LEARN MORE ABOUT DESKROLL

DeskRoll Blog

How to Remotely Access Another Computer Over the Internet

There are a lot of ways to access a remote computer over the Internet. Most operating systems come with some built-in solutions to remotely accessing computers or devices. In addition to built-in tools, many vendors offer 3rd party products for remote access or remote assistance. In this article we will review a few tools that you can use to remotely access another computer whether for it's for your work or personal needs.

Maximizing Remote Access And Remote Desktop Security

VNC and OpenSSH

 

Remote access is obviously a very sensitive (often we’d call it intimate) matter. So, security is a major concern here. Many remote desktop software vendors claim their products are secure, but sometimes the details are a bit vague. Let’s try and figure out what we need to know when choosing remote access tools.

An Instant Messaging Guide to Privacy

We surely want all our private conversations to stay private. This is but simple and natural for any person. If we text or voice chat with someone, we want to be sure this space is personal and well-protected. Especially given that we occasionally send sensitive information that may be related to our family, health or business.

Making Internet Access Safer: DNS Security

 

No doubt Internet has dramatically changed the way people live and work. All this has been made possible by a set of different technologies. But nothing is perfect. Those technologies are not an exception. One of the core parts of the Internet is the Domain Name System. DNS does have certain issues but the respective organizations are working hard to continuously improve it. Below we’ll explain what DNSCrypt is and how it helps users, and we’ll provide instructions how to set it up.

Making Your Android Gadget More Secure

In our previous Android security roundup we made a breakup of major Android versions for smartphones vs. their security. In this roundup we’ll be providing apps and system settings for better Android security.

Setting Up Wake On LAN (Also On Macs)

Do you often need to remotely access a powered off machine? Even if it’s a rare occasion, it’s often “you get remote access or you drive 80 miles”. That’s why you rely on Wake on LAN. WOL certainly requires some setup, depending on the OS, and it has certain caveats that we explore in this guide.

This guide is now available in the Help section here.

A Short Review of CRMs for Computer Repair Shops

While a CRM system may automate many workflows within a company it is mostly concerned with customer relations. It’s designed to automate mundane jobs like report generation (including financial reports) and support interaction with the customer, keeping all your data and processes in a centralized manner: store contact information, conversation and billing history, streamline lead generation, do template-based replies, escalate tickets, etc. On one hand, it saves you time and effort. On the other hand, it improves customer experience with your company. An all-around win.

Setting Up Ultra Budget Video Surveillance in No Time

Video surveillance is ubiquitous and – more interestingly – comes handy in IT maintenance and diagnostics. Also, watching your rigs, boxes and wires properly blinking/hanging is a pure delight! Let’s see how we can setup simple video surveillance in no time, and on a very tight budget. 

Remote Access to a Headless System: 10 Things to Consider

Headless of course means no physical display is attached to the machine. “Headless” naturally also applies to machines in the cloud. In this illustrated guide we’ll show that when it comes to no-display boxes, there are pitfalls and best practices worth keeping in mind.

Optimizing Windows Startup Performance Using Autoruns

It’s not uncommon that with time Windows may take way too much time to start up. One of the reasons for bad startup performance are the applications that are launched during boot up.