Solved

gotomypc viruses norton personal firewall

Posted on 2004-08-23
4
558 Views
Last Modified: 2008-01-16
Gotomypc is not suppose to have firewall issues but we can not get gotomypc to function when a firewall is enabled on the host.  Configuration doesn't seem to matter.  Numorous malicious code programs have been found on the two hosts in which we are having this problem.  The hosts are networked to eachother.
0
Comment
Question by:102680
4 Comments
 
LVL 2

Accepted Solution

by:
MatthewWilliams earned 500 total points
ID: 11872897
The following comes from GoToMyPC help topics:

To set up a firewall to allow GoToMyPC to run as a Host computer

Step One: Enable GoToMyPC to access the Internet

The first time you run GoToMyPC on a Host computer that has a firewall installed, you will set off the firewall and be prompted to allow GoToMyPC to access the Internet.

Select the check box to "Remember the answer each time I use this program."

Click Yes to enable GoToMyPC to access the Internet.

Step Two: Enable GoToMyPC to be the Host computer

The first time you access a Host computer that has a firewall installed, you will need to authorize a firewall to allow the following GoToMyPC files to access the Internet: g2com.exe, g2fileh.exe, g2host.exe, g2mainh.exe, g2printh.exe, g2svc.exe, g2tray.exe, gopcsrv.exe

To do this, access the host PC from another PC and while at the host PC.

When prompted for each component, select the check box to "Remember the answer each time I use this program."

When prompted for each component, click Yes to enable each component to access the Internet.

Note: Be sure to disable Host Screen Blanking and Keyboard Locking on the GoToMyPC security preferences window prior to connecting with that host PC.

0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question