TechWhirl (TECHWR-L) is a resource for technical writing and technical communications professionals of all experience levels and in all industries to share their experiences and acquire information.
For two decades, technical communicators have turned to TechWhirl to ask and answer questions about the always-changing world of technical communications, such as tools, skills, career paths, methodologies, and emerging industries. The TechWhirl Archives and magazine, created for, by and about technical writers, offer a wealth of knowledge to everyone with an interest in any aspect of technical communications.
Subject:RE: Run a PC remotely From:John Posada <jposada01 -at- yahoo -dot- com> To:"TECHWR-L" <techwr-l -at- lists -dot- raycomm -dot- com> Date:Tue, 18 Dec 2001 08:52:24 -0800 (PST)
> Do these remote-use apps require that the called PC
> (if it is a PC...) have a static IP address?
GoToMyPC doesn't. My cable IP uses dynamic IPs and I'm running Zone
Alarm for a certain level of protection...not the greatest, but that
machine doesn't need more.
I really haven't spent ALOT of time looking for loopholes, because
that's just the way I am...I don't kill myself looking for obstacles
when there may not be any...so shoot me :-) Besides...the PC that I
connect to is my spare PC and doesn't contain muich I wory about
loosing...just a bunch of applications with few data files (its the
PC I let my girlfriend use to check her AOL email when she comes
over). My main PC is conmnected by an LPT to LPT wire on an A/B
box...I turn the connection off most of the time.
What I do know is that I install an executable on my home machine
(the host) and configure it with an ID, which I understand is 128bit
encrypted. I then access a web page protected by a different
password, and that web page has a link to that executable. To access
that executable, the "web page sends a message" to the host and the
host needs to accept that message, based on the Host's encrypted ID.
I've been using the service for about a month and have been upto my
armpits with end of year projects at work, so I haven't spent any
more time than I could spare in figuring out how it really works,
maybe I'll do that during the week my company is closed between Xmas
and New Years. At that point, I'll be able to explain what's going
on in better terms. I'm sure our resident security expert/AP can
explain it better in the mean time. :-)
> direction? If your office workstation initiates the
> contact, are the responses from the home PC likely to
> arouse the ire of the corporate firewall?
Hasn't so far. To access work from home, the process is designed by
our company network security people.
__________________________________________________
Do You Yahoo!?
Check out Yahoo! Shopping and Yahoo! Auctions for all of
your unique holiday gifts! Buy at http://shopping.yahoo.com
or bid at http://auctions.yahoo.com
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Collect Royalties, Not Rejection Letters! Tell us your rejection story when you
submit your manuscript to iUniverse Nov. 6 -Dec. 15 and get five free copies of
your book. What are you waiting for? http://www.iuniverse.com/media/techwr
---
You are currently subscribed to techwr-l as: archive -at- raycomm -dot- com
To unsubscribe send a blank email to leave-techwr-l-obscured -at- lists -dot- raycomm -dot- com
Send administrative questions to ejray -at- raycomm -dot- com -dot- Visit http://www.raycomm.com/techwhirl/ for more resources and info.