Proramma on and off the computer, restart the computer hangs. Watchdog Timer

The sale of this product is suspended.

Try to search similar items from other sellers.

Sold: 2 last one 17.03.2010
Refunds: 0

Uploaded: 07.06.2007
Content: poweroff55-01betar.rar 552,05 kB

Product description


The ability to control a remote computer by the method of "client-server" allows you to
on the remote machine is one of the following five steps:
1. Turn off the computer.
2. Restart the computer.
3. To put the computer into sleep mode (HIBERNATE).
4. You put the computer into standby mode.
5. End session of the current user.
Management is performed by the standard method. The program is run on a (relatively)
server, the client sends commands (conditional) machine. The program, launched
on the client machine, these commands accepts and executes. When a fixed position
"Send command on the network" after tripping any of the timers or pressing the main button
management team will send the client machine according to the settings tab
"Server" and the program on the client machine will accept and execute the commands in accordance
settings tab "Customer".

Caution The ability to manage remote computers designed for experienced users.
If you are experiencing difficulties with the interpretation of the term tab "Server" and "Client", and clear
understanding of what they are for, this feature is not for you. Off Switch
"Allow send commands over the network" and "Allow accept commands from the network."

TAB "customer":
"Allow to accept commands from the network." After turning on this switch,
the program will open the configured port and go into standby mode background connections.
Remember that security is completely up to the user. When,
if you do not know what a "port", "Remote Control", "Network Configuration", etc.
do not turn on the switch.

"Port". The port number on which the connection is expected. It can not be the same as the "Port"
"Server" tab. No further checks on the correctness of filling is not performed.

"With any IP-address." The above five teams will be executed without checking IP-addresses,
from which they came.

"Only with the listed IP-addresses." The above five commands will be executed only if
if they came from the IP-address, which is listed on the tab "Customer".

"The password is not required." To perform the above five teams program installed on
the server is not required to transmit to the client machine password. Password Check program
installed on the client machine, not made.

"Password is required". To perform the above five teams program installed on
server is obliged to submit the password. The password should match with the one specified in the settings
tab "Customer". The password is limited to twelve characters.

"Server" tab:
"Allow send commands over the network." Allows the action "sends a command
network "with the operation of any of the timers or pressing the submit button.

"The list of IP-addresses." List of computers that sent the team. Supports
Sort by "Drag and Drop". When you double-click on the list item opens
Edit window of the selected item.

"Add IP address in the list." By clicking on the button in the list of addresses added to the desired values.
"Add computers to the list." Clicking on the button opens a dialog to select a computer.
"Add to flag the completion of work." It adds to the list of one of the flags shutdown.
If there is such a flag, then iterate through all the IP addresses from the list, the program with the local
machine one of the following:

1. Turn off the local computer.
2. Reboot the local computer.
3. Puts the local computer into hibernation (HIBERNATE).
4. Puts the local computer into standby mode.
5. Terminates the current user session.

Caution Applications are closed in accordance with the swit

Feedback

0
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.