How to connect Samsung Galaxy S4 to windows phone

Samsung Galaxy S4

I am not new using Android phones, in fact Samsung Galaxy S4 is the 3rd Android phone I have. I had Galaxy Note 1 and 2 before and backing up the photos and videos is just a piece of cake(Just plug the thing on your pc and then it will automatically detect it and connect as a normal USB device) . Now I’ve got my S4 and run out of memory I needed to backup my photos and videos before freeing up space, I was surprised. When I plugged it on my pc, it was not even get detected, I tried using 5 different USB’s and none of them connected my S4 to the PC. I searched the net and found one that helped me connect android phone to pc and this is how.

The Samsung Galaxy S4 is a monster smartphone. I will quickly walk you through how to connect your Samsung Galaxy S4 to a PC and transfer data between both devices.Once connectivity is achieved, you can transfer files using the interface of your operating system. In Windows, you can find the device listed as removable disk under Computer, while Mac users can find the device listed on the Finder.
 

KIES FOR ANDROID PHONES

KIES FOR ANDROID PHONES

Kies:
This is a graphical user interface that allows for transfer of music, photos, and videos between your Samsung Galaxy S4 and your PC. To download this App, for Windows or Mac, visit the Samsung website.

File Format Supported By Samsung Galaxy S4: The Galaxy S4 supports audio files in WAV, MP3, AAC, AAC+, eAAC+, AMR-NB, AMR-WB, MIDI, XMF, EVRC, QCELP, WMA, FLAC, OGG formats and video files in Divx, H.263, H.264, MPEG4, VP8, VC–1 (Format: 3gp, 3g2, mp4, wmv.

3 Easy Steps To Connect Samsung Galaxy S4 To PC

 

kies

1. If you are a Windows user, simply download and install the USB drivers for the Galaxy S4. Mac users do not need to install any software.

2. Connect the device to an available USB port using any generic USB cable.

Drag
3. A prompt will appear on the screen of the phone. Drag the notification area down, and make a selection of your choice. That’s it. Have a happy time backing up your phone.

Some troubleshooting guide on fixing computer that won’t turn on!

pcwontboot Starting the day with a computer that won’t turn on is very frustrating. There are many reasons why a computer won’t turn on and often very few clues about what might be the problem. The only symptom is usually the simple fact that “nothing works” which isn’t much to go on.Add to this the fact that whatever is wrong could be an expensive part of your PC to replace – like the motherboard or CPU. Do not fear because all may not be lost! Here’s what you need to do:Read #1 below (it’ll make you feel better). Pick the best troubleshooting guide (#2 – #9) based on how your computer is acting or #10 if your PC stops at any point because of an error message.Note: All of these “computer won’t start” troubleshooting guides apply no matter what Windows operating system you have installed on your hard drive, including Windows 8, Windows 7, Windows Vista, and Windows XP. Steps 1 through 5 even apply to other PC operating systems like Linux.

Do not fear because all may not be lost! Here’s what you need to do:

  1. Read #1 below (it’ll make you feel better).
  2. Pick the best troubleshooting guide (#2 – #9) based on how your computer is acting or #10 if your PC stops at any point because of an error message.

Note: All of these “computer won’t start” troubleshooting guides apply no matter what Windows operating system you have installed on your hard drive, including Windows 8, Windows 7, Windows Vista, and Windows XP. Steps 1 through 5 even apply to other PC operating systems like Linux.

1. Don’t Panic! Your Files are Probably OK

Files and Folders - Your Files are Probably OK

When faced with a computer that won’t start most people tend to panic, worried that all the data on their PC is gone forever.

It’s true that the most common reason a computer won’t start is because a piece of hardware has failed or is causing a problem but that hardware isn’t usually a hard drive, the part of your computer that stores all of your files.

In other words, your music, documents, emails, and videos are probably safe – just not accessible at the moment.

So take a deep breath and try to relax. There’s a good chance you can figure out exactly why your computer won’t start and then get it back up and running.

2. Computer Shows No Sign of Power

Computer Shows No Sign of Power

Try these steps if your computer will not turn on and is showing no sign at all of receiving power – no fans running and no lights on the computer case.

Important: You may or may not see a light on the back of your PC depending on the kind of power supply you have and the exact cause of the problem.

Note: Don’t worry about the monitor yet. If the computer is not turning on because of a power issue then the monitor certainly can’t display anything from the computer. Your monitor light will likely be amber/yellow if your computer has stopped sending information to it.

3. Computer Powers On… and Then Off

Computer Powers On and Then Off

Follow these steps if, when you turn your computer on, it promptly powers back off.

You’ll probably hear the fans inside your computer turn on, see the lights on the front of your computer turn on or flash, and then it will all stop. You won’t see anything on the monitor and you may or may not hear beeps coming from the computer before it shuts off by itself.

Note: As in the previous scenario, don’t worry about the state your monitor is in. You may have a monitor issue as well but it’s not possible to troubleshoot it quite yet.

4. Computer Powers On But Nothing Happens

Computer Powers On But Nothing Happens

If your computer seems to be receiving power after turning it on but you don’t see anything on your monitor, try these troubleshooting steps.

In these situations, the power lights will stay on, you’ll likely hear the fans inside your PC running, and you may or may not hear one or more beeps coming from the computer.

This situation is probably the most common in my experience working with computers that won’t start. Unfortunately it’s also one of the most difficult to troubleshoot.

5. Computer Stops or Continuously Reboots During the POST

Computer Stops or Continuously Reboots During the POST

Use this guide when your computer powers on, shows at least something on the monitor, but then stops, freezes, or reboots over and over again during the Power On Self Test (POST).

The POST on your computer may look like the screenshot to your left or may instead simply show your computer maker’s logo.

Important: Don’t use this troubleshooting guide if you encounter an issue during the loading of the operating system, which occurs after the Power On Self Test is complete. Troubleshooting Windows related reasons why your computer won’t turn on begin with #6 below.

6. Windows Begins to Load But Stops or Reboots on a BSOD

BSOD - Computer Turns On But an Error Prevents Windows From Loading

If your computer begins to load Windows but then stops and displays a blue screen with information on it then try these steps. You may or may not see the Windows splash screen before the blue screen appears.

This kind of error is called a STOP error but is more commonly referred to as a Blue Screen of Death or a BSOD. Receiving a BSOD error is a common reason why a computer won’t turn on.

Important: Choose this troubleshooting guide even if the BSOD flashes on screen and your PC restarts automatically without giving you time to read what it says.

7. Windows Begins to Load But Stops or Reboots Without an Error

Windows Begins to Load But Stops or Reboots Without an Error

Try these steps when your computer powers on, starts to load Windows, but then freezes, stops, or reboots over and over again without generating any kind of error message.

The stopping, freezing, or reboot loop may happen on the Windows splash screen as shown to the left or even on a black screen, with or without a flashing cursor.

Note: If your computer won’t start and you see a blue screen flash or remain on the screen, you’re experiencing a Blue Screen of Death and should use troubleshooting guide #6 above.

Important: If you suspect that the Power On Self Test is still going on and that Windows has not yet started to boot, a better troubleshooting guide for why your computer won’t turn on might be #5 above. It’s a fine line and sometimes hard to tell.

8. Windows Repeatedly Returns to the Advanced Boot Options Screen

Windows Repeatedly Returns to the Advanced Boot Options Screen

Use this guide when nothing but the Advanced Boot Options screen appears every time your restart your computer and none of the Windows startup options work.

In this situation, no matter which Safe Mode option you choose, your computer eventually stops, freezes, or restarts on its own, after which you find yourself right back at the Advanced Boot Options menu.

This is a particularly annoying way in which your computer won’t turn on because you’re trying to use Windows’ built-in ways to solve your problem but you’re getting nowhere with them.

9. Windows Stops or Reboots On or After the Login Screen

Windows Stops or Reboots On or After the Login Screen

Try this troubleshooting guide when your computer powers on, Windows shows the login screen, but then freezes, stops, or reboots here or anytime after.

The stopping, freezing, or reboot loop may happen on the Windows login screen, as Windows is logging you in (as shown to the left), or any time up to Windows fully loading.

10. Computer Doesn’t Fully Start Because of an Error Message

NTLDR is Missing

If your computer turns on but then stops or freezes at any point, showing an error message of any kind, then use this troubleshooting guide.

Error messages are possible at any stage during your computer’s boot process, including during the POST, at any time during the loading of Windows, all the way up to the Windows desktop appearing.

Note: The only exception to using this troubleshooting guide for an error message is if the error is a Blue Screen of Death. See #6 above for a better troubleshooting guide for BSOD issues.

iPad 3 Screen & Glass Repair DIY

broken ipad glass

So you just had your new ipad. Your so happy using it, took care of it and even baby it, and all of a sudden in an unprecedented event it slipped off your hand, your kid throw it, your partner sat on it, or something fell on it. The result, a broken screen. I searched net and saw on one forum the cost  of using apple service center would cost USD 200.00 or more. Wow its almost the amount of getting a new second generation Ipad. And using a third party repair shop costs USD 99.00. Wow, even though its lower than the cost on apple’s service center its still expensive. Unless, you want to do it yourself, there are kits that is available online for as low as USD 40.00. Tedious, but looks tempting. Watch out this demonstration on how to do it yourself.

How to change backup Location of Iphone, Ipad, Ipod on Windows/Mac

IOS

Backing up of your IOS devices is the best preventive maintenance in case the device was stolen and damaged. By default your devices writes the backup on the Operating System’s default installation drive. Well, on certain times you can use the icloud in which a free 5 GB data storage is available for you, that’s in case you only need 5 GB, in excess to this you will need to pay for the additional icloud storage. So most certain, if you prefer to just have the backup on your local computer on a separate data disk here’s how you can link the existing device backup path to a different disk/location(usually a portable external storage).

backup_device

external backup device

OS X

1) Make sure that iTunes is closed.

2) You will now move your folder called ~/Library/Application Support/MobileSync/Backup/ to the drive you want to back up to. For instance, an external drive or secondary drive within your computer. Whichever works for you.

3) Launch Terminal Applications/Utilities/Terminal and type in the following command line:

ln -s /Volumes/DriveName/Backup/ ~/Library/Application\ Support/MobileSync/Backup

In the above example, ‘DriveName’ would be the name of the new backup location.

(Credit: Link)


Windows XP

1) Ensure that iTunes in closed.

2) Download Junction ( Or you can use MKlink for Windows, which will make things a little different in the command prompt)

3) Unzip Junction.exe to your username folder, which is usually found in C:\Documents and Settings\

4) You will now create a folder for the your backups where you want them to save. From there, you will move your current backup folder to that new location.

a) The default location of that backup folder is here: C:\Documents and Setting\username\Application Data\Apple Computer\MobileSync

b) You will now put it in the new location you want your backups to save to, such as an external drive.

5) Now run the Command Prompt and type the following:

junction “C:\Documents and Setting\\Application Data\Apple Computer\MobileSync\Backup” “H:\Backups\iPhone Backup”

In the above example, “H:\Backups\iPhone Backup” should be your own file path leading to the backup location you want to use.

6) Close the Command Prompt and open iTunes and backup.

(credit: Link)


Windows Vista and Windows 7

1) Ensure that iTunes is closed.

2) Move the C:\Users\(username)\AppData\Roaming\Apple Computer\MobileSync\Backup\ to the drive you want to back up to. Let’s say Drive H:\ again

3) Open a command prompt and create an NTFS junction point something like what’s shown below:

mklink /J “C:\Users\(username)\AppData\Roaming\Apple Computer\MobileSync\Backup” “h:\Backup”

(Credit: Link)

Have a happy time cleaning up your main disk.

 

Snort (Intrusion Detection Utility) Installation in Centos 6

snort

Definition

snort2SNORT  is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS)[2] created by Martin Roesch in 1998.Snort is now developed by Sourcefire, of which Roesch is the founder and CTO.In 2009, Snort entered InfoWorld’s Open Source Hall of Fame as one of the “greatest [pieces of] open source software of all time”.

Snort’s open source network-based intrusion detection system (NIDS) has the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching, and content matching. The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, common gateway interface, buffer overflows, server message block probes, and stealth port scans.

Snort can be configured in three main modes: sniffer, packet logger, and network intrusion detection. In sniffer mode, the program will read network packets and display them on the console. In packet logger mode, the program will log packets to the disk. In intrusion detection mode, the program will monitor network traffic and analyze it against a rule set defined by the user. The program will then perform a specific action based on what has been identified.

Before proceeding with Snort installation you will need to install the required packages.  Follow the steps to do prior to snort’s installation.

Pre-Installation

Make sure to have the latest version of  MySQL, HTTP, Development Tools and Development Libraries.

     Install the necessary packages needed to run snort successfully.

 #yum install mysql-bench mysql-devel php-mysql gcc php-gd gd glib2-devel gcc-c++

      Yum install libcap, libpcap and pcre

#yum install libcap*
#yum install libpcap*
#yum install pcre*

      Install libdnet 1.12

#cd /
#mkdir snort_install
#cd snort_install
#wget http://libdnet.googlecode.com/files/libdnet-1.12.tgz
#tar -zxvf libdnet-1.12.tgz
#cd libdnet-1.12
#./configure
#make && make install

     Install daq version 2.0.0

#cd /snort_install
#wget http://www.snort.org/downloads/2103
#tar -zxvf daq-2.0.0.tar.gz
#cd daq-2.0.0
#./configure
#make && make install

     Install snort version 2.9.4

#cd /snort_install
#wget http://www.snort.org/downloads/2112
#tar -zxvf snort-2.9.4.tar.gz
#cd snort-2.9.4
#./configure
#make && make install

Post Installation Instruction

      prepare for rules installation

# groupadd snort
# useradd -g snort snort -s /sbin/nologin
# mkdir /etc/snort
# mkdir /etc/snort/rules
# mkdir /etc/snort/so_rules
# mkdir /etc/snort/preproc_rules
# mkdir /var/log/snort
# chown snort:snort /var/log/snort
# mkdir /usr/local/lib/snort_dynamicrules
# cd /snort_install/snort-2.9.4/etc/
# cp * /etc/snort/

      Register on Snort official web site and download rules to  /snort_install directory

#cd /snort_install
#tar -zxvf snortrules-snapshot-2940.tar.gz
#cd rules/
#cp * /etc/snort/rules
#cp ../so_rules/precompiled/Centos-5-4/i386/2.9.4.0/* /etc/snort/so_rules
#cp ../preproc_rules/* /etc/snort/preproc_rules/

     Edit /etc/snort/snort.conf file

1.change “var RULE_PATH ../rules” to “var RULE_PATH /etc/snort/rules”,
change “var SO_RULE_PATH ../so_rules” to “var SO_RULE_PATH /etc/snort/so_rules”,
change “var PREPROC_RULE_PATH ../preproc_rules” to “var PREPROC_RULE_PATH /etc/snort/preproc_rules”
2. comment on the whole “Reputation preprocessor” section, because we haven’t whitelist file
3. find “Configure output plugins” section and add the line “output unified2: filename snort.log, limit 128″

    Install Barnyard 2

#cd /snort_install
#wget http://www.securixlive.com/download/barnyard2/barnyard2-1.9.tar.gz
#tar -zxvf barnyard2-1.9.tar.gz 
#cd barnyard2-1.9
#./configure 
#./configure --with-mysql-libraries=/usr/lib/mysql/
#make 
#make install
#cp etc/barnyard2.conf /etc/snort/
#mkdir /var/log/barnyard2
#chmod 666 /var/log/barnyard2
#touch /var/log/snort/barnyard2.waldo

       Setup MySQL Database

#echo "SET PASSWORD FOR root@localhost=PASSWORD('yourpassword');"| mysql -u root -p
#echo "create database snort;"| mysql -u root -p
#cd /snort_install/barnyard2-1.9
#mysql -u root -p -D snort < schemas/create_mysql
#echo "grant create, insert on root.* to snort@localhost;" | mysql -u root -p
#echo "SET PASSWORD FOR snort@localhost=PASSWORD('yourpassword');" | mysql -u root -p
#echo "grant create,insert,select,delete,update on snort.* to snort@localhost" | mysql -u root -p

     Edit the file /etc/snort/barnyard2.conf

change “config hostname: thor” to “config hostname: localhost”

change “config interface: eth0″ to “config interface: eth1″

add the line at the end of file “output database: log, mysql, user=snort password=yourpassword dbname=snort     host=localhost”
Note: the device eth1 may vary depending on your system set-up. The example given above is a 2 network device(eth0,eth1) setup where snort was applied to the second network device(eth1)
 

      Test

#/usr/local/bin/snort -u snort -g snort -c /etc/snort/snort.conf -i eth1

    If it prompts “Initialization Complete”, it proves to work.

      or  Execute snort from command line

#snort -c /etc/snort/snort.conf -l /var/log/snort/

If testing and manual run working perfectly fine proceed with the next step

      Make Snort and Barnyard2 boot up automatically

Edit the file /etc/rc.local, add the below lines

/sbin/ifconfig eth1 up /usr/local/bin/snort -D -u snort -g snort -c /etc/snort/snort.conf -i eth1

/usr/local/bin/barnyard2 -c /etc/snort/barnyard2.conf -d /var/log/snort -f snort.log -w /var/log/snort   /barnyard2.waldo -D

Restart to test changes.

#init 6

References:

http://www.snort.org/

http://en.wikipedia.org/wiki/Snort_%28software%29

http://www.securixlive.com/

http://kezhong.wordpress.com/2012/04/07/install-snort-2-9-2-2-on-centos5-8x86_64/http://www.securixlive.com/

More space and faster pc using Ccleaner

Ccleaner

Definition:

Ccleaner

(formerly Crap Cleaner), developed by Piriform, is a utility program used to clean potentially unwanted files and invalid Windows Registry entries from a computer.A public version 1.01 for the Mac OS X has been releasedalong with a Network Edition.

CCleaner is a system optimization, privacy and cleaning tool. It removes unused files from your system – allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it’s fast (normally taking less than a second to run) and contains NO Spyware or Adware!

It also comes built in with a registry cleaner, which can check for problems within your registry.

I tried using this application and it made my life easier.  It compiles all pc clean up in one application that the built-in windows disk clean up program can’t.

Features

Download Windows installer here

Download Mac installer here

(Current Version 3.7.1900)

Cleans the following Windows components:

Internet ExplorerInternet Explorer
Temporary files, history, cookies, super cookies, Autocomplete form history, index.dat files.
FirefoxFirefox
Temporary files, history, cookies, super cookies, download history, form history.
Google ChromeGoogle Chrome
Temporary files, history, cookies, super cookies, download history, form history.
OperaOpera
Temporary files, history, cookies, super cookies, download history.
Apple SafariSafari
Temporary files, history, cookies, super cookies, form history.
Other BrowsersOther Supported Browsers
K-Meleon, Rockmelt, Flock, Google Chrome Canary, Chromium, SeaMonkey, Chrome Plus, SRWare Iron, Pale Moon, Phoenix, Netscape Navigator, Avant and Maxthon.
WindowsWindows
Recycle Bin, Recent Documents, Temporary files, Log files, Clipboard, DNS Cache, Error Reporting, Memory Dumps, Jump Lists.
RegistryRegistry Cleaner
Advanced features to remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more…
ApplicationsThird-party applications
Removes temp files and recent file lists (MRUs) from many apps including Windows Media Player, eMule, Google Toolbar, Microsoft Office, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and many more…
Safe100% Spyware FREE
This software does NOT contain any Spyware, Adware or Viruses.

Safety:

CCleaner was designed from the ground to be safe and secure to use. It has multiple levels of checks in place to ensure that it cannot delete any useful information or documents you may still need. We also certify that it contains no Spyware or Adware.

High Security:

For the super cautious users we also offer secure file erasing. By overwriting the files before deleting them, making it impossible to recover the data.

Multiple Languages:

Thanks to the translators, CCleaner is available in 35 different languages:

English, Albanian, Arabic, Bosnian, Bulgarian, Catalan, Chinese (Simplified), Chinese (Traditional), Czech/Slovak, Danish, Dutch, Finnish, French, Galician, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Portuguese (Brazilian), Romanian, Russian, Serbian Cyrillic, Serbian Latin, Slovak, Spanish, Swedish and Turkish.

Click here for Blog Reference

Click here for definition Reference

What is the best Software for Remote Support?

remote Support

I was been a technical support all my working life. All types of Technical support, you name it I tried it. Phone, Remote, On-site, Chat, E-mail etc.

My favorite amongst this support type is the remote. Why? Because you can actually see and troubleshoot it ASAP right from your office table.

In order to do so, I used different software for remote support. TEAMVIEWER, GOTOMEETING, LOGMEIN, PCANYWHERE, TECHINLINE, REALVNC, ULTRAVNC are some of those remote support tools.

 Apple MacBook Pro MD101LL/A 13.3-Inch Laptop (NEWEST VERSION) 500GB Storage 13.3″ Display

1. TEAMTeamviewer logoVIEWER 

is a proprietary computer software package for remote control, desktop sharing, online meetings, web conferencing and file transfer between computers. The software operates with the Microsoft Windows, OS X,[1][2] Linux,[3] iOS,[4] and Android[5] operating systems. It is possible to access a machine running TeamViewer with a web browser.[6] While the main focus of the application is remote control of computers, collaboration and presentation features.

FEATURES

The All-In-One solution for any application
While most competitors offer different packages for spontaneous support,server administration, home office, presentations, meetings, online training and teamwork, TeamViewer combines all of these modules in a
single, extremely affordable application.
Smooth operation – even behind firewalls
The biggest problems in using remote maintenance software are generally caused by firewalls, disabled ports and NAT routers for local IP addresses. When you use TeamViewer, these problems no longer exist:
TeamViewer finds your partner even through firewalls.
Highest security standards
TeamViewer is a very secure solution for remote maintenance. Your
connections utilize completely secured data channels featuring 1024-bit
RSA key exchange and 256-bit AES session encoding.
Much more than competitively priced
TeamViewer‘s pricing is unbeatable. It is sold as an inclusive standalone package for a permanent use of the purchased licence. There are no monthly or hidden costs, such as service contracts.
Simple to install and use
Neither an installation nor administrator rights are required by the
customer; your customer merely runs a small program and you are ready
to go.

Teamviewer Reference here


2. GoToMeetingGotomeeting-logo-180x180Try online tool

Click for best deals on gadgets and electronics

is a Web-hosted service created and marketed by Citrix Online, a division of Citrix Systems. It is a remote meeting, desktop sharing, and video conferencing software that enables the user to meet with other computer users, customers, clients or colleagues via the Internet in real-time.

GoToMeeting was designed to allow the desktop view of a host computer to be broadcast to a group of computers connected to the host through the Internet. Transmissions could be protected with high-security encryption and optional passwords. By combining a Web-hosted subscription service with software installed on the host computer, transmissions could be passed through highly restrictive firewalls.[1]

GoToMeeting reference here .

Security
GoToMeeting is the most secure online meeting product available. Meetings cannot be viewed by anyone except meeting attendees.
Feature Benefit
End-to-End Encryption Industry-standard SSL and U.S. government- standard 128-bit AES encryption protect your online meetings from eavesdroppers.
User Authentication Strong passwords and unique meeting IDs protect your account and your meetings from unauthorized visitors.
One-Time Meeting Passwords Single-use meeting passwords are available to protect your most sensitive online meetings.
Secure Control over Desktop
Sharing
The presenter always has complete control when sharing keyboard and mouse with attendees, creating a secure environment for collaboration.
Features and Benefits
Feature Benefit
High-Definition Video Conferencing NEW – See meeting attendees in high-definition without the need for expensive hardware or video system, using easy-to-use video controls.
Desktop Viewing Enhance meetings by showing attendees any application and file on your desktop. Attendees can share their desktops, too.
Share Keyboard and Mouse Control Securely collaborate with colleagues on projects by working together in real time.
Email and Instant-Messaging Integration* Start scheduled or spontaneous meetings from Microsoft® Outlook®, IBM® Lotus Notes® or various instant-messaging services.
Chat Chat with all attendees or converse privately with a specific participant.
Total Audio Service Choose free VoIP, phone conferencing or both.
Mac Support Host and attend meetings on your Mac® as well as on your PC.
Desktop Recording/Meeting Playback Save, replay, post or email valuable interactions and presentations – including audio.
Specific ApplicationSharing* Share only the application you choose, keeping attendees focused on what you want them to see.
DrawingTools* Increase participation and spice up presentations with tools to draw, highlight and point to items of interest right on the screen.
LogMeIn Free logo3. LOGME IN RESCUEDownload Installer for windows

Click for best deals on gadgets and electronics

The heavyweight of all remote access tools is LogMeIn, and in particular, the LogMeIn Rescue product, which is their most reasonably priced service and the most balanced based on cost and functionality. There’s just about nothing that cannot be done with this service; it is fully customizable, works cross-platform, has the ability to automatically reboot into a running session, and even supports Smart Phones! The process of connecting is also simple and fast, and there is no need to install any software on either machine. The main constraint of LogMeIn Rescue is the fact that it is priced at over $110 on a monthly basis and over a $1000 for the entire year. As a result, this service is out of my reach, and I am sure many small businesses would agree with me that it is often better to opt out for something less comprehensive, yet more cost-effective.

With LogMeIn Rescue, IT teams can keep customers and employees up and running without the need for pre-installed software. Use a single remote support tool to service PCs, Macs or smartphones on demand anywhere, 24/7, as if you were sitting in front of them.

LogMeIn Reference here.

Features

Unattended AccessEnable computers to be accessed at a configurable time in an unattended mode without the end user’s involvement. This enables maximum flexibility to solve problems when it is convenient for both the end user and the technician.
Multi-Platform Remote ControlPerform ultra-fast remote control with patent-pending point-to-point technology. Access a remote computer in approximately 20 seconds or less, without pre-installing software.
Smartphone SupportManage remote control, diagnostics and configuration of smartphones including Windows, Symbian and BlackBerry. Rescue simulates the customer’s smartphone on the technician’s computer, who can then share control of the screen and keypad.
Rescue Desktop AppThe new Desktop App enables technicians to access their console in one click, so they can provide support faster, without the hassle of a browser.
Web-based Technician ConsoleEfficiently conduct remote support sessions with this versatile online interface. Initiate new sessions or respond to online customer requests waiting in a shared queue.
Remote DiagnosticsGain a snapshot view of system information in a straightforward dashboard with visibility into processes, services and applications. For smartphones, view system info such as memory, battery life and software version.
Instant ChatDesktop browser-based chat allows technicians to chat with end users without needing to download the applet. Instant chat can be fully embedded and customized into a web-based application.
Drag and Drop File TransferDrag and drop multiple files and folders through a dual-pane file transfer option.
Reboot and ReconnectReboot and reconnect to end-user systems, even if these systems are unattended, for uninterrupted support sessions. Connect to systems even while in “safe mode”.
Mobile Device ConfigurationTechnicians can directly configure settings on iPhone, Android, Windows Mobile and Symbian devices without using remote control.
Support Session HistoryInput notes for retrieval during future sessions, and view history and notes captured from previous support sessions.
Technician Screen SharingTechnicians can share their screen with end users for training purposes.
Multi-Session HandlingConduct up to 10 concurrent remote sessions with a tabbed console interface that lets you toggle easily between sessions.
Multi-Monitor NavigationView monitors side by side or toggle between monitors for customers using multi-monitor setup.
Log-In as AdministratorRun the Rescue Applet as a Windows System Service or Mac OS X daemon for administrator rights on a remote computer.
Communication ToolsEnhance communications with the White Board and Laser Pointer features.
Integrated Content Portal  NEW!Easily access external web content right from the Tech Console, like a knowledge base or FAQs
symantec-logo-lg4.  Symantec PCAnywhereDownload

Click for best deals on gadgets and electronics

As remote offices and telecommuting become more prevalent, the ability to manage devices from virtually any location is quickly changing from a luxury to a necessity.

Symantec pcAnywhere™, a leading remote control solution, helps organizations access and securely manage remote computers to resolve issues quickly. pcAnywhere supports multiple platforms for both host and remote systems, including Windows® (including Vista® and Windows Server® 2008), Linux®, and Mac®. Systems can also be securely accessed from Windows Mobile®/Pocket PC devices and Web browsers. pcAnywhere 12.5 allows you to easily connect to
mission-critical servers and endpoint devices, ensuring complete control—even if your building becomes inaccessible.

Features and benefits

• Provides a feature-rich, secure, reliable remote controlsolution to accelerate resolution of help desk calls.
• Offers heterogeneous host and remote platform support across Windows, Linux, and Mac OS X. All
hosts can also be accessed from Microsoft® Pocket PC devices or Web browsers.
• Supports 64-bit environments.
• Gateway option enables real-time discovery of and connection to multiple devices behind firewalls and NAT devices, which mitigates private and dynamic IP challenges, and minimizes port opening and forwarding.
• Host invitation feature simplifies the process of hosts establishing a reverse connection from behind firewalls and NAT devices.
• User interface provides simple, graphical, task-based options. You can also combine the pcAnywhere Manager with all active sessions into a single window.
• Mobile remote management tools reduce the steps, bandwidth, and time required for remote troubleshooting and issue resolution from Pocket PC and Pocket PC Phone devices.
• The Symantec pcAnywhere Access Server option facilitates the discovery of and connection to multiple pcAnywhere hosts from anywhere—regardless of location or network configuration. (Sold separately; works in conjunction with pcAnywhere 12.x.)
• AES encryption algorithm provides users with a choice of all available cipher strengths (128-bit, 192-bit, and 256-bit) in addition to the currently offered RC4 symmetric algorithm and other options (pcAnywhere encoding, public key, or  one). pcAnywhere encryption is FIPS 140-2 validated.
• Supports multiple authentication methods so you can use existing network authentication user names and passwords.
• Windows PE support allows you to use a pcAnywhere Thin Host within Windows PE operating system.
• Symantec pcAnywhere Mobile™ permits a connection to and remote control of a standard pcAnywhere host from a current market-standard Pocket PC device over any TCP/IP connection, including wireless (cellular, Bluetooth®, and  iFi). Users can be away from their desktops while still having access to their computers via pcAnywhere.
• Bandwidth auto-detect allows users to optionally detect the actual connection speed of each connection, and adjust settings that affect performance during lower bandwidth connections.
• Symantec Packager simplifies pcAnywhere installation and setup, and allows administrators to tailor the solution to best fit the needs of their organization.

Techinline_logo5. TechInLine Remote DesktopTry it Free

Click for best deals on gadgets and electronics

Techinline Remote Desktop enables users to view, diagnose, and, if needed, take full control to resolve any problems on a remote computer which can be located at any point of the world. No matter how far the specialist is from the client, Techinline Remote Desktop works as if the two machines are located on the same table.

FEATURES

Instant Remote Desktop Connection.

Only a browser and an internet connection are required to launch a remote support session between any two computers, making it an ideal solution for instant access and on-demand support for existing and new customers alike. The entire connection process is as simple as it gets! Log into your account online to start the support session, then direct your customer to techinline.net in order to obtain a 6-digit Client ID number (Alternatively, a short-address FixMe.it can be used to obtain the Client ID ). Enter this number into the corresponding field on your end to instantly start resolving any technical issues on the remote desktop.

It does not matter whether you or your clients are located behind a firewall, proxy server, or NAT: Techinline guarantees a trouble-free connection in any environment. Furthermore, our solution does not require pre-installing or downloading software on either machine. Such simplicity and reliability presented by Techinline’s browser-based technology provide you with the capability to offer immediate service and ad-hoc support to practically anyone around the globe. Save time and money by managing tasks directly from the comfort of your office!

Get the best performance out of your customer support team.

Grant your technical support team the ability to observe what is happening on your customers’ remote desktop and immediately deliver the professional assistance required. You can seamlessly integrate our solution into your website in order to simplify the connection process for your customers while also promoting your brand. The simplicity of the Techinline service enables you to support even the least “computer-savvy” users.

Remote desktop sessions are always confidential and secure.

Techinline’s technology guarantees reliability, security, and privacy for you and your clients. All data exchanged between the session participants is encrypted with industry standard Secure Socket Layer (SSL) and 128-bit Advanced Encryption Standard (AES) encryption, which are used by online banking transactions. Techinline ensures that your business and clients are granted the highest standard of service possible.

vnclogo150x1506. RealVNCClick for best deals on gadgets and electronics

Download

VNC allows you to access and control your desktop applications wherever you are in the world, whenever you need to. VNC has a widespread user base, from individuals to the world’s largest multi-national companies, utilizing the technology for a range of applications.

Cross-platform remote control

Enable connections to be established between computers running an unrivalled mix of Windows, Mac OS X, UNIX, and Linux operating systems.

VNC authentication

Prevent unauthorized access with a password specific to VNC. Note passwords are always encrypted, even if encryption is turned off or not supported.

128-bit AES encryption

Encrypt connections using 128-bit AES, for high performance encryption. This means that all data transmitted in either direction while connections are in progress—keystrokes and mouse movements made by users; screen captures sent back in order to display the desktop—are resistant to packet sniffing and tampering, man-in-the-middle attacks, and other malicious eavesdropping.

FEATURES

System authentication

Authorize users to connect using the already-familiar credentials of their own user accounts on a computer. Note passwords are always encrypted, even if encryption is turned off or not supported.

Optimized performance

Patented algorithms for encoding screen data enable the user experience to be as seamless as your network connection will allow.

Printing

Enable connected users to print files directly to printers connected to their own computers.

File transfer

Enable connected users to transfer files in either direction, and also share with other users connected at the same time.

Chat

Enable connected users to chat to other users connected at the same time, or with a host computer user.

Dedicated support channel

Get help when you need it, and in addition receive free upgrades for the duration of the contract. On expiry, you can renew for a competitive fee to continue receiving help and upgrades.

256-bit AES encryption

Encrypt connections using ultra-secure 256-bit AES, for ultra-high performance encryption. This means that all data transmitted in either direction while connections are in progress—keystrokes and mouse movements made by users; screen captures sent back in order to display the desktop—are resistant to packet sniffing and tampering, man-in-the-middle attacks, and other malicious eavesdropping.

Single sign-on authentication

Automatically authorize users to connect using the credentials they have already entered to log on to their own computers. Note all computers must be in a managed network environment, with (for example) a Kerberos authentication server.

Powerful deployment tool

Windows only (other platforms coming soon). Deploy, install, and license VNC on computers from a central location. Configure VNC from a management console (for example, to change authentication or encryption settings).

ultravnc_logo7. ULTRA VNCDownload

Click for best deals on gadgets and electronics

UltraVNC is a powerful, easy to use and free software that can display the screen of another computer (via internet or network) on your own screen. The program allows you to use your mouse and keyboard to control the other PC remotely. It means that you can work on a remote computer, as if you were sitting in front of it, right from your current location.

If you provide computer support, you can quickly access your customer’s computers from anywhere in the world and resolve help desk issues remotely! With addons like SingleClick your customers don’t even have to pre-installed software or execute complex procedures to get remote help desk support.

Key features

File transfer, Video driver, Optional Encryption Plugins, MS Logon, Text chat, Viewer Toolbar, Java Viewer with File Transfer , as well as Viewer Auto scaling and Server Side Scaling, Multiple-Monitors-support,Repeater/Proxy-support, Auto reconnection, good performances and tons of other functionalities.

Addons

Repeater, SingleClick generator and NATtoNAT connectors , that help you to easily handle the most complex connection situations.

UltraVNC runs under Windows operating systems (95, 98, Me, NT4, 2000, XP, 2003, Vista, Windows 7…***). Its embedded Java Viewer allows you to connect (and make File transfers) from a simple Web Browser on any system supporting Java (Linux, Mac OS…) to an UltraVNC server.
** 95-NT4: only supported with the old 1.0.2
** 2000 is still supported as special build (VS2008), VS 2010 compiler is not longer 2000 compatible.

All of the remote support Software above were of good use but my favorite and was stuck for years was the real VNC and Teamviewer for the simple reason that its easy to use, cheap(free), fast and reliable.

How about you? What do you think is the best Software for remote support? Vote now. Add any other answer if your choice is not in the option.