Support

ELLENET SUPPORT
Ellenet Support Online uses TeamViewer software which allows our support team to connect to any PC or server around the world within a few seconds securely.

TeamViewer is perfectly safe and is trusted by many of the most progressive companies in the world – visit the TeamViewer reference page here: TeamViewer Companies include:

Microsoft, Intel, Siemens, IBM, Dell, and hundreds of other companies as it has full encryption and is perfectly safe to use.

Remote Support:
To install TeamViewer please download the following program for Windows or Mac and once the program is installed, please call an Ellenet consultant for an access code which will allow remote administration:

Windows

Our preferred method of providing support for Windows - click to install:



Once the program is installed, please let us know at [email protected] for an access code which will allow remote administration.

Mac

Our preferred method of providing support for Mac - click to install:



Once the program is installed, please let us know at [email protected] for an access code which will allow remote administration.

ELLENET SUPPORT SOFTWARE

Encryption:

TeamViewer includes full encryption, based on RSA private-/public key exchange and AES (256 Bit) session encoding. This technology is based on the same standards as https/SSL and is considered completely safe by today's standards.

The key exchange also guarantees a full client-to-client data protection. This means that even our routing servers will not be able to read the data stream.

Access Protection:

In addition to the PartnerID TeamViewer generates a session password that changes with every software start to provide additional security against unauthorized access to a remote system.

Security relevant functions like file transfer require additional, manual confirmation of the remote partner.

Also it is not possible to invisibly control a computer. For data protection reasons the person sitting on the remote computer has to be able to detect when someone is accessing the machine.

Code Signature:

All program files are secured using VeriSign code signing technology. This allows you to verify the origin of the executables you received.