• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   Remote Help for Family and Friends – Part 1: Installing and Using TeamViewer

Remote Help for Family and Friends – Part 1: Installing and Using TeamViewer

  • Posted on:May 9, 2014
  • Posted in:Security
  • Posted by:
    Michael Miley
1

If you’re the computer geek among your family and friends, you’ve probably heard these (or similar cries), ringing in your ears at any time of day:

  • “Honey, it’s mom. My email keeps crashing! Can you come over and fix it? Think of it as my Mother’s Day present!”
  •  “I’m getting an error message when I try to print—and I need to print this report by tomorrow!”
  •  “My computer has gotten really slow. Is there anything you can do to speed it up?”
  • “You told me I should use a different password for each online account—but then I couldn’t keep track of them all. So I put them in a notebook—and now I can’t find it! What should I do?”
  •  “I think I might have a virus. I’m getting a weird message saying something about a firewall violation.”

Rather than rush across town to fix these and other problems (assuming I even live near enough to do so), I use TeamViewer remote access software, so I can manage the ailing computers remotely. (TeamViewer is free for personal use; if you’re a business user, you must pay for it.)

Once connected, I can do pretty much anything I need to do. I can fix the email crashes, update a printer driver, install DirectPass so the users can manage their passwords, the machine for better performance, and even launch Titanium (aka Trend Micro Security) to scan and check the computer for spyware and viruses.

In this 3-part series, I’ll show you how it works.

Install TeamViewer

1. On the “base” computer you’ll use to access the remote computer, go to the TeamViewer website at www.teamviewer.com. The TeamViewer website appears.

 

2. If you’re using Windows, click the Download button to download TeamViewer. Otherwise, go to the download page for Mac, Linux, and Mobile downloads.

3. When the download dialog appears, save a copy of the TeamViewer installer to your desktop.

4. Once TeamViewer has finished downloading, double-click the TeamViewer installer to begin the installation. The setup dialog appears.

 

 

5. Choose Basic installation and Personal / Non-commercial use. Note that you can also choose Installation to access the computer remotely (unattended), but I suggest you activate this feature later, once you get to know TeamViewer and have had time to address any security concerns. I’ll show you how to do this in Part 3 of this series.

6. Click Accept – finish. TeamViewer installs and a shortcut appears on your desktop.

7. Repeat the above process on the remote computer—or have your friend or family member do the same.

Access the Remote Computer

1. Once TeamViewer is installed, double-click the TeamViewer shortcut on both computers. The Remote Control Console appears on both systems.

 

2. In the Control Remote Computer panel, enter the Partner ID that’s displayed on the remote computer into in the Partner ID field on the base computer and click Connect to Partner. A TeamViewer Authentication dialog appears.

 

3. Enter your partner’s randomly-generated password into the dialog and click Log On. The remote computer desktop appears, with a TeamViewer Menu at the top and the TeamViewer Session Dialog displayed in the lower right hand corner.

 

 

You now have full access to the remote computer and can begin your troubleshooting or maintenance tasks! I’ll provide some sample tasks in Part 2 of this series.

4. For now, click the arrowed tabs in the TeamViewer Menu and Session Dialog to minimize them; or click the Close box in the upper right corner of the Session Dialog when you want to end the remote session.
5. The first time you close a session for this remote computer a wizard appears so you can give this ID a name, attach it to a TeamViewer account, provide a personal password, and add it to your Computers & Contacts list.
6. In Step 1 of 2, you’re prompted first to create a free TeamViewer Account.

 

 

7. Ensure Create a free TeamViewer account is selected, then enter your name, email address, and password and click Next. In Step 2 of 2, your account is created and you’re prompted to give the ID of the remote computer a name.

 

 

8. Accept the default name, or below the TeamViewer ID enter a friendlier name in the Alias field (e.g., Mom’s computer), and click Next. The wizard completion screen appears.

 

 

9. Click Finish. You now have a TeamViewer account and a name for the partner computer in your Computers & Contacts list. When you’re logged into your account, you can use this Partner ID or Alias in the future to access the remote computer.

 

 

In Part 2 of Remote Help for Family and Friends, I’ll connect to the remote computer to actually do some maintenance tasks. In Part 3, I’ll show you how to set up unattended access and provide some security tips.

I manage Trend Micro’s Technical Product Marketing team for consumers and the opinions expressed here are my own.

Related posts:

  1. Remote Help for Family and Friends – Part 2: Doing Remote Maintenance
  2. Remote Help for Family and Friends – Part 3: Unattended Access and Security Tips
  3. Internet Safety for Kids Requires Parental Controls and Family Trust
  4. Got AV? Good Start! Now it’s Time to Protect Your Entire Family

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.