Articles

Installing scanTXC

Call  https://scantxc.csbg.biz/publish.htm.

Click on  „Installieren“.

 

Next: click on “More Info”:

Click on „Run anyway“

Verify the Publicher:  C. Gathmann Computer-System-Beratung GmbH

Click on „Install“

The application will be installed  - again (if requested) confirm “More Info”

 

And „Run anyway” (again).

Read an confirm the disclaimer and “close” the Information Windows.

Even without any License Key entered the app will work with only two restrictions: after every 100 scans a message is raised. And at every start of the application the information window is opened first.

You can request a test license key (or a full license key) to switch these restrictions off: produkte@csbg.biz 

Finally the application get started:

At the same time very likely a Firewall Popup is visible. To allow scanTXM application to connect to scanTXC please allow the communication for this application.

For security reason you may only active this for the private network (see below).
Scan the QR-Code with scanTXM, this will configure the communication settings automatically.

From now on the scanTXM app on your mobile device can call scanTXC.  

The green tick indicates that both devices are now connected.

 

On the mobile device the symbol is showing that the connection to scanTXC is activated.

From now on, all scans are sent directly to the PC - and, if necessary, to the application that you have set under "Remote Control" in scanTXC.

 

  

 

Safety instructions for scanTXC:

The scanTXC application offers the option to send the scanned values to the keyboard buffer ("Remote Control" / "Paste scan values to application").

This functionality is perhaps classified as suspicious by a virus scanner because it enables you to remotely control the PC (if, for example, the option "Paste scan value to active window" is active). A MITM attack can be carried out relatively easily, especially in the case of non-encrypted transmissions. You should therefore only activate this function if it can be ruled out for this PC that any scanner input can be simulated. This is actually the case within a network behind a router with NAT (however, if another computer in the segment has been taken over by an attacker, this cannot be ruled out either).