• Views of TeamViewer?

    Author
    Topic
    #493113

    In the past many here have recommended Teamviewer for remote access; personally I’ve been happily using Logmein (free).
    But Logmein is changing to subscription mode, so it’s time to look at Teamviewer.

    The beauty of Logmein was that the client PC didn’t need to have anything installed – it connected via a web browser.
    Provided that Logmein was installed on the host PC.

    The Teamviewer notes don’t make clear if this is possible. In fact they seem to have changed the concept of ‘client’
    too be what in IT we would normally call the host. Their ‘client’ seems to be the PC you want to connect to (ie a client of yours in a business sense).

    I’m going on an overseas holiday soon, and would like to access my PC from remote (hotel) locations.
    Can’t install software on those! Logmein handled this situation well, since one only needed a browser to connect to a host.
    Can Teamviewer operate in this way?
    I suppose I can take my laptop with me, but would rather not (just more junk to carry around!).

    Or is there another (free) solution which would not require client software to be installed?

    Thanks for any help with this.

    Viewing 43 reply threads
    Author
    Replies
    • #1436107

      TeamViewer has an executable that does not require installation. It also has Android, iOS and Windows Phone versions, which means you can use it from a smartphone.

    • #1436261

      I use Team Viewer and like it…
      Pretty easy to understand also.

    • #1436387

      Thanks for the replies.
      Can anybody give me the name of the non-install exe that I should use please?
      I guess I could run it from a USB stick or an SD card. Is there a URL I could get it from?

    • #1436392

      For mobile use: TeamViewer Portable
      TeamViewer Portable can be run directly from a USB stick or a CD – the perfect solution if you are on the road.

      http://download.teamviewer.com/download/TeamViewerPortable.zip

    • #1436400

      I usually go with the Quick Support version, that you can find here: http://www.teamviewer.com/en/download/windows.aspx

    • #1436436

      That’s assuming that you will have access to a USB port and running software from it is allowed, there’s also the potential threat of your data being intercepted/logged on the host computer; perhaps a portable browser on the USB/SD card to use it with?

      I think the smartphone option would be safer.

    • #1436474

      The one feature that Logmein had that is missing in Teamviewer is the ability to wake up a target computer that is in sleep mode. Used it a lot on my laptop when I wanted to log into my sleeping desktop. With Teamviewer, I have to keep the desktop alive.

      Jerry

      • #1437324

        If you can get your network card to respond to a ‘wake on lan’ command then you would have FULL control from anywhere. You would need the full install program installed on your home computer.
        I was on a trip for 3 months and had access anytime I had an internet connection.

        • #1437344

          I tried teamview recently. Every time I accessed the host the desktop background and resolution would change. Anyone else have the problem?

          • #1437465

            I use Teamviewer to assist a friend with his computer problems. When I connect and have a visual of his desktop on my desktop, his background changes as a sign to him that I can now see his screen and , if he so allows, I can can control his PC from mine.

      • #1437478

        The one feature that Logmein had that is missing in Teamviewer is the ability to wake up a target computer that is in sleep mode. Used it a lot on my laptop when I wanted to log into my sleeping desktop. With Teamviewer, I have to keep the desktop alive.

        Jerry

        Teamviewer 9 includes Wake on LAN

    • #1436572

      I’m going on an overseas holiday soon, and would like to access my PC from remote (hotel) locations.
      Can’t install software on those! Logmein handled this situation well, since one only needed a browser to connect to a host.
      Can Teamviewer operate in this way?
      I suppose I can take my laptop with me, but would rather not (just more junk to carry around!).

      I would strongly advise against remotely accessing your PC from a hotel PC. I have used some hotel PCs, and all of them have been chock full of adware.

      If you access your PC from one such PC, your PC will become infected and compromised.

      Bring your own laptop with you, and use it to access your home/office computer.

      Group "L" (Linux Mint)
      with Windows 10 running in a remote session on my file server
    • #1436580

      I would strongly advise against remotely accessing your PC from a hotel PC. I have used some hotel PCs, and all of them have been chock full of adware.

      If you access your PC from one such PC, your PC will become infected and compromised

      How in the world could a PC being controlled by a Remote Control desktop become infected with adware installed on the Hotel PC??? You should only be able to pick it up if you browse or install something using the Remote PC itself.

      I haven’t noticed any adware on the hotel PCs I’ve used although I usually bring my own laptop or tablet. Some hotels don’t supply wireless (or wired) access so you have to use their PC. One hotel I was at in Venice Italy only had Web TV. Ghastly experience but I needed to check my flight status.

      Jerry

      • #1436593

        How in the world could a PC being controlled by a Remote Control desktop become infected with adware installed on the Hotel PC??? You should only be able to pick it up if you browse or install something using the Remote PC itself.

        Some hotels don’t supply wireless (or wired) access so you have to use their PC.

        … there’s also the potential threat of your data being intercepted/logged on the host computer; …

        I think the smartphone option would be safer.

        Data intercept/logging = potential illicit access to the remote PC, Jerry.

    • #1436597

      Highly unlikely since Teamviewer data is encrypted. I can understand this happening with a laptop using hotel wireless with going through VPN and having passwords stolen, not the hotel PC. Anyway, he was talking about adware infections which wouldn’t occur this way.

      Jerry

    • #1436643

      If you are using PC A to remotely access PC B, and PC A is infected, it is very possible that the infection could get onto PC B via the remote connection.

      What makes you think it wouldn’t? VPN and encryption keep outside devices from intercepting the connection; they don’t prevent the computer you are using from sending an infection.

      Group "L" (Linux Mint)
      with Windows 10 running in a remote session on my file server
      • #1437447

        Jim

        I use Teamviewer extensively to remotely support over 80 computers

        Teamviewer effectively runs the software contained on the remote computer i.e. you see the remote desktop on the computer you are using – the only way to transfer a file from your hotel computer is to use the specific file transfer facility.

        I am unable to understand how you could conceive of any malware program transferring from the (hotel?) computer to the remote computer without you physically opting to transfer it.

        You can visualize Teamviewer as if you were standing in the front yard of a house watching TV through the window and sending requests to the person in the room to change the channel by sending him a text!!

        • #1437713

          Jim

          I use Teamviewer extensively to remotely support over 80 computers

          Teamviewer effectively runs the software contained on the remote computer i.e. you see the remote desktop on the computer you are using – the only way to transfer a file from your hotel computer is to use the specific file transfer facility.

          I am unable to understand how you could conceive of any malware program transferring from the (hotel?) computer to the remote computer without you physically opting to transfer it.

          You can visualize Teamviewer as if you were standing in the front yard of a house watching TV through the window and sending requests to the person in the room to change the channel by sending him a text!!

          My concern is that some of the people who write malware are really sharp, and it is possible that some malware on the hotel PC which is very well-written could somehow worm its way into the remote session on the hotel computer.

          In the example you gave (sending commands via text to the person in the room), I could imagine that some malware on an infected PC could intercept my text message commands and add information to them, thereby replacing my commands with malware-induced commands. Since both the local Windows session and the remote Teamview session are both riding on top of the Windows kernel of the hotel PC, if the Windows kernel gets compromised, malware could then spread to the remote session.

          I’m glad that you have had trouble-free success. I personally wouldn’t want to risk it.

          Group "L" (Linux Mint)
          with Windows 10 running in a remote session on my file server
    • #1436657

      What makes you think it would? Infections (not adware) can be passed via networked PCs but not via a remote control connection. I’ve never heard of it happening. Can you cite a single instance of this occurring? The main issue with using computers in a public environment is user id/password stealing via data/intercept that Satrow mentioned, not malware infections. VPN and encryption minimize this possibility.

      Jerry

      • #1436658

        I know enough about IT issues to know that it would be a big risk. Especially with the public PCs I have seen at hotels — chock full of adware. The adware was all I knew about; who knows what else was on the PC?

        However, if you want to do it, go for it.

        Group "L" (Linux Mint)
        with Windows 10 running in a remote session on my file server
    • #1436661

      I think I know enough about IT issues as well. Adware doesn’t spread from PC to PC. Viruses, yes, adware no. You pick it up via program installs. I don’t know which hotels you stay at but the hotel PCs Ive accessed didn’t have adware. They typically don’t allow program installs. As I stated earlier, the biggest danger in using public PCs is Password stealing, not adware. You are in more danger of that happening using your own laptop without going through a VPN than using a hotel PC.

      We should probably just agree to disagree and drop this whole discussion.

      Jerry

      • #1436693

        I think I know enough about IT issues as well. Adware doesn’t spread from PC to PC. Viruses, yes, adware no. You pick it up via program installs. I don’t know which hotels you stay at but the hotel PCs Ive accessed didn’t have adware. They typically don’t allow program installs. As I stated earlier, the biggest danger in using public PCs is Password stealing, not adware. You are in more danger of that happening using your own laptop without going through a VPN than using a hotel PC.

        Holiday Inn, Marriot.

        We should probably just agree to disagree and drop this whole discussion.

        Works for me.

        Group "L" (Linux Mint)
        with Windows 10 running in a remote session on my file server
    • #1436705

      Marriot?

      http://krebsonsecurity.com/2014/01/hotel-franchise-firm-white-lodging-investigates-breach/

      Still unsure that contributors here have actually considered data input interception (think keyloggers, etc.) on the local PC.

      • #1436712

        Thanks for everyone’s input on this, including the security considerations.
        I’ll try out Teamviewer in the next few days and see whether it meets my needs.

    • #1436909

      I’ve now given Teamviewer a trial, and here’s how it went:
      Downloaded Teamviewer (for personal use) and installed it on the intended host PC (Win 8.1). It gave me an ID no. for the PC.
      Downloaded Teamviewer Portable into the laptop (Win XP SP3) and unzipped it into its own directory (no ‘install’ required).
      Executed TV portable on the laptop and requested connection to the ID of the host. It asked for a password that the host displayed.
      It’s a different password each time, so that wouldn’t work for me; I need unattended connection.
      The solution: you can set a ‘Personal password’ on the host which is then permanent. This can be set in Extras – Options – Security on the host.
      Once that was done, I could connect using the same password each time.
      I also unzipped TV portable to a usb stick and and SD card. It worked fine from them both.
      Must say that the performance is very snappy!
      Thanks again for everyone’s contribution to this topic.

    • #1437257

      Download and install TeamViewer Host on the intended host device (where it runs as a service with a user-selected static password) and use TeamViewer Portable from a USB stick.

      Teamviewer Host keeps a connection to Teamviewer’s server(s) until a connection is made from Teamviewer Portable. Once handshaking and authentication is completed the connection to Teamviewer’s server(s) is terminated and the remaining (encrypted) connection is solely between host and client.

      Given that the connection is passing just screen updates, keyboard input and mouse movements, it’s difficult to see how malware could be passed from client to host (although Satrow’s concerns are potentially valid, albeit limited… we’re not talking credit card or banking info here).

      I’ve been using Teamviewer for years as an individual (since v4… it’s now v9) and for 3 years in a corporate (local government) environment after suggesting my employer purchase it in preference to LogMeIn after comprehensive comparison and testing of each product’s strengths and weaknesses.

      In my experience the PC versions of Teamviewer are better than any other remote control solution currently available. (Still a way to go with their Android and iOS clients but that’s only my opinion.)

      Hope this helps…

      • #1437267

        … (although Satrow’s concerns are potentially valid, albeit limited… we’re not talking credit card or banking info here).

        No, only potential ownership of the home PC and whatever it might contain.

        • #1437316

          No, only potential ownership of the home PC and whatever it might contain.

          Have to agree with satrow, here. You enter one password in an unsafe pc and you are exposing yourself to big, big problems. I would never do that, tbh.

          • #1438685

            Have to agree with satrow, here. You enter one password in an unsafe pc and you are exposing yourself to big, big problems. I would never do that, tbh.

            So… in the absence of prima facie evidence, can we agree to advise the OP to use a strong and unique password for a remote connection to a Teamviewer Host as an alternative to pure conjecture?

            • #1438693

              So… in the absence of prima facie evidence, can we agree to advise the OP to use a strong and unique password for a remote connection to a Teamviewer Host as an alternative to pure conjecture?

              There is nothing about conjecture in advising someone not to insert passwords, that allow access to valuable resources, in a computer where you don’t know what is running. I wouldn’t even call it a good practice, just a common sense one. It’s preventative behavior, which is way better than risking compromising someone else’s system and data.

            • #1438786

              … where you don’t know what is running … … I wouldn’t even call it a good practice, just a common sense one…

              Rui, I totally agree. The key words here are “where you don’t know what is running“.

              What is the problem with common sense?
              It ain’t that common. 🙁

        • #1438681

          No, only potential ownership of the home PC and whatever it might contain.

          Citation that this has ever happened or is even possible over a remote protocol?

          • #1439988

            Let’s step back a ways and recap a little:

            No, only potential ownership of the home PC and whatever it might contain.

            Citation that this has ever happened or is even possible over a remote protocol?[/QUOTE]I’ve not suggested that this happens through TeamViewer (your remote protocol) – only that data logging and interception can occur before it’s encrypted/transmitted. It’s the unknown quantity of the strange computer that’s the risk here.

            Take a look at the legit. keylogging software that’s available, the hardware keyloggers as well, then study what was possible back in the ’90’s with trojans like subseven; look at what camera/keylogger combo’s do when installed into cash machines.

    • #1437471

      i liked teamviewer very much when testing alternate to logmein free, but it proves incompatible w/ a reservation software (ros2006) running on the network i need to use it on.
      can’t use tightvnc from it’s IP addressing dependance…
      looked at chrome remote desktop too, find it kind of clumsy for lack of better explanation.
      any other remote access FREE software anyone can recommend out there plz?
      i don’t see any in this thread, thanks~
      😉

      • #1437475

        I use TeamViewer and like it quite a bit. If you are willing to leave your Host computer on all the time while you are away, the password for access will not change. If your Host computer experiences a blip / cause for a reboot, it necessitate a new password.

        The problem I have with TeamViewer is their pricing structure. You get approximately 75 free uses and then the connect time is reduced to 5 minutes, Fair enough. HOWEVER, their “fee for life” is $ 750.00 and that is pretty steep. I have been in contact with them and suggested an annual fee of, say, $ 75.00. Their firm counter offer was $ 48.00 PER MONTH. Still a no go for me. They are not willing to budge.

        For those concerned about the desktop background being changed while using TeamViewer, it reverts back to original after you discconnect / exit TeamViewer.

        The free version requires no registration nor login information, unlike LogMeIn. It does not get any simpler to use. It is EASY to explain to someone to download {no installation routine here for the free version} and run it. Five or six mouse clicks and they are done. The free version is a self-contained executable and leaves no trace on your computer after exiting it.

        Upon exit of TeamViewer, good firewalls will detect an effort to “phone home”.

    • #1437480

      I agree that Teamviewer pricing is too high for non-enterprise users – it is – as I recall – somewhat less than it had been a few years ago, what ever comfort that is. They should capitalize on LogMeIn’s “new” pricing structure with a more reasonable fee. For instance you can buy LMI Central for $299/year and still have LMI “Free” installed on dozens of computers – up to 100 I think.

      But where do you find that after “approximately 75 free uses and then the connect time is reduced to 5 minutes”? I don’t see that in their FAQs or elsewhere, and have not experienced it, then again I haven’t counted my sessions (fewer than 75 for sure).

    • #1437518

      Getting back to the original discussion, one thing Teamviewer has that wasn’t on Logmein Free is file transfers. That was only possible on the paid version of LMI

    • #1437521

      I use the file transfer quite a lot…

      Sometimes you can just drag the file over to the remote desktop but sometimes that doesn’t work and you have to use the file transfer option…

      Also, if you plan to do remote re-boots you have to make sure you have your version of Team Viewer running as a service…Which only means to have Team Viewer start with windows.

    • #1437530

      The desktop changing to black thing is not meant to be an indication to anyone that the PC is now being controlled remotely, as some here have assumed. Rather it’s a performance enhancement issue. Why transfer the desktop background if over a slow connection? If you want to turn the remote desktop’s background back on, there is a setting for that.

      Someone else has also noted a change in resolution from one session to the next. Apparently, TeamViewer is sensing a marginal connection and throttling back on the resolution in some cases. If you’re on a solid, fast connection, simply go into the control menu (the tab thingie that’s on the top edge of the screen, and that can be hidden btw) and look for the settings that allow you to “optimize for…” and I believe the options are performance or display, the latter giving you better eye candy.

      Remember, beyond “private” use (and I’d love a definition of what they mean by private), say if you use it to help someone and get paid for it, you owe TeamViewer $795USD to license this baby. I know right? $795! Whew – most expensive software EVER. Well maybe not as bad as PhotoShop, but there too, I mean come on! Apparently we’re dripping with money? A one-off price of $99 maybe, but I’m sorry, $795 really feels like an absurd money grab to me. For this kind of software, anyway. IMHO.

    • #1437533

      My 100% free solution: TightVNC tunneled over an SSH connection using Cygwin. Secure, reliable, and completely configurable. Added bonus: remote shell and SFTP access.

    • #1437549

      Yes DJ, you are right..Turning off the desktop speeds things up…

      I think the high price is due that they sell to a lot of corporations where remote computing is essential…And, if you are making money off remote support it doesn’t seem like a steep price to pay.

      • #1437570

        This a response to some earlier comments.

        Yes, there are other Remote Access alternatives, some free. But, and I am not being derogatory here, most folks beyond pension age need something real simple. And, to me. it does not get simpler than TeamViewer. Have you ever tried to suggest to a non-technical person the need for yet another login name and password for them to remember? Generally, not going to happen. This is required for LogMeIN and others.

        I use TeamViewer A LOT {the free version}. Not for a business, I simply am willing to help a lot of people {I am retired}. I can attest to the approximate 75 free uses as I have been cut off twice {on two different computers via the same ISP}. 75 free uses is not a lot when you consider you may get an unwanted disconnect and/or the remote reboot fails to re-establish the same connection. Some tools for malware removal {Rkill.exe, Combofix.exe} terminate TeamViewer {and, I understand why}.

        I wish TeamViewer had a non-corporate pricing structure that was reasonable. Unless I missed it, I have never seen it offered for $ 299.00 {still too much for me}. I understand the lifetime fee. Whose lifetime? What if they go out of business in a year or less? There goes some of the $ 799.99!

        Oh well, live, learn and adapt.

        • #1437572

          @Ballpoint:

          You can read here what happened to my USB drive when I used it at the fabulous, famed Atlantis Resort in Nassau, Bahamas. Just jump down to the post titled “Internet Access – A Saga”.

          I hardly trust myself, definitely not any hotel or library computer.

          And lastly, what can be so important that you can’t take it along on a USB drive?
          Plus, most email providers have web based access to almost any ISP’s email.

          Travel safely.

        • #1437573

          Some tools for malware removal {Rkill.exe, Combofix.exe} terminate TeamViewer {and, I understand why}.

          I use ComboFix on friends PC’s infected with Malware, I ALWAYS run ComboFix in Safe Mode and when completed I reboot the PC with Remote reboot and click “Wait for Partner” when the friends PC reboots and TeamViewer is started I am reconnected to the PC, you just have to be patient though while the Client PC boots up all the start up programs.

          I have never experienced a reconnect problem.

    • #1437571

      Yes, one of the things I liked about TV was it’s simplicity.

      I only use it on a couple of friends computers to do maintenance and all they do is start team-viewer, email me the password, they go to work and I get to play…

      It’s a great life..

    • #1437583

      Ballpoint, I know you are looking for a FREE solution, but I think you should take a look at Go To My PC. They have a 30-day free trial and the cost thereafter is only $10/month.

      Several years ago, I signed up for a free account and gained access to my Windows desktop using the Safari browser on my daughter’s Mac. It worked great. On subsequent trips I activate my account for one month for $10 and deactivate before the automatic renewal.

      GoToMyPC performs much like LogMeIn and offers file transfer, selectable background disabling, and other features I’ve heard mentioned in this thread. I do not know if GTMPC can be configured to wake on Lan access, but I believe it can. You can remotely reboot the host computer (which can be a lifesaver) but that of course means the software must be made to start with Windows.

      The host screen can be blanked and/or its keyboard locked from the remote pc. The client uses a browser to establish the connection through GTMPC servers. Once established, the connection becomes a direct VPN encypted connection so long as supported on both host and client. Default is a fixed password, but a system of temporary single-use passwords is an option for even greater security.

      I use the remote connection to access my financial software, which in turn accesses my bank. I can access my Bill Pay account to pay bills either directly using the local pc and browser, or I can access Bill Pay as I normally would from my desktop via the remote connection. I leave it to the pundits to decide whether one or the other method is more or less secure.

      One more consideration: My Desktop automatically starts (boots) every morning. In the event of a power glitch, most PC’s shutdown. Mine will restart the next morning, but others could be dead in the water. You may want to consider, at least while you are abroad, configuring your PC to restart itself. Many BIOSes will have a timer start as mine does, but I believe you can configure Windows machines to restart after a power interruption. I don’t remember how to do this, however.

      I hope this gives you another option. When LogMeIn was free, I still used GoToMyPC. Ten bucks was just not significant. Bon Voyage! RonR

    • #1437586

      Has anyone tried Mikogo? I live in the UK so it might not be available elsewhere due to international restrictions blah blah blah, but it’s free, has a file transfer function and I use it to help out my 72 year old dad whenever he has problems on his pc – might be worth looking at?

    • #1437715

      My concern is that some of the people who write malware are really sharp, and it is possible that some malware on the hotel PC which is very well-written could somehow worm its way into the remote session on the hotel computer.

      There have been exactly zero cases of this happening. Again, the main risk is keyboard password captures if you don’t use a VPN. As long as you use a VPN like hotspot shield, you should be fine.

      Jerry

    • #1437749

      I appreciate the info, and I have high regard for the opinions of those who post here, so I will keep this in mind.

      Group "L" (Linux Mint)
      with Windows 10 running in a remote session on my file server
      • #1437767

        I appreciate the info, and I have high regard for the opinions of those who post here, so I will keep this in mind.

        It’s not a matter of malware compromising the Windows kernel, it’s of compromising both TeamViewer and the Windows kernel and compromising TeamViewer in a way that it would send malware laced commands. To be honest, I find this absolutely improbable (I won’t say impossible, but it’s close).

    • #1437770

      I remember well the hotel computer I used at a Marriot (or perhaps a Holiday Inn). It was chock full of adware — stuff kept popping up, and it would bring me to places that I didn’t ask it to. I don’t know exactly what was on the computer, but I wouldn’t be surprised if viruses and other malware were on it.

      I surfed around a bit on the computer. But I didn’t go to any sites which required my username/password. And even though I have the highest regard for the people who post here, no one could have convinced me that it would have been safe to do so on that computer.

      Group "L" (Linux Mint)
      with Windows 10 running in a remote session on my file server
      • #1437828

        I surfed around a bit on the computer. But I didn’t go to any sites which required my username/password. And even though I have the highest regard for the people who post here, no one could have convinced me that it would have been safe to do so on that computer.

        I saw no one suggesting that, quite the contrary. I would never use any of my relevant account login details on an unsafe computer.

        That should not be confused with the possibility of infecting the host computer by the means of a remote session from an infected computer (that does not involve the transfer of infected files).

    • #1437825

      You can run a remote TeamViewer session via browser as long as the app is installed on the target system. The link is near the top right of the team viewer main page; just log in and you have an https session available.

    • #1437943

      For what it’s worth – I’ve used teamviewer to access both my own PC at home (as the original poster wants) and to remote control friends and family’s at their request.

      I have also remote controlled the home PC using the teamviewer app on a tiny samsung phone running android 2.3. once you get the hang of moving the cursor to scroll the screen its the least clunky small screen remote control app I’ve used.

      The post with the most informed and accurate info in this thread (IMHO) is Rick Corbett’s #22 which mentions both the full install on the home PC and the portable version run on the remote device. There is also the standalone exe (TeamviewerQS) which does not remember passwords etc like the portable version.

      The key thing is to choose the option to install as a service on the home PC. I forget whether you choose that at download or at install (it was a while ago).

      I agree with many other posters that it’s beyond the realms of probability that adware or malware can be transmitted via a remote desktop link (and the risk would be the same for logmein, gotomeeting,etc). But don’t disregard the possibility of keyloggers that might be on the hotel PCs. The latest version offers two factor authentication to cover that as well though I have not used it.

      Also – big hotels will probably have some type of Kiosk software installed that resets the machine to a predefined image at each boot – so you’re ‘only’ trusting the IT staff rather than the previous user…..

      You’d need to test remote wake-on-LAN, and or disabling hibernate/sleep modes…
      http://www.teamviewer.com/en/help/401-How-does-Wake-on-LAN-with-TeamViewer-work.aspx

      • #1438024

        Windows Remote Desktop Connection has been around for years, I think, originally for landline connection to your home computer, and it’s still part of the system. ‘Part of the system’ equals ‘free’, unless it’s only on a version you don’t have. Maybe someone knows the history of it, but I was surprised to not even see it mentioned.

        If you want a bit of security you can set the home computer to accept a password-protected login only during certain time slots. I had it all set up at one time and never got around to using it, but I think I’ll take another look at it as a result of this thread.

        Update: visit the KB for Remote Desktop Protocol to view details of the setup for Win 8, Win 7 and Server 2008.

        • #1438187

          Windows Remote Desktop Connection has been around for years, I think, originally for landline connection to your home computer, and it’s still part of the system. ‘Part of the system’ equals ‘free’, unless it’s only on a version you don’t have. Maybe someone knows the history of it, but I was surprised to not even see it mentioned.

          If you want a bit of security you can set the home computer to accept a password-protected login only during certain time slots. I had it all set up at one time and never got around to using it, but I think I’ll take another look at it as a result of this thread.

          Using RDP to connect to a home computer is much more complicated to setup than LogMeIn or TeamViewer, because most home computers use dynamic IP addresses and it also requires setting up port forwarding in the router:

          Use Your Computer From Anywhere: A Guide to Remote Controlling Your PC

          Update: visit the KB for Remote Desktop Protocol to view details of the setup for Win 8, Win 7 and Server 2008.

          That only details how to install an updated version, not how to actually configure a connection.

          Bruce

    • #1438428

      I’m not sure if this is related to my recent installation of TeamViewer or not but tonight when I returned from walking the dog I was greeted by what was clearly someone remote accessing my computer. The cursor was tracking around the screen attempting to open the sign-up information page for the website that I had left open. I quickly disconnected my cable modem. There was no on-screen indication as is common to TeamViewer and Logmein hosts when being accessed. I reviewed open processes in Task Manager and didn’t see anything unusual but that’s not surprising to me. I also removed TeamViewer (possibly for no reason) and scanned for malware with nothing other than the normal assortment of suspicious cookies getting flagged. Any suggestions for avoiding future incursions?

      I must say it was the darnedest thing to see the cursor dancing around the screen before I dropped the ISP connection – definitely not in a good way.

    • #1438435

      @700wlw, welcome to the Lounge!

      For any installed Remote Access software that’s set to run at boot up, ensure that there’s also a secure password/phrase set. If it’s not set to run at boot, ensure you fully close/exit it after each use.

      There’s a large number of bots scanning IP ranges specifically for RDP-type access, it’s commonly used by businesses so the potential pickings could be very rich if they hit on a weakly-guarded ingress point.

    • #1438502

      Wake on LAN via TeamViewer seems like a scam as, when done remotely, it requires another already awake computer on the LAN. In other words, it will not work if all the computers on the LAN are off. The nature of Wake on LAN is that it only works over a LAN. So, to wake up a computer, it needs to be done from an already running computing device on the same LAN.

      The computing device can be a router rather than a computer. A number of Asus routers include Wake on LAN that does not require a computer on the LAN to already be awake. You logon to the Asus router and tell it to wake up the desired computer. Much better solution.

    • #1438705

      Hotel lobby – sleep-in night concierge tempted to increase his income – CCTV.

      Data logger already installed on the lobby PC.

      Just 2 instances of where no remote protocol is needed to gain access to the data needed to own a remote PC and all it contains.

      • #1438780

        Hotel lobby – sleep-in night concierge tempted to increase his income – CCTV.

        Data logger already installed on the lobby PC.

        Sorry but… citations? I haven’t been able to find any examples.

        We’re all entitled to our opinions but when we’re advising others I think we have a responsibility to stay with facts. If there is a risk (which I agree there is… but perhaps ‘possible’ rather than ‘likely’?) then, in my opinion, we should provide factual information together with any available mitigation. What I’m against is the spread of un-substantiated FUD to people asking for help.

        The OP asked whether TeamViewer could be used as an alternative to LogMeIn Free. Since then this topic has veered between discussion of the possible transfer of adware to virus transmission and finally to total compromise of the home PC by a remote attacker. As the topic has become more heated, the most obvious thing missing is evidence to back up some of the views expressed.

        If evidence is provided then great! I would be pleased to see it and have no problem accepting it. It wasn’t my intention to upset anyone (mea culpa) but I try to keep in mind that the OP has already been exposed to any such possible risks by his previous use of LogMeIn Free (which I don’t believe had 2-factor authentication like TeamViewer) and doesn’t appear to have suffered unduly.

        • #1438789

          Sorry but… citations?

          Rick, you have not read the full thread. I posted a link to my real life experience (scroll down to paragraph #4) in a five start resort before.

          … the most obvious thing missing is evidence to back up some of the views expressed.

          Opinions and evidence? Almost an oxymoron IMHO.

          … that the OP has already been exposed to any such possible risks … …and doesn’t appear to have suffered unduly.

          Yesterday I overlooked a stop sign and luckily nothing happened. Does that mean I can now barrel through stop signs?

        • #1438793

          We’re all entitled to our opinions but when we’re advising others I think we have a responsibility to stay with facts. If there is a risk (which I agree there is… but perhaps ‘possible’ rather than ‘likely’?) then, in my opinion, we should provide factual information together with any available mitigation. What I’m against is the spread of un-substantiated FUD to people asking for help.
          [/quote]

          We obviously have different opinions about advising others, especially in what relates to security. Computer security should be much more about preventing breaches, than plugging holes after the fact. That means avoiding or minimizing potentially risky behaviors, like using passwords in an environment you don’t know is safe.

          No one here spread FUD. What I saw was people alerting to potential risks and people expressing opinions on how they would behave, if they were in similar situations to the ones presented here. If you are going to deny the risks here are to be dismissed, do it at your own risk. I actually think that by downplaying such risk and suggesting that, because no one will offer a concrete case where someone used a password in an unsafe place and got hacked, you are inviting people to incur in such risky behavior. You are obviously free to do it, but that also means that you are, in my opinion, providing advice that can be costly to anyone who indulges in the behavior in question and gets affected by it. Fortunately, the majority opinion differs from yours, so I think regular users will have enough input to make their own opinions on the subject.

    • #1438790

      A fact for you, Rick: when you leave the safety of your own home and it’s secure computing environment and access a strange computer in a foreign country, you have no idea how secure that computer or it’s network is or who is looking over your shoulder. No citations needed.

      • #1438875

        A fact for you, Rick: when you leave the safety of your own home and it’s secure computing environment and access a strange computer in a foreign country, you have no idea how secure that computer or it’s network is or who is looking over your shoulder. No citations needed.

        Even in your own neighborhood; you don’t have to travel far to find such computers.

        Group "L" (Linux Mint)
        with Windows 10 running in a remote session on my file server
        • #1439709

          I hope the following suggestion is relevant and worthy:
          Just recently, I was at a Fry’s Electronics store and they had a dual-HDD NAS enclosure at a ridiculous price of $40 (w/o HDDs) which regularly sells for $100.
          For this silly price, I thought that it would be worthwhile to play around with it.
          This NAS device is called “myDitto Classic” (http://classic.my-ditto.com/interior.php?section=Benefits_Of_my-Ditto) and the package also contains two USB fobs.
          The user manual is over a 100pages and I am still learning how to get the maximum use out of all of its features.
          But one thing that I have noticed (upon stuffing two 1TB HDDs on pull-out caddies) is the fact that your PC does not have to powered up to get access to the device remotely, as long as your network modem that you connect the NAS to is up/on.
          You can remotely connect to the NAS by plugging in the activated USB key fobs that contain your log-in credentials.
          One of the USB key fobs is for the ‘administrator’. You can also activate and share many more USB key fobs for other family members and/or other users (Administrator sets up the permissions for each user that is trusted with one of the USB fobs and they can be deactivated if desired).
          Each HDD contains a top-level ‘private’ folder, a ‘shared’ folder, and a ‘public’ folder.
          Besides being able to use these USB key fobs for NAS access remotely, the manual states that the device can also be accessed via free apps for both Apple and Android systems.
          Thus far, I have only experimented with using the NAS on my local network (LAN). Using DLNA and uPNP (both Win8 and Android), i have been able to stream audio and video content on my TV, via my DishNetwork Hopper DVR, a networked audio PreAmp as well as using my Android-based Patriot Box Office streaming video player. Thus far all of this has been accomplished in my LAN w/o the key fobs since the A/V content that I copied to the HDD is in the ‘public’ top-level folder.
          I have also been able to successfully access a variety of my files (non A/V content) using a Toshiba laptop via a WiFi connection to my network.
          It will probably take me at least a few weeks to explore all of its capabilities remotely but this myDitto NAS device may allow you to access all of your data remotely from anywhere in the world AND w/o having your PC on.
          The trick would have to be to replicate your data directories onto one of its 2 HDDs using a WinOS sync application: Such as Microsoft’s own free SyncToy (http://www.microsoft.com/en-us/download/details.aspx?id=15155) or any other such free utility.
          If data redundancy is of prime importance, this myDitto NAS box allows a few RAID options during initial setup << FWIW.

          • #1439969

            Rick, you have not read the full thread. I posted a link to my real life experience (scroll down to paragraph #4) in a five start resort before.

            Eike – I’m not denying there may be a risk of using a hotel PC (in any country) but I think the OP would be better served by a reasoned discussion of potential risk using facts backed up with evidence rather than unsubstantiated claims and assumptions. Whilst it may be a fact that your USB stick contracted a virus in a foreign hotel (yes, I did read the full thread and your own experience before posting), it does not necessarily mean that the OP’s use of Teamviewer will result in the remote compromise of his home PC. Sorry but… a local exploit involving physical access shouldn’t be used to ‘prove’ there is a risk using a remote access protocol.

            A fact for you, Rick: when you leave the safety of your own home and it’s secure computing environment and access a strange computer in a foreign country, you have no idea how secure that computer or it’s network is or who is looking over your shoulder. No citations needed.

            Satrow – If I was to opine that the sky was green then I would expect to be challenged unless I could provide proof. If I could provide a citation then we may be able to enter into a discussion why the sky appears green where I am yet blue where you are. However, evidence to back up statements doesn’t seem to be required in this topic and I don’t understand why not.

            We obviously have different opinions about advising others, especially in what relates to security. Computer security should be much more about preventing breaches, than plugging holes after the fact. That means avoiding or minimizing potentially risky behaviors, like using passwords in an environment you don’t know is safe.

            No one here spread FUD. What I saw was people alerting to potential risks and people expressing opinions on how they would behave, if they were in similar situations to the ones presented here. If you are going to deny the risks here are to be dismissed, do it at your own risk. I actually think that by downplaying such risk and suggesting that, because no one will offer a concrete case where someone used a password in an unsafe place and got hacked, you are inviting people to incur in such risky behavior. You are obviously free to do it, but that also means that you are, in my opinion, providing advice that can be costly to anyone who indulges in the behavior in question and gets affected by it. Fortunately, the majority opinion differs from yours, so I think regular users will have enough input to make their own opinions on the subject.

            Rui – I agree with some of what you say but I don’t think I was downplaying any risks. Instead I was expressing doubt and trying to provide a balance to some of the more extreme claims in this topic that, for example, the OP’s PC “will become infected and compromised” by the use of TeamViewer. Sorry but no-one has provided any evidence that’s it’s possible to pass any type of malware using TeamViewer and other posters have discounted such claims, not just me. In my opinion it’s these sorts of unsubstantiated claims which need to be challenged… hence my reference to FUD. As I mentioned in an earlier post, I’ve been using TeamViewer for years to connect back to my home PC, many times from hotel PC’s in foreign lands. Guess what… home PC still not compromised. I don’t think this was just luck. As a senior IT officer in local government (specialising in remote access and malware detection/removal) I believe I have a good understanding of what’s possible and what’s not. I also take precautions, e.g. by using a USB stick with a write-protect switch (which was quite hard to find) when I can’t reboot into my Linux live USB stick in order to run TeamViewer.

            If you check back you will find that the only advice I have provided is to “Download and install TeamViewer Host on the intended host device” (post #22), nothing more. What I should have added for the benefit of the OP was to take the additional step of registering a free account with TeamViewer so the OP could then set up and use two-factor authentication (using a smartphone). This would mitigate (if not negate entirely) the risk of any keylogger capturing the login to the remote TeamViewer host.

            Regards,

    • #1439975

      Rick, you agree that there is a risk (“If there is a risk (which I agree there is… but perhaps ‘possible’ rather than ‘likely’?)” and “I’m not denying there may be a risk of using a hotel PC … “) yet you want me to provide citations or what I’m suggesting is FUD?

      I’ve not suggested that anything “will become infected and compromised” by the use of TeamViewer or “that’s it’s possible to pass any type of malware using TeamViewer”.

      The risk is in using any computer that’s not under your own control to input sensitive data. Data interception/logging can happen before it reaches the software that uses whatever encryption/protocol put in place to protect it during transmission.

      You win the argument about colours though, providing that you can produce documentary evidence that you have “normal colour vision”, because I couldn’t.

    • #1439977

      Satrow, with respect, I asked you to back up two statements you made… you chose not to. That’s fine… I didn’t come here to argue but, instead, tried (and obviously failed) to keep the topic on topic and accurate, i.e. verifiable.

      I’ve never denied there wasn’t a risk using a hotel PC but the OP was asking solely about TeamViewer… so I restricted my comments to the possibility of risks of using TeamViewer. I also refuted a statement (not made by you), as did others – including another moderator – that the OP’s home PC “will become infected and compromised” by using TeamViewer. The OP was asking for help and, in my opinion, this statement was not helpful.

      • #1439995

        I also refuted a statement (not made by you), as did others – including another moderator – that the OP’s home PC “will become infected and compromised” by using TeamViewer.

        Rick,

        Please point out the post where a moderator stated that.

        Like satrow, I disagree with the statement about infection, but the keylogging scenario is not only possible, but even likely. So, contrary to you, I think this thread has been quite useful, because it addressed not only the technical feasibility of using TeamViewer, but also the potential risks of using it in an unknown computer, where the risks associated with its use seem quite clear to me. To help other people, I have quite a few years back, researched monitoring software and between key logging and screen capturing, the risks seem pretty obvious to me. So we could talk not only about keyloggers capturing whatever was typed from the hotel PC – which satrow addressed in a clear and understandable manner – but also other risks to privacy that could result from screen capturing software. I have seen it in use and it’s quite effective.

        Of course, the potential presence of keyloggers do not raise risks solely related to TeamViewer login, which means two factor authentication would only serve to protect against the hijacking of the TeamViewer account. Two factor authentication, however, requires a smartphone and I fail to see why the user should incur in additional risk by using an unknown (and thus unsafe) PC to login to his home computer, when the TeamViewer app for the mobile OS of the smartphone could be used instead. Yes, the screen will be much smaller, but I would take that compromise over the obvious risks already described about the use of the unknown PC.

        Security implementation involves strict adherence to safe practices. It’s when those practices are abandoned that many breaches occur, whether they result from social engineering or from lowering the guard from a technical point of view. Using the hotel computer would represent, IMHO, one of the occasions that could be described as lowering the guard. I can’t recommend it in any possible way.

    • #1440028

      Rui – PM’d you about “Please point out the post where a moderator stated that.”

      Rui/Satrow – I accept that both of you (and others) are against using a hotel PC. I believe that – with mitigation – it is an acceptable risk if precautions are taken (and accurate advice given). I think most – not all – of the posts have provided useful discussion but perhaps we need to agree to disagree about using a hotel PC.

      PS – I’ve tried to use the TeamViewer Mobile app on an iPhone, iPad Mini and iPad 2. It’s, umm, really not very good… hence my comment about “Still a way to go with their Android and iOS clients but that’s only my opinion”.

    • #1440116

      Rick,

      I don’t see how you mitigate against a keylogger or malware installed in an hotel computer, unless you install security software or run multiple security packages on the computer, that can provide enough assurance against any such malware. I think restricting this to a matter of ensuring legitimate access to the TeamViewer account is not a correct way of seeing things. Of course, if you think the risk can be mitigated, I would like to know how you think that could be accomplished.

    • #1440144

      Rui,

      I have 2 USB sticks – one’s an old 2 Gb running a Linux Live build of Ubuntu with the TeamViewer tar.gz on it (as this doesn’t need to be installed). The other’s an even older 256 Mb one (the only one I could find with a write-disable switch).

      If I can (i.e. am able and/or allowed) then I re-restart the PC and use a Boot Menu key to boot directly into Ubuntu then run TeamViewer. (It’s surprising how many foreign hotel PC’s are either HP or Dell but I have other Boot Menu keys recorded on my phone in case the BIOS prompts have been disabled.) It’s often a little slow to boot but in my opinion it mitigates the risk of a software keylogger (yes, I check for hardware keyloggers). I also use this for my mail. I’ve found most hotels will allow this if you explain why but many ‘managed’ PC’s tend to have this disallowed in the BIOS.

      If the BIOS is locked down or I’m not allowed to re-boot into my Linux Live USB stick then I use the write-disabled 256Mb USB stick to run AutoRuns, Process Explorer, GMER, TCPView, etc. to check for/curtail suspicious activity before I run the portable TeamViewer app. This is even slower preparation time but (I’m often sat there with a drink so) I don’t mind. This helped me avoid potential compromise of my USB stick when I had no option but to use TeamViewer to remote into a relative’s PC from a malware-infested cyber cafe PC in Malaga.

      Now TeamViewer 9 is out I’m thinking about adding two-factor authentication using my smartphone. I haven’t got round to this yet as I don’t yet know if there will be any roaming charges (I guess so) and I’m still testing the TeamViewer Mobile versions on iOS and Android.

    • #1440229

      Well, the first option seems reasonably safe, the 2nd not so much. More advanced malware will make itself invisible to the OS and your manual check may fail to find anything, even in presence of malware. I definitely wouldn’t use the 2nd option.

    • #1440345

      All these problems and argument because of our litigate-craze society.
      Responsible public persons, like people here, must protect themselves by covering all grounds.
      Everybody tries to talk like a lawyer.

      I am told a ladder has no less than 16 red stickers on it. One of which says, to this effect, “It is harmful to use as a ladder. Using the ladder may cause bodily harm …” [The statement is VERY VERY true. What is wrong with it?]

      All securities are breakable. It is a matter of when.

      Commonsense says, none is secure. Common sense also says if it is not that common, it is OK.
      The grey area is: What is ‘not that common’?
      Is 1 sigma common, 3 sigma? 6 sigma good enough? [sigma=Standard Deviation]
      I’ll let you decide.

      Yes, I’ll NOT use a hotel PC.
      Though in a bind, I WOULD.
      For that I bring a bootable LinuxCD, a bootable USB Linux, a USB SD card reader and SD cards. One SD is portable VM with full install TeamViewer and remote access. One SD is Portable TeamViewer SD. I also have encrypted files in them (such as passwords in a text file. I am forgetful).


      @Rick
      , as for hard to find USB flash drive with a switch, I have been using this several years:
      a USB SD card reader, with SD card in it, and the SD card switch set to read-only. I only use SD card up to 32G. Some PCs cannot read xSD (64G and up).

      Avoiding hardware key logger is a real problem, also video monitoring.
      One solution I use is open my password text file. The passwords in it are embedded in random letters. I’ll copy and paste the whole line (or shorter). Use delete/backspace to the proper password. I also bring with me a USB flexible foldable keyboard. This avoids keylogger somewhat (obviously not totally).
      Video monitor is hard to avoid; can only use hand/body covering the monitor.
      As I said, no absolute. But make it less likely.
      For the argumentative, yes, all security is breakable.
      My point is to make it less likely, and harder/less profitable for the hacker.
      Is it ‘good enough’? Well, same point here: Is 1 sigma good enough, 3 sigma, 6 sigma?

      The MOST important is:
      Is it convenient and not dragging you down from work efficiency?
      My way is one time preparation. Light on travel.
      Surely not for everyone. But this is all this forum is about: share the knowledge and experience.

      • #1440376

        All these problems and argument because of our litigate-craze society.
        Responsible public persons, like people here, must protect themselves by covering all grounds.
        Everybody tries to talk like a lawyer.

        Just so you’ll know, my concerns have nothing to do with protecting myself from potential litigation. In fact, that thought has never, ever entered my mind when I have used a public PC.

        Group "L" (Linux Mint)
        with Windows 10 running in a remote session on my file server
    • #1442400

      Have a look at this article about 5 virtual keyboards tested against 12 commercial paid keyloggers. I’ve added the 2 top-performing ones to my utilities USB stick.

    Viewing 43 reply threads
    Reply To: Views of TeamViewer?

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: