Solved

Shut out from view

Posted on 2004-09-15
5
157 Views
Last Modified: 2010-03-18
 Can u pls, tell me how to shut out from view my system thro' EMCO Remote Desktop Tool?
0
Comment
Question by:venkat_lal
  • 3
  • 2
5 Comments
 
LVL 23

Expert Comment

by:rhandels
ID: 12065686
Hi,

Could you please post some more info as i cannot help you with the limited info you gave..

I you mean "how can i make sure that users cannot contyrol my computer using Remote Desktop" and you have a server, than here's how.

Go to my computer on the desktop and right click it, choose properties, choose remote desktop and make sure to disable the option "let other take control over my desktop" or something like that..
0
 

Author Comment

by:venkat_lal
ID: 12082061
Thanks  
         Using EMCO remote desktop we can view or work on any network system by knowing the admin password.Is it possible to deny access while remote desktop tool try to connect any PC.
0
 
LVL 23

Expert Comment

by:rhandels
ID: 12083355
>>Is it possible to deny access while remote desktop tool try to connect any PC.<<

Not quite sure wat you mean by this. Please be a bit more specific, maybe giving an example???
0
 

Author Comment

by:venkat_lal
ID: 12100495
One of my  colleague use EMCO remote desktop tool & connect my system thro' it.He's in technical side,so he knows domain administrator password.Pls, assist me to block access the tool while it connect.

  Also i think in registry settings we can do it but i don't know where to do it.

 
0
 
LVL 23

Accepted Solution

by:
rhandels earned 100 total points
ID: 12100800
Hi,

Normally there should be running some sort of service on the background that you need to stop so your pc cannot be remote controlled. Also, you have to give permissions to this collegue to take over your pc (privacy statements).. If he connects without you knowing it, it's illegal and you could make a complain about it so he cannot remotely control your workstation...

0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Resolve DNS query failed errors for Exchange
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now