Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Lantronix Spider KVM

Posted on 2011-09-23
1
Medium Priority
?
414 Views
Last Modified: 2012-05-12
Hello!
  I have a remote user setup with a Lantronix Spider KVM.  When I log into the web interface, I have no problems; and that is when I am here onsite in the office or remotely from my home.
  However, when this user remotely logs in, she experiences issues with what she is entering.  If she presses one key, the screen may show five or seven *.  If she presses two or three keys, it may show the entire space full of *.  Of course, the password will not register properly if it is only 8 or 10 characters long.
  Does anyone know a resolution to stop this?  I have had her enter one character at a time and wait several seconds between.  She is not patient enough for that, and is very frustrated.  Once she finally gets into the machine, she continues to have this issue trying to enter user/PW combo for a software program.
  Any assistance or thoughts is greatly appreciated.

Thank you!
0
Comment
Question by:tlkamy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 23

Accepted Solution

by:
ComputerTechie earned 2000 total points
ID: 36592509
What interface is user using?  Java,  html lantronics. Might need to update java on machine. A firmware update on spider also help in our case.

CT
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question