Article, November 2008
Using CrossLoop to Troubleshoot and Control Remote Machines
By Vinny LaBash, Member and Contributing Columnist, Sarasota PCUG, Florida
Obtained from APCUG with the author's permission for publication by APCUG member groups.
Third party Windows applications are rarely examined in this column, but CrossLoop is too good a utility to ignore. Trying to walk someone through a computer problem over the telephone is often an exercise in frustration. There is no substitute for seeing what is actually on a userís screen to find out the root cause of a problem.
Vista has a built-in support tool known as Remote Desktop, but far from making the process easy, it has a tendency to confuse those with no technical background. Remote Desktop makes it rough on those who donít know how to handle the added complications of firewalls and routers. CrossLoop, which is a free remote support utility, could be an excellent solution.
CrossLoop shields users from tricky situations involving communicating through routers, firewalls, and other potential obstacles. Setting up a communications session between two computers physically separated, but connected through the internet, is reduced to a process hardly more complex than turning on your TV. Those concerned about security can relax. CrossLoop uses something called TightVNC which safeguards data with 128 bit encryption. Crossloop is useful for people who want to train or support others remotely. If youíre an experienced web surfer, for example, and need to show someone how to access a disk drive or retrieve a lost document, CrossLoop allows you to take control of their computer screen, and show them exactly how to do it.
Hard core geeks may not be satisfied with CrossLoop. Itís not complicated enough. It works better than most similar commercial utilities, and your technically challenged friends and relatives will find it aggravation free.
You can download the program without charge from http://www.crossloop.com. The site has a video that demonstrates how to install and use the program which is very helpful for technophobes.
Once youíre up and running, the interface presenting itself is a model of simplicity which effectively masks the complexity behind the scenes. As mentioned earlier, security and remote control is handled by TightVNC. VNC stands for Virtual Network Computing, and is a very well designed software tool that easily allows remote access to Operating Systems with a graphical interface. The technical specifications say you need Windows 98 or higher. A broadband internet connection is also a requirement. Dialup connections wonít work. Drive space, processor speed, and memory requirements are negligible given the general power of todayís computers.
Another benefit of TightVNC is the built-in 128 bit encrypted security. When you begin a communications session, the program generates a new 12 digit access code. The access code then generates the encryption codes giving you an additional layer of security. Not bad for a free utility.
CrossLoop Graphic: Running the program is so easy itís almost boring. As you can see from the illustration, the interface is simple and straightforward. Assuming you started the session, the next step is to communicate the access code to the person you are communicating with. You can do this by email, telephone, screaming into the next room, etc.
After starting the session, your friend types the access code into the box and clicks Connect. When the Connect button is clicked on both sides the two PCs are linked.
This method of troubleshooting a remote PC eliminates all the hassles of trying to interpret what an inexperienced user is attempting to explain. Itís difficult to imagine anything less complex than a one button interface. With 128 bit encryption built in, itís tough to beat.
Other applications that make such connections possible have been available for years, but nothing Iíve seen makes it as simple as CrossLoop.
This article has been provided to APCUG by the author solely for publication by APCUG member groups. All other uses require the permission of the author (see e-mail address above).Click here to return to top