|
Remote control your PC from anywhere for FREE!
|
|
Need something from that home computer now? An address? An email? A phone number?
Those of you who've needed remote rescue support from me in the past know of my LOGMEIN Rescue service. You go to my website, I give you a pin code
and after downloading some temporary software, I can control and fix your
computer. Well there's a free version, not as powerful, still great and
available to everybody. Go to https://secure.logmein.com/ and create an account using your email
address. You will need to validate your
account by returning an email from that address, so use a legitimate address
that you will be able to reach immediately if possible but you can always validate
later.
Download and install the LOGMEIN
free module (look for the "add computer" link) on to the computer you want to
control. If the machine already has a password, you will need it and the user name to gain entry remotely, if it does not you will be asked to create one for future LOGMEIN
sessions then and there.
Moving forward go to you LOGMEIN account from any computer. You will need to install an active-x control from each machine that has not had you or another start a LOGMEIN session prior to this from the PC or MAC. Look up at the activity bar of the browser and give permission to install this active-x; then click on
the pc you want to control, it's that simple.
There's no limit to the number of
computers you can control from a free LOGMEIN account. Remember, if the computer has a
password for access then you will need to know that password (and user-id *); if there
is no password for the unit, you will be prompted for the password you submitted at the time of the install. Use a strong password
and a stronger password for the LOGMEIN account control. Do not save your password on a public computer.
The computer you want to control needs to remain on of course (just the tower). LOGMEIN will prompt you at the time of the install to allow it to block future "Standby/hibernate" sessions.
You can't transfer files (but you can email
them to wherever you are) and you can't print (Cute PDF anybody?) but
everything else is a go.
* Having trouble logging in? The user-id, while not always the name on the sign in screen, is always the name immediately to the left of the greater than arrow (>) at a command prompt.
|
Test the strength of your password at :
|
|
http://howsecureismypassword.net/
|
|
Free Anti-Virus products lead in the security software
market.
|
| Yes, free programs ranked as the top four in use tools. Here
are the stats: Avast free 11.45%, Avira 9.19%, AVG 8.6% and Microsoft Security Essentials, my new favorite, at 7.48%. That's a total market share of better
than 36%. As I've mentioned before, free products and paid products all do the
same basic job.
You might compare the process these companies (free and paid) use to keep their products current to their leaving baited machines out on the internet, in the
same way you would bait a fish hook. When a new virus infects a baited machine,
it's identified and its signature is added to the next set of updates which are
then transferred to your machine.
It's important to note that if your PC gets attacked before
the baited machine (think risky browsing behavior) or before the update to your computer from the provider takes place, you will get a virus. It's
the same principal as with a human virus; in order to generate a cure, someone
has to get the virus, hopefully the baited machine first. This, a matter of
timing, is not substantially influenced by whether you have a paid product or a
free product.
Know that if you get a virus, the last thing you should do is
buy the software or protection being offered. Firstly, that is protection money! More importantly, I can tell
you that I regularly go to clients who need me anyway to extract the offending
software even after buying these phony Anti-Virus products.
|
|
Don't open that
unexpected email!
|
And certainly don't click on the embedded link. My clients
have reported, in large numbers actually, that they are getting emails from
people they know, that the emails are without reason, make no sense and have
embedded links or other attachments. These emails steal your address books
(AOL, Hotmail, Yahoo, Gmail and Outlook clients are all susceptible) and
continue the process by now emailing everybody in their newly acquired address
book. I've even gotten this type of email from friends.
If you think you've been attacked in this fashion it is prudent to run a virus scan and to let the people in your address book know what's up. You might tell them about an
added code word that you would insert in the subject to authenticate future
emails in the short run. It can't hurt to change your email password immediately too.
|
|
|
Sony Recall
|
Sony issues recall for some Vaio Laptops that just might
melt down and here's the link http://esupport.sony.com/US/f1cw2update .
|
|
|