LogMeIn123 (relaunched as GoToMyPC) allows your IT Support Technician to access your computer remotely, jumping directly into your desktop, to solve your issue. Remote support works well as it allows your Technician to do the work for you.
To use LogMeIn123, the client typically visits a website provided by the technician, enters a 6-digit code, and then grants permission for the technician to access their computer. Once connected, the technician can control the client's computer and diagnose and fix any issues remotely.
LogMeIn Rescue is a powerful, easy-to-use remote support solution for PCs, Macs, mobile devices, and more. A remote support tool built for one man helpdesks to the world's largest support organizations and everyone in between. Helping you provide technical support to your employees, your customers, or both, with a solution which is fast, reliable, flexible, and easy to use.
General guidance on how to use LogMeIn123:
- Start by obtaining a 6-digit code from the technician or support person who will be providing remote support. This code is typically provided via email, phone, or chat.
- Visit the LogMeIn123 website or use the LogMeIn123 client application, which can be downloaded from the LogMeIn website.
- Enter the 6-digit code provided by the technician into the appropriate field on the LogMeIn123 website or client application.
- Click on the "Start Download" or "Start Session" button to allow the technician to remotely access and control your computer.
- Grant permission for the technician to control your computer by following the prompts on the screen.
- Once the technician has control of your computer, they can diagnose and fix any issues, install software, or perform other technical support tasks as needed.
- When the support session is complete, the technician will disconnect from your computer, and you can close the LogMeIn123 client application.
It's worth noting that while LogMeIn123 can be a helpful tool for providing remote support, it should only be used with the consent and knowledge of the client, as it can potentially allow access to sensitive information on their computer.