![]() There are some more features and tools but for the most part, this is what you will be using if you decide to use Ammyy Admin at all. That way you can navigate more easily to what you are looking for than going through the host interface. Along with some tools for key combinations you can open an extra window that displays the file system of the host. The control window also has some options. ![]() This is very useful when you know there is no one here when you connect from the other side. For example you can set your computer to accept control from a specific ID. You can also establish default connection rules. You can set up a contact book and store the ID's you usually connect to. Upon accepting, the other client will open a window displaying your desktop with direct control over it. When the other party requests a connection to your computer, you will be prompted to accept. As long as your client is "waiting for session" (you have not stopped it). For someone to be able to control your computer, he needs to input your ID or IP. On the left you have your Ammyy ID and IP number, while on the right you have the controls required to connect to another computer. The interface is relatively straightforward. Why is Ammyy Admin so special? Well, besides the fact that it has become quite infamous thanks to its misuse, Ammyy Admin is a lightweight application that does not need to be installed. There is a plethora of programs that allow remote control of computers. Furthermore, if you intend to use it to deceive other people, then perhaps you should check your karma levels first. The thing is, Ammyy Admin is perfectly fine in terms of security if used properly. Yet people who do not have the slightest idea about the computer world and are too good willed to be suspicious often fall into the net (pun intended). Now, you don't need to be tech genius to spot this kind of BS from a league away. It has been a growing concern about a wave of internet scammers that lure people into running Ammyy Admin and relinquish control to their computers. I'm sorry for the unsettling visual imagery, but there is a point to be made.Įasy to install remote control apps do not scam people! People scam people! Remote computer access software and credulous people is like knives and little children.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |