Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Enterprise Software

Product Spotlight: Log Me In Rescue

By Erik Eckel August 22, 2009, 12:45 AM PDT

Image
1
of 5

rescue1.jpg
rescue1.jpg
Product Spotlight: Log Me In Rescue

Log Me In Rescue Support Connection

Log Me In Rescue Support Connection

Connecting to a remote support session is very simple. Remote users requiring support need only to open a Web browser, go to www.logmein123.com and enter a six digit code provided by the remote support technician. That six-digit code is then entered in this box.

For a full review, check out the TechRepublic Product Spotlight Blog.

Images by Erik Eckel for TechRepublic

Product Spotlight: Log Me In Rescue

Log Me In Rescue Control Panel

Log Me In Rescue Control Panel

The remote technician’s console is equally simple. Techs click the New Session button (toward the top left of the screen) to generate a unique session PIN code.

Images by Erik Eckel for TechRepublic

Product Spotlight: Log Me In Rescue

Creating A New Session

Creating A New Session

New PIN codes are good for 20 minutes. Once a PIN code is created, technicians close the Create New Session window to Launch the Remote Control Session.

Images by Erik Eckel for TechRepublic

Product Spotlight: Log Me In Rescue

Remote Desktop Control

Remote Desktop Control

Note, Log Me In Rescue includes a prominent session window that can be used to maintain an ongoing chat session between the user receiving support and the technician.

Images by Erik Eckel for TechRepublic

Product Spotlight: Log Me In Rescue

Support For Reboot Operations

Support For Reboot Operations

Unlike many remote support options that sever the remote connection whenever a reboot is required–a frequent occurrence when providing remote support–there is no need to reconnect, generate new support PIN codes or provide permission for the remote support session to continue. Instead, Log Me In Rescue tracks a reboot operation’s progress and returns control of the system to the technician following the restart.

Images by Erik Eckel for TechRepublic

  • Enterprise Software
  • Account Information

    Share with Your Friends

    Product Spotlight: Log Me In Rescue

    Your email has been sent

Share: Product Spotlight: Log Me In Rescue
Image of Erik Eckel
By Erik Eckel
Erik Eckel is a managing partner at Louisville Geek and president of Eckel Media Corp. He previously served as Executive Editor at CNET Networks' TechRepublic. He earned his Bachelor's Degree in English from the University of Louisville and received
  • Account Information

    Contact Erik Eckel

    Your message has been sent

  • |
  • See all of Erik's content

TechRepublic Premium

  • TechRepublic Premium

    Power Checklist: Managing and Troubleshooting Android Devices

    The popularity of Android devices means a strategy for management and troubleshooting is crucial for employee and company success. This checklist from TechRepublic Premium can help your organization get the most out of its investment in Android devices (or that of your employees if they are using their own). From the checklist: DEVICE TROUBLESHOOTING For ...

    Published:  October 3, 2023, 4:00 PM EDT Modified:  October 4, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Hostile Workplace Prevention Policy

    A hostile work environment affects the psychological well-being of employees, which may lead to decreased productivity. Every enterprise should establish a written policy, like this one from TechRepublic Premium, and require every employee, contractor and third-party vendor to read, acknowledge and agree to comply with its principles. From the policy: FILING A COMPLAINT The company ...

    Published:  October 3, 2023, 4:00 PM EDT Modified:  October 4, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quick Glossary: Cybersecurity Attacks

    It doesn’t matter whether your organization is a huge multinational business enterprise or a one-person operation. At some point, your computer networks and systems will be attacked by someone with criminal intent. Cybersecurity attacks, in all their various forms, are inevitable and relentless. This quick glossary from TechRepublic Premium explains the terminology behind the most ...

    Published:  October 3, 2023, 4:00 PM EDT Modified:  October 4, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Hardware Decommissioning Policy

    Every hardware device used by an organization has a finite lifespan or viable period of use, and the retirement of old gadgets and the acquisition of new ones is a part of life with technology. This policy from TechRepublic Premium provides guidelines for the appropriate removal and disposal of all technological hardware used by the ...

    Published:  October 3, 2023, 4:00 PM EDT Modified:  October 4, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice