{"version":"1.0","provider_name":"PC Matic Blog","provider_url":"https:\/\/www.pcmatic.com\/blog","author_name":"Chris Pirillo","author_url":"https:\/\/www.pcmatic.com\/blog\/author\/chris-pirillo\/","title":"Chris Pirillo: How to Control Someone Else's Computer","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"RfWUDahn3J\"><a href=\"https:\/\/www.pcmatic.com\/blog\/chris-pirillo-how-to-control-someone-elses-computer\/\">Chris Pirillo: How to Control Someone Else&#8217;s Computer<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.pcmatic.com\/blog\/chris-pirillo-how-to-control-someone-elses-computer\/embed\/#?secret=RfWUDahn3J\" width=\"600\" height=\"338\" title=\"&#8220;Chris Pirillo: How to Control Someone Else&#8217;s Computer&#8221; &#8212; PC Matic Blog\" data-secret=\"RfWUDahn3J\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.pcmatic.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","thumbnail_width":1920,"thumbnail_height":1080,"description":"There are many reasons that someone might need to control another computer remotely. Providing tech support to family and friends, accessing your system at home from a remote location, and companies monitoring and assisting employees are just a few reasons. There are many ways to accomplish this, and in this video I go over a few suggestions that have worked for me. These may not be the best solutions for everyone, so please feel free to comment below with the method that has worked best for you."}