![]() However, I only ever install the single ‘TeamViewer QS’ executable (without any shortcuts in any startup folder)… so it must be started manually and cannot be configured for unattended access. I use TeamViewer a lot and install it on my family’s and friends’ PCs/laptops. always running and with a static password. None of the articles I’ve read about ‘hacks’ make any distinction between how TeamViewer is actually being used so it’s possible (probable?) that Host mode is the issue… i.e. However, if TeamViewer is used in ‘host mode’ for unattended access (either by configuring the standard TeamViewer client or by using the dedicated ‘TeamViewer Host’) then a single, non-changing password is used and the executable runs as a service from startup. You’re quite correct that for normal use, the standard TeamViewer client and ‘TeamViewer QS’ (Quick Support) both use passwords that change on each use. I suspect there may be confusion between the different versions and modes of TeamViewer. The p/w’s are new each time, so don’t see how hackers could access. ![]() ![]() I have two disabled relatives and log into their machines about once a month to solve something.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |