Although the OP hasn't come back for a bit on the problem, I'd like to point out the usefulness of a little program called nMap.
Nmap - Free Security Scanner For Network Exploration & Security Audits. is where you get it from.
This is a Security port scanner which can be used to determine open ports on a machine. Once you download it, have it target your machine supposedly running RDP by browsing to it in a cmd.exe prompt, and typing: nmap -sS <ip: 192.168.0.101>
Hit enter and let it do its thing. The -sS stands for scanSyn, which is simply a method of determining what services are running on the target. By default I think it scans ports 1-1024 in a random order. You can specify a port using the -p switch (nmap -sS 192.168.0.101 -p 3389 for example) to only target a single port to.
It's an extremely useful app, props to Fyodor and those at insecure.org for this awesome prog. Learn to use it and network diagnosis will become so much easier.
Nmap - Free Security Scanner For Network Exploration & Security Audits. is where you get it from.
This is a Security port scanner which can be used to determine open ports on a machine. Once you download it, have it target your machine supposedly running RDP by browsing to it in a cmd.exe prompt, and typing: nmap -sS <ip: 192.168.0.101>
Hit enter and let it do its thing. The -sS stands for scanSyn, which is simply a method of determining what services are running on the target. By default I think it scans ports 1-1024 in a random order. You can specify a port using the -p switch (nmap -sS 192.168.0.101 -p 3389 for example) to only target a single port to.
It's an extremely useful app, props to Fyodor and those at insecure.org for this awesome prog. Learn to use it and network diagnosis will become so much easier.