, Remote Desktop is a useful way to access files, documents and programs.  While there are some limits to what Remote Desktop can do, it’s a nice way to retrieve data from a host computer through one or more desktops, smartphones, laptops, or other devices.  Here’s how you can set up and access Remote Desktop on a computer with Windows XP

Tools
To set up and access Remote Desktop, you need the following tools:

A host computer with Windows XP Professional and configured for Remote Desktop connections.
Client computer running Windows 95 or higher (it’s best to have Windows XP installed on that computer).
Both computers should be connected via a virtual private network (VPN) connection.
Setting Up Remote Desktop
Follow these steps to set up the Remote Desktop function:

Enabling the Remote Desktop
Sign into the host computer as the administrator.
Right-click the “My Computer” icon on the Desktop or the Start menu.
Click the “Remote” tab.
Click the option for “Allow Remote Assistance invitations to be sent to this computer.”
To enable Remote Desktop, click the option for “Allow users to connect remotely to this computer.”
Managing the Firewall
Go to the Control Panel, and access Windows Security Center.
Manage the security settings for Windows Firewall.  You should enable the firewall, but the “Don’t allow exceptions” check box must remain unchecked.
Set an exception for Remote Desktop.
Finishing Up Remote Desktop
Right-click the “My Computer” icon.
Select the “Computer Name” tab, and take note of the full computer name.
Accessing Remote Desktop
Remote Desktop only works if the host computer is turned on, so make sure that the host computer is locked and not set on standby or hibernate when you access it remotely.

Click the Start menu and point to the “Accessories” group.
Highlight “Communications,” and click “Remote Desktop Connection.”
Enter the name of the host computer and click OK.  You will then be prompted to the Windows login screen.
Log into the Remote Desktop connection by using the username and password of the host computer.
Remote Desktop is a very useful and convenient way of accessing files remotely from any computer connected to a host.  With these steps, you can easily access important files and documents from a static computer from anywhere you may be.

Related questions

Description : Can you help me with a question about my remote control to my gas fireplace?

Last Answer : I’m sure you have checked the battery, in the remote? It should be in the manual, I would say, but it could be that the remote beeps to tell you that the battery is getting low?

Description : Desktop Fans

Last Answer : A desk is a dangerous place to view the world, and for many who hold eight-hour nine-to-five shifts, a desk becomes a very warm place. Office air conditioners don't give that much needed breeze of comfort ... a bit hot, but having a desk fan assures you that getting cool is just an arm's reach away.

Description : How can beep sounds point out complaints in a motherboard?

Last Answer : the meanin of the beeps can be found in the manual, and it can help you troubleshoot the hardware, or for example a beep that tells you the memory is bad. if you can’t find the manual you could google for it.

Description : is it possible to access my vista pc using remote desktop software on a windows mobile 6 pro pda phone?

Last Answer : I do this on my WM2003 PDA with www.logmein.com. It’s works great for. You should check it out.

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : How to secure Remote Desktop Connection ?

Last Answer : I would you a VPN connection between the remote computer and the Offices Network. This creates encrypted tunnel between the remote computer and the office. The encryption scrambles information so no outside ... would recommend Norton. I hope this has answered you question. Thank you for your time.

Description : How to secure remote desktop from Malware?

Last Answer : I would use a VPN which encrypts the connection from the Remote computer to the office's network. The information that flows from the remote computer to the offices network will be scrambled and anyone ... I would also use a virus protection like Norton. I hope this helps. Thanks for your question.

Description : How to Setup Remote Desktop Connection for Windows 10?

Last Answer : Hello there, to answer this question briefly I'd say that it's not too complicated to set up a remote desktop connection using windows 10. You have 2 options: 1. Go to your windows start ... easiest way to do remote desktop connection. I really hope this answers your question, Best Regards, Nesim

Description : I want to establish a remote desktop connection.?

Last Answer : Depending on what version of Windows you're running, you may already have a remote desktop connection software on your computer. If you do, just check your programs list. Windows Vista comes with the ... client. Cisco Any Connect is used across the board, and is pretty much the go-to application.

Description : How to Set Up a Remote Desktop Connection in Windows 7?

Last Answer : Remote desktop connections are great for connecting users together on your network so that you can easily share files, make changes, and use one device while controlling a completely different one. In this ... ll be able to select, "Connect" and then you can sign on with the proper credentials!

Description : what exactly is a remote desktop?

Last Answer : A remote desktop is a desktop in another location. A remote desktop connection allows you to connect one computer to another, even if they aren't in the same place. Then you have access to the files and programs on the other computer. It's commonly used to allow people to do work at home.

Description : Is there an easy way to get a remote desktop connection?

Last Answer : you can go to either of these website for desktop connection information www.microsoft.com/mac/remote-desktop-client or www.microsoft.com �ۼ Downloads �ۼ Tools and Utilities

Description : What do I need to do to establish a remote desktop connection from home to my work computer?

Last Answer : you need to use a program like isloonline which is the link below. islo online is very usfull for accessing computer desktops and much more www.islonline.com

Description : How to connect computer to a remote desktop connection?

Last Answer : On your computer, you will click on Start, Programs, Accessories, Remote Desktop Connection. In the computer box, you need to enter an IP number (which your office IT person will give you). Enter your login and password. Click Connect.

Description : Should a school district be able to monitor students via remote access to laptops?

Last Answer : No…Hell no.

Description : Dumb question about Dell tech support and remote access...

Last Answer : poofandmook, the techician can see everything on your computer right now. Everything. He's using a remote assistance login, which gives him full control. If you want to see what he's doing, ... though the tech has an unrestricted account, he cannot see anything that is encrypted for your account.

Description : Best networkable + remote access storage compatible with Mac?

Last Answer : a .mac account gives you 10GB of storage accessible anywhere in the world, but if you are going to be video-heavy, then you'll need some sort of NAS system; btw, Leopard allows remote ... This feature allows remote access to your home mac's directories from anywhere on the internet from any mac.

Description : How to Get Internet Access in Remote Areas with Satellite Internet Providers?

Last Answer : As technological innovations sweep across the globe, there are still areas of country that remain without top quality coverage from cable and internet companies. Residential and business customers in ... high speed satellite internet service to residential and business customers in rural areas. S

Description : How to Configure Remote Access?

Last Answer : the computer world, you may come across a situation in which you need to get files from another computer but don't have physical access to it, such as while on vacation. Luckily, there is a ... will not be an issue.Open the Start Menu and open the Control Panel. Navigate to the Performance and

Description : How do i block remote access?

Last Answer : There are many electronic devices that block remote access. You can check online or at local electronic stores to find something to block remote access.

Description : How do you get access to remote places in national parks?

Last Answer : Many remote places in public parks are inaccessable to the general public as these places are maintained to be a pristine location. Contacting the park ranger will give you an idea of which areas are compleatly closed to the public, and which ones you may access through special means.

Description : How do you set up remote access on a PC?

Last Answer : remote access on a PC is mainly used for 2 things * accessing files remotely * accessing and controlling the desktop remotely. The idea of remote desktop software is to enable you to operate your ... also be enabled to access the PC remotely. For Linux and Mac systems the Technology is called VNC

Description : What is the best way to remote access files from another computer?

Last Answer : Crossloop is a free online program which anyone can use to access ones files remotely from another computer.You find a helper, share your screen and fix the problem at hand.

Description : I purchased a dvr on ebay to expand with directv, the remote is not working on this unit but it works on the others in my house. Do you do repair work If you do when can I bring it in and do you have access cards for DirecTV?

Last Answer : Generaly speaking there is no repair needed some remotes just will not work with older or newer machines.

Description : What is free remote access and will it take over the world?

Last Answer : Remote access is good for business people who might need something off their computers at work while at home or traveling. It's also good if you have an issue with your computer and tech support ... for people to randomly take over peoples computer there should be some kind of code or lock out.

Description : How do I get remote access to my computer?

Last Answer : CNET.com has a wonderful list of both freeware and for-purchase options for accessing your computer remotely at http://download.cnet.com/windows/remote-access/. Their list is very PC-centric; if you have a Mac, a list of remote access options can be found at http://www.pure-mac.com/remote.html.

Description : How do I get remote access to another computer?

Last Answer : Setting up the Remote Desktop Connection program will allow you to gain remote access to another computer. This can be found under the "Accessories" item in your Start menu.

Description : What is the definition of remote access?

Last Answer : Remote access is having the ability to gain access to a computer or network from another location. So, if you setup your computer for remote access, you can go on vacation and still gain access to files in your computer. However, you will have to use another computer to gain access.

Description : Prior to the invention of time-sharing, the prevalent method of computer access was ____________ a) batch processing b) telecommunication c) remote access d) all of the mentioned

Last Answer : a) batch processing

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system

Last Answer : Run on single operating system

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access

Last Answer : b. Remote attack

Description : when a hackers attempt to attack a host via the internet is the know as what type of attack (a) remote attack (b) local access (c) internal attack (d) physical access

Last Answer : (a) remote attack

Description : what type of ethical hack test access to the physical infra structure (a) internal network (b) remote network (c) external network (d) physical network

Last Answer : (d) physical network

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : Answer. Option D.

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack

Last Answer : A. Remote attack