Rate this post
1 Star2 Stars3 Stars4 Stars5 Stars
Loading...

This post is also available in: Spanish

Remote machine and connection with third parties, a practical example

Today we are going to tell you a little story so you can understand one of the main uses of eHorus. In this case, we will talk about the possibility of connecting to a remote machine and how we can connect with a third party. Although this may sound uninteligible, you will see how simple it is, and at the end of the story we will explain the connection steps in a summarized way, so that just like the protagonists of our story, you can enjoy using your computers remotely.

Isabel was a nurse in a nearby hospital in Madrid, her brother Isidro,a professor of Literature at a school in Galicia. Isabel was a technology geek, and liked computers a lot. Ever since she had been a little girl, she had liked to fiddle and mess with them, but she had never done it professionally. Isidro, was a man who loved the countryside, knew a lot about trees and plants, and he was also passionate about mycology and mountain routes, so that was one of the reasons that led him to go live in Galicia.

So, Isidro, during a rainy Sunday was unnerved, because he had to submit the grades of his high school students and he was already late. But for his surprise, he discovered that all the scans and scanned papers had disappeared. He never got along too well with technology and today was the least suitable day for the computer to mess with him. Out of breath, he called his sister to see if she could help him, but Isa lived in Madrid and with Isidro’s almost nonexistent knowledge about computers, it was going to be very difficult to recover the lost information.

Isabel told him to download the Standalone for Windows from the eHorus webpage and that she would take care of the rest. Isidro had a lot of doubts, he was reluctant because he didn’t think it was safe, he didn’t know what eHorus was, or what other solution there was to deal with the problem. So Isabel explained that she was going to enter his computer and handle it from her home, by turning his computer into a remote machine.

“But … if you can enter, wouldn’t a hacker be able to do so too? Look what is happening to everyone with cyber-attacks and Ransomware. I don’t want to lose everything”, Isidro said.

Isa reassured him and told him about the different safety measures of eHorus. She began by telling him that he was going to have his own password on his computer, which no one else could access. The downloaded program was going to disappear when it had just been used. If someone wanted to connect to your computer, a popup would appear on the screen, meaning, a window that will ask the user if the connection is allowed. In addition, all data is encrypted using SSL,
“I assure you that nobody will have access to your data”, insisted Isa.

However, Isidro, to whom SSL didn’t say anything at all and was still a little hesitant, finally tried downloading and installing the program, and in just a few minutes Isabel was on his computer. She moved the cursor across the screen as if she were right there. It didn’t take too long for her to recover the lost information with a deleted data recovery software, recovering many of the images, but she didn’t know why there were documents that had not reappeared.

Isabel decided to call her friend Lorena, who worked as a monitoring software developer. She knew Lorena was sick of receiving distress calls to fix computers, without seeing a single euro for it. But Isabel never had asked her for any favor before, and yet she was the first to help everyone, so she agreed to help Isidro.

Isabel, while Isidro continued to look at his screen, copied a link and sent it to Lorena. In less than a minute, Lorena was connected to Isidro’s computer, and thus, a connection had been created with a third party. Isabel was already calm and Lorena began to make her own magic, after a while with codes and black screens, opened a folder on the desk where he put: Lost documents. At last Isidro could finish his work.

Isidro didn’t know how to thank her, he invited her to go whenever she wanted to Galicia and to this day, he uses eHorus very often to transfer files to work without having to carry the laptop everywhere, apart from always making a backup with all the important documents.

Here ends the story, in this case, with a happy ending. And now it’s time to briefly explain how you can do the same as Isa, Isidro and Lorena.

  • Access the webpage and register. Here you have the link https://ehorus.com/sign-up-remote-control-software/ Once you have registered, check your email and see if your welcome email has arrived.
  • Then, it’s time to download the agent. The agent is a program that will be installed on the computer you want to control. https://ehorus.com/ehorus-download-pc-remote-access/
  • Install the agent by simply following the steps that appear on the screen by clicking on next, until the screen that follows is displayed. There you must enter the user that you registered with in step one. The the second password space is for an optional agent password, that can be modified at any time. After a few more steps, the installation is complete.

remote machine

  • Access the eHorus portal from any device (computer, mobile, tablet, etc.) https://switch.ehorus.com/
  • And enjoy the remote computer.

If you want to make the most of eHorus, you can install the agent on different computers, so you can access them at any time.

In the previous story, we also talked about the connection with third parties; this utility is one of the most relevant eHorus’ features. The best thing is that you can use it without the need to share credentials, you just have to submit a URL. As a tutorial you only have to follow two steps:

  • Once you have accessed the computer you want to use, look in the Share menu, where you can create a link.
  • Send the link to the person you want to have access to the computer.

Note two more things: the session will expire and the link will be useless; in addition, if the machine has created a local password, you need that password to access the remote computer.

If, like Isidro, Isa and Lorena, you want to enjoy the remote control of devices, we encourage you to visit our website. And if you still have doubts about the installation, you can access the documentation.

RSS Feed