Back again with another how-to. This is a follow on which covered how to exit our Teamviewer remote support tool in order to use a version from another supplier. This guide will instead show you how to create a custom password so that you don’t have to switch tools. Again, this should only be required if someone you trust is requesting access to your PC, for example to support your software. 1. Find the Teamviewer icon in your task tray. Right click to open the menu, and left click to open the “Options”. 2. Click “Security” then click “Manage […]
How to exit Teamviewer Host when in use by MSP or IT company. Here at Atcom, our Remote Management and Monitoring tool uses Teamviewer for remote control access to servers and endpoints. Teamviewer is a popular remote desktop program for many companies in the IT space, however the hosted version sometimes doesn’t play nice with ad-hoc versions. The following instructions will hopefully assist you in getting support from these companies that use Teamviewer to remotely assist without interfering with your IT companies support tools. Locate the Teamviewer icon. Click the “show hidden icons” button on your task tray if you […]
We know that some people are dragging their feet about upgrading to Windows 10, the latest and greatest offering for the Microsoft desktop operating system. According to Microsoft and other third-party calculations, 292 million systems are powered by the new OS, which is still less than a year old. If you’re someone who likes to hold off on upgrading, we’d like to offer a few of our favourite features of the new OS to perhaps spur you on. Don’t forget you only have until July 29 this year to obtain the upgrade for free (for qualifying existing installations). Wes: Improved […]
Ransomware Alert Hi everyone. We’ve just received word from our friends at Trend Micro that a new version of TorrentLocker is doing the rounds disguised as a fake Australia Post website. We advise users: Do NOT enter Captcha codes to any postal tracking site. Do NOT open attachments from emails you aren’t expecting. Confirm the URL in the address bar in your browser for any website you visit. Alert us immediately if you receive any suspicious email – email@example.com
We’ve now had several cases of a Trojan infecting PCs and encrypting local user data, as well as data on shared server drives. If you see an error message like this, please turn off your computer and get in touch with your IT support immediately. This program will silently reach out to the Internet to download executables, which will in turn encrypt your data and hold it to ransom. If caught early enough, it is possible to recover data. However, always ensure you have a good disaster recover solution in place.
We’ve had several reports of calls received from people claiming to be from “Microsoft” or “Telstra”, on numbers like 0011 976 000. The caller will claim your PC is infected or has errors and will offer to fix you up remotely. You will then be directed to install a remote support tool, which will give the caller complete access to all your data. Usually, they will walk you through to the Windows event log (shown below) and claim these errors are breaking your computer. These errors are mostly normal Windows behaviour, and nothing to be concerned about unless you are […]