IT Services Quick Support
|OBU’s IT Services has partnered with TeamViewer’s QuickSupport for remote support. QuickSupport gives ITS a new tool to help people with their computers. It allows ITS flexibility to fix a problem by “seeing” the other person’s screen. Traditionally ITS has relied on Remote Assistance included in Windows XP and Windows Vista. This new tool adds support for MAC users, along with remote users who are away from the OBU network. Before any connection is made, ITS will always inform you they are going to connect to your PC and will be on the phone with you throughout the session.|
|There are two ways a connection may be established. The first is by the use of this website. The second is by an email invitation from one of our staff members who work in the ITS department. The email invitation will always be initiated over the phone and will never be done without prior knowledge. If anyone tries to attempt to connect to a PC in any other way, please let the IT Services department know immediately.|
|Here are some frequently asked questions about QuickSupport:
||Does TeamViewerQS have to be installed on my computer?
Remote support without installation
With TeamViewer’s QuickSupport, no installation is required. Simply download and run the software. A PartnerID and Password will be generated. Please give the PartnerID and Password to the ITS staff person who is on the phone.
||What type of encryption does TeamViewer include?
TeamViewer includes full encryption, based on RSA private-/public key exchange and AES (256 Bit) session encoding. This technology is based on the same standards as https/SSL and is considered completely safe by today's standards. The key exchange also guarantees a full client-to-client data protection.
||How will I know that no one else can use this to gain access to my computer once a
session is completed?
In addition to the PartnerID TeamViewer generates a session password that changes with every start of the software to ensure added prevention of unauthorized access to a remote system. Security relevant functions like file transfer require additional, manual confirmation of the remote partner. Also, it is not possible to control a computer invisibly. For data protection reasons the person sitting on the remote computer has to be able to detect when someone is accessing the machine.