![]() Step 3: finally, the user of the computer to be controlled has to authorize the connection. ![]() The user of the PC that's going to take control has to enter the data of the other computer in the field enabled for such purpose, and finally press the connection button. Step 2: once you open the software, it will automatically generate an ID and a password. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |