D
David H. Lipman
From: "ASCII said:Aren't 'grey areas' the murky domain of malware,
where they can't be positively labeled good or bad?
You can say that.
From: "ASCII said:Aren't 'grey areas' the murky domain of malware,
where they can't be positively labeled good or bad?
David said:Depends on who installed teamviewer. If it's been intentionally
installed by the owner of the system, then it can be ignored. If
not, then the owner does need to be made aware that it has been
installed. In my opinion, it's a potentially un-wanted program.
Regards, Dave Hodgins
I use TeamViewer on my home lan under free "personal use" license. I don't
believe there's a way to connect remotely to a computer that runs it without
alerting the user and giving them the option to kick the "intruder" off.
It's a help desk product, not a security product.
I will say that I haven't studied every way to configure it, or every way it
can be hacked, but I am surprised that it is flagged as a PUP unless no one
at MBAM knows much about it and their attitude is "Let the user make an
exception."
Bear said:Prey project will allow you to monitor devices without announcing the
intrusion:
http://preyproject.com/
I provided a very good program link that would "connect remotely to aWe were discussing MBAM flagging/blocking TeamViewer. Prey is not
TeamViewer.
Prey looks like legitimate piece of software but it is intended to fill a
completely different need, which includes hiding itself.
Bear said:I provided a very good program link that would "connect remotely to a
computer that ...(will) connect remotely to a computer that runs it
without alerting the user...."
Sheesh...such pedantic replies.