TechWhirl (TECHWR-L) is a resource for technical writing and technical communications professionals of all experience levels and in all industries to share their experiences and acquire information.
For two decades, technical communicators have turned to TechWhirl to ask and answer questions about the always-changing world of technical communications, such as tools, skills, career paths, methodologies, and emerging industries. The TechWhirl Archives and magazine, created for, by and about technical writers, offer a wealth of knowledge to everyone with an interest in any aspect of technical communications.
Subject:RE: Show what I'm doing, show what you're doing From:"McLauchlan, Kevin" <Kevin -dot- McLauchlan -at- safenet-inc -dot- com> To:Margaret Cekis <Margaret -dot- Cekis -at- comcast -dot- net>, "techwr-l -at- lists -dot- techwr-l -dot- com" <techwr-l -at- lists -dot- techwr-l -dot- com> Date:Fri, 16 Nov 2012 14:46:47 -0500
Regarding your summary of my statements, no, I don't see
any "allowing.... to let another person control an application
on your PC in an application like Go To Meeting." As far as I
know, all anybody can do is allow you to become the meeting
presenter for a time, which makes your desktop visible to
the other attendees, but does not let anyone else actually
do anything to/on your desktop.
I'm not familiar with WebEx - didn't realize it could allow
complete takeover like that.
That, and other apps that do allow control (like the ones used by IT
Help Desks to take over from fumbling (L)users to remotely
repair and configure company PCs) are generally not what
I'd want.
I would just occasionally want Rob or Ahmed in Belcamp, MD
to be able to watch my desktop over my shoulder - here in
Ottawa, ON, Canada - while I [attempt to] go through an
operation with some new product or feature, and they
either offer suggestions, or take notes... or just snicker a lot.
GoToMeeting and similar services work fine, but they do run
all our info through an external service that we have to trust.
Remote Desktop has different limitations, unless there's a
multi-connection version... I really like how fast and smooth
NoMachine is, compared with RD, but it's not for connecting
to other Windows sessions (I use it to connect to my Linux
boxen), and it also doesn't do two or three views into one session.
Actually, what has happened a couple of times is that I've used
GTM to let some remote people watch while I jumped around
among a !m session on my desktop, one or two RD sessions, a
couple of SSH sessions, and a couple of local command-line
console sessions... all on my desktop. It isn't totally ideal
when I normally spread all that mess over two 20-some-inch
screens, while they get to watch it all on a single screen.
> -----Original Message-----
> From: Margaret Cekis [mailto:Margaret -dot- Cekis -at- comcast -dot- net]
> Sent: November-16-12 1:08 PM
> To: McLauchlan, Kevin; techwr-l -at- lists -dot- techwr-l -dot- com
> Subject: RE: Show what I'm doing, show what you're doing
>
> Kevin McLauchlan asked about security concerns when allowing a co-
> worker, or
> several persons in a web meeting to see your desktop or an
> application, or
> to let another person control an application on your PC in an
> application
> like Go To Meeting.
> ______________________________________
> My employer uses WebEx. There is a corporate WebEx account, and
> anyone who
> has a good reason can call the WebEx number, request and register a
> session,
> and invite other participants. When I've needed access to a new
> version of
> software being developed, one of the developers would set up a
> WebEx session
> with me, then take over my PC, verify that I had the requisite support
> software (such as SQL or Dot. Net), check the settings, then install the
> test or demo version of the software that I would be writing a manual
> for.
> Unless you specifically choose to record a session, it will not be saved.
> It
> was the company's standard practice (the developers are in another
> state)
> and I never thought about the security issues.
>
> Like anything else, I think there is a potential for abuse, but if the
> company subscribes to a reputable service, is billed for its usage, and
> audits the billing records, someone should review the usage and spot
> any
> questionable or unauthorized sessions. I don't know if there are any
> similar
> applications that allow only for one-on-one interactions.
> Margaret Cekis, Johns Creek GA
>
The information contained in this electronic mail transmission
may be privileged and confidential, and therefore, protected
from disclosure. If you have received this communication in
error, please notify us immediately by replying to this
message and deleting it from your computer without copying
or disclosing it.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Writer Tip: Create 10 different outputs with Doc-To-Help -- including Mobile and EPUB.