BioInclined
Limp Gawd
- Joined
- May 23, 2011
- Messages
- 332
I did a search but the threads are older an I don't know how important up-to-date info is on this.
I am away at my university and my mother has a hard time with computer stuff. She works from home since her job is being down sized and it is easier for them to allow that option.
More times than not she will ask me what a new "warning" or "message" is from anything in Win 7 or her anti-virus. Of course, since she is not well versed and wording is critical, over the phone becomes painstakingly difficult.
So I am curious about this VNC stuff. Is it as easy as it seems? Will it sacrifice security a lot, or just if some one is looking for that port specifically and even if they stumble across it, can they use it as easy as me?
I don't worry about anything on her PC really, she doesn't shop from home online, I doubt she has any serious things she signs into. She is not a huge fan of computers outside of running the work related programs and checking her email. There is another person on the network though that may have a few more things considered to be valuable.
Thanks for any and all help guys. I also hope this is in the right section, made the most sense to me.
I am away at my university and my mother has a hard time with computer stuff. She works from home since her job is being down sized and it is easier for them to allow that option.
More times than not she will ask me what a new "warning" or "message" is from anything in Win 7 or her anti-virus. Of course, since she is not well versed and wording is critical, over the phone becomes painstakingly difficult.
So I am curious about this VNC stuff. Is it as easy as it seems? Will it sacrifice security a lot, or just if some one is looking for that port specifically and even if they stumble across it, can they use it as easy as me?
I don't worry about anything on her PC really, she doesn't shop from home online, I doubt she has any serious things she signs into. She is not a huge fan of computers outside of running the work related programs and checking her email. There is another person on the network though that may have a few more things considered to be valuable.
Thanks for any and all help guys. I also hope this is in the right section, made the most sense to me.