Michael Taylor, User (Posts: 50)
Jun 20, 2015 7:37:50 pm EDT
Conrad Sallian, Support (Posts: 2692)
Jun 20, 2015 8:11:45 pm EDT
Michael Taylor, User (Posts: 50)
Jun 23, 2015 8:07:21 pm EDT
Conrad Sallian, Support (Posts: 2692)
Jun 24, 2015 8:09:23 am EDT
Michael Taylor, User (Posts: 50)
Jun 24, 2015 3:40:53 pm EDT
Conrad Sallian, Support (Posts: 2692)
Jun 24, 2015 4:42:05 pm EDT
The reality is that for an average a/v vendor it is easier to label something as "potentially dangerous" instead of coming up with a smart code/system that can tell for sure whether the use is legitimate or not.also if it is hidden (stealth mode) having antivirus popup to warn a user is a good thing. if it was installed for malicious purpose having an AV detection/warning would be great. if however I am the owner of the PC's (which I am) and I want the icon hidden then as the owner I would configure my antivirus program to ignore or whitelist the application.
We would gladly leave the security decisions to AV vendors, but apparently some of them are not capable of making good decisions, so much so that they even hurt their own customers by not letting them use legitimate, digitally signed software the way their customers want.I think you should leave the security decisions to your customers and the AV software.
Michael Taylor, User (Posts: 50)
Jun 24, 2015 9:12:40 pm EDT
Conrad Sallian, Support (Posts: 2692)
Jun 25, 2015 7:31:49 am EDT
I'm sorry, but you misunderstood my message. That was just an example, an anecdote as I'm trying to sound as human rather than as a corporate bot and explain our position rather than speaking like a pr person :)It sounds like your breaking/bending at the behest of 1 user. (not good if you ask me..) and by the sound of it not a very experienced user at that, especially if he trusts any software that has antivirus or antimalware in its title.
There is a broader question - why would the technician want to prohibit the user from stopping the Host when they wish to do so? Provided that they know what the Host is about.how do I prevent a user from stopping the host? I reviewed the information in your blog post. however it does not seem to prevent a user from stopping the host via the start menu/all programs. it can also be done via services.msc
Michael Taylor, User (Posts: 50)
Jun 25, 2015 8:07:44 pm EDT
because the user may not own the computer (as you mention below) they may be an employee. or in my specific case they are my children. do you have any idea how mischievous and curious children are? or for that matter employees? they can also be very smart when it comes to technology when they want to be. but at this time due to the many issues I've seen in version 6 I can not and would not use it in a business environment nor would I feel comfortable recommending it to my customers at this time. so this really does not effect me or my customers directly. but its the principle of it that I disagree with.There is a broader question - why would the technician want to prohibit the user fr om stopping the Host when they wish to do so? Provided that they know what the Host is about.
I would not call a user advanced because they are aware of services.msc..If the user wants to stop the Host running on their PC using services.msc, then:
- they are an advanced user, apparently, if they know about services.msc and use it to stop the Host at all costs
again not if they do not own the computer.they don't want the Host running on their computer, so they are perfectly in their own right stopping it
many reasons.. for 1 perhaps they use the computer for non business activity and "think" RUT is used to spy on them?? when in fact it's used to connect when necessary to resolve issues.So we are getting back to the question implicitly posed in the blog post/news about this update: if the software use is perfectly legitimate and the user knows they have a remote access software installed on their PC, why would they want to stop it?
But if they want to stop it, why would anyone prohibit them from doing so? Except only in a business setting wh ere computers do not belong to employees - but it should be handled by policies on the network/Active Directory level.
see my reply above.Yes, you can hide the Host menu or protect the Host settings, but that's mostly to prevent the user from messing with the settings inadvertently. These features have nothing to do with truly prohibiting the user from being the ultimate master of their own PC If it's not their PC, they are not supposed to be an administrator on it, and hence they won't be able to stop the service if they have insufficient privileges.
Conrad Sallian, Support (Posts: 2692)
Jun 25, 2015 8:38:42 pm EDT
This is what Windows standard user accounts are for. A regular user, an employee is not supposed to be an administrator on their machine where they can do anything , including messing with the Host.because the user may not own the computer (as you mention below) they may be an employee. or in my specific case they are my children. do you have any idea how mischievous and curious children are? they can also be very smart when it comes to technology when they want to be. at this time due to the many issues I've seen in version 6 I can not and would not use it in a business environment nor would I feel comfortable recommending it to my customers.
Remote Utilities is remote administration software, not employee surveillance software. These are two different markets/niches.many reasons.. for 1 perhaps they use the computer for non business activity and "think" RUT is used to spy on them?? when in fact it's used to connect when necessary to resolve issues.
I am a computer consultant. a huge amount of our customers are SMB. many of my customers do not have the resources to manage and secure their network properly, when we recommend GP, strict firewall policies, block local admin access etc. it ultimately requires more administrative resources, knowledge and money.. they do not have the time to deal with user requests like installing basic software on the users pc etc etc) they also don't have the money to call me every time something like this happens. unfortunately this is reality. especially in the SMB market. I can recommend and preach a high security environment until I'm blue in the face but it is ultimately their decision,
* Website time zone: America/New_York (UTC -4)