Stripes
Logo
Home Products Services Download Support About Us
KMremoteControl - Being Controlled Preferences

The Being Controlled Preferences specify various setup and behavior aspects (activation, security and networking) that apply when the system is being remotely controlled via the keyboard and mouse located on another system.

For documentation, scroll down or click in the graphic below:

  • click the title-bar area (Preferences) to view a full-sized graphic containing the same clickable tabs and sections
  • click an unselected tab to traverse to the documentation for that tab
  • click a section within the Remote Controlling tab to traverse to its documentation, below

Being Controlled Preferences PC

PC Preferences are not saved until the "OK" button is pressed. Pressing the "Cancel" button will leave the preferences unchanged.

Being Controlled Preferences Mac

Mac Each preference item is saved as the change is completed.

Up

The Activation section specifies options that determine whether and how/when the ability to control "this" system will be permitted:

  • Don't allow this system to be remote controlled: When selected, "this" system will not be permitted to be remote controlled via another system.

  • Permit this system to be remote controlled as soon as possible during system startup: When selected, will configure "this" system so it can be remote controlled by the time the login screen is presented. This is normally the preferred way to configure systems that are to be remote controlled by another system. Using this option will require Administrator privileges.

    Note that, once set up and enabled, this configuration does not require the KMremoteControl application to be running before "this" system can be remote controlled by another system.

    PC This option requires that a user be authenticated before being allowed to control "this" system from another system. Being authenticated means that the user must supply a Windows username and password that is valid on "this" system. To see the list of usernames that are valid on a system, go to the Start menu and select "Settings -> Control Panel -> Users and Passwords". Note that, when this option is selected, the options in the "Security" section are pre-selected and disabled.

    PC Technical : When this option is selected, enabling/disabling "being remote controlled", via the application window, will install/remove a system service. Installing/removing a system service requires Administrator privileges.

    Mac Technical : When this option is selected/deselected, a startup item is installed/removed. Installing/removing the startup item requires Administrator privileges. Similarly, enabling/disabling "being remote controlled", via the application window, requires Administrator privileges when this option is selected.

  • Permit this system to be remote controlled only when KMremoteControl is running: When selected, will require the KMremoteControl application to be running before remote controlling of "this" system by another system can be enabled.

    • Mac Enable being controlled when KMremoteControl starts: Ensures that, when the KMremoteControl application is started, the ability for "this" system to be remote controlled by another system is automatically enabled.

    • Mac If being controlled is enabled, warn that being controlled will be disabled when KMremoteControl quits: Ensures that a warning is provided to remind you that quitting KMremoteControl will disable "this" system's ability to be remote controlled by another system.

PC PanelMac Panel

The Security section specifies options that determine what must be done before other systems can remote control "this" system:

  • Allow any remote controllers: When selected, specifies that no authentication (i.e., login information for "this" system) will be required of users when remote controlling "this" system.

  • Require remote controllers to log in: When selected, will require that users attempting to remote control "this" system be authenticated; i.e., will be required to supply the username and password for a valid user on "this" system.

  • *Replace the Secure Communications Certificate...: When selected, will enable you to generate a new security certificate for KMremoteControl. If you don't understand the dialog that's presented, you probably shouldn't be using this feature.

Note that the "log in" that is optionally required by KMremoteControl does not function to log the user into the system and only functions to authenticate that the remote controller is a valid user on the system being remotely controlled.

PC The PC/Windows environment has restrictions that require these options to depend upon the "Activation" options. These dependencies are explained via additional comments in both the "Activation" and "Security" sections.

PC PanelMac Panel

The Networking section specifies some options related to networking:

  • Receive timeout: Specifies the period, in seconds, after which the failure to communicate will be considered an error. If you are working with one or more slow/busy systems and experience intermittent "disconnects" while remote controlling, increasing the timeout setting may help. It is normally best to adjust the timeouts so the communicating "Remote Controlling" and "Being Controlled" timeout settings are the same.

    Technical : KMremoteControl uses a bidirectional "heartbeat" to continuously monitor the network connection status.

  • The port used to control this system: Specifies the networking port to be used when the remote controlling system and the system being controlled communicate with each other. This port setting needs to be the same between systems that need to communicate with each other.

  • *While being controlled is enabled, advertise this system's ability to be controlled: When checked, will cause the system to "advertise" it's ability to be controlled via the zero configuration mechanisms (i.e., Apple's Bonjour, originally called Rendezvous, technology).

*This option is present beginning with version 1.50

PC PanelMac Panel

KMremoteControl
Overview
Screen Shots
Documentation
Support
History

Last Updated:

Home - Products - Services - Download - Support - About Us
Privacy Policy - Contact Us Copyright © 2003-2006 Derman Enterprises Inc., All Rights Reserved