remote access software, remote control software, remote access applications, remote access VPN, remote access utilities and more.

Wednesday, June 01, 2005

Interesting remote access stats

60% The share of 4,012 Americans who say they check their email while on vacation; only 13 percent check it for business reasons, while 47 percent check it for pleasure, according to the recent "E-mail Addiction" survey by America Online and Opinion Research Corp.


Sunday, March 27, 2005

Remote access glossary

Some useful terms and what they mean:

Briefcase typically refers to a service whereby users may upload files to a storage area located on the Internet and later access it from other locations or allow others to do access it.

A method according to which data is stored in such a format as to require less space than it had taken before.

A method according to which data that is being translated into a secret code, which is made readable only by applying a secret 'key' or password.

Applications that allow users to exchange files over the Internet. Some file sharing applications communicate using Peer-to-Peer (P2P) communications, while some rely on storing files on servers and allowing others to access these files off these servers.

A software or device used to control and watch access to and from a network for the purpose of protecting it from hackers. It acts like a gateway through which all traffic to and from the protected network and/or systems passes, enforcing a security policy on all communication that takes place between the protected network and another network.

A program that enables moving files from one computer to another on the Internet.

A method used typically by routers, which essentially masks or "hides" all the internal network computers' IP addresses form the outside world behind a single public IP address. NAT both protects the network and allows sharing the Internet connection among several computers on the network.

A peer-to-peer (or P2P) computer network connects directly between computers (peers), rather than going through servers.

A common protocol used to retrieve e-mails from a mail server.

A cryptographic system that uses a public key and a private or secret key. An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them.

Logging on to a computer or to a network from a distant location. Generally this implies a computer, an Internet connection and some remote access software to connect to the network.

SSH is a program that allows logging into another computer over a network, execute commands on a remote machine, and move files from one machine to another.

A standard protocol used extensively by Web browsers for securely transmitting private information over the Internet.

Synchronization is the act of connecting two or more devices and making sure the data residing on them is identical. These devices may be a PC and a PDA, a desktop and a laptop or other devices.

Triple DES is a strong encryption algorithm, or cipher, that is used in many of the standard applications available today.

A small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive with up to 2GB of storage capacity. USB flash drives have less storage capacity than an external hard drive, but they are smaller and more durable because they do not contain any internal moving parts.

A remote desktop applications used for remote control of a remote computer. VNC is used to stream the desktop environment of a graphical user interface from one computer to a viewer application on another computer on the network.

A method for creating a network of secure links over a public IP infrastructure. VPNs may be used in order to provide secure access to a given private network from outside of the network.

Wednesday, March 09, 2005

Remote access VPNs: IPSEC Vs. SSL

IPSEC VPNs, used extensively in enterprises, do a great job in establishing site-to-site secure "tunnels" that replace expensive leased lines and securely connect the sites' networks. For the purpose of remote access, however, there's a new player in town - SSL VPNs. Unlike IPSEC VPNs, an SSL VPN does not put your remote PC "virtually" on the corporate network. Instead, it gives the user Web based access to the data on the corporate network. The obvious different - no need to install client software - is what makes it so attractive. Studies have shown the TCO of a client-based IPSEC VPN software is extremely high. SSL VPNs offer a more cost-effective replacement for VPN remote access.

What's the downside? Two main issues; The first is not being to work transparently as if you're on the remote network, since it's just Web based; The second is security, since using somebody else's PC's Web browser means dangers of key-loggers, viruses, trojans and other potentially dangerous elements. Some solutions already exist to these problems, and SSL seems to be taking its place as the remote access solution of choice.

Check out for deeper analysis.

Remote access software links

BeInSync next generation remote access software -
Check Point remote access VPN appliances -
GoToMyPC remote access software -
Juniper remote access VPN appliances -
PCAnywhere remote access software -
PC remote access Web site -
RealVNC remote access software -
Remote admin remote access software -
SofaWare remote access VPN appliances -
SonicWall remote access VPN appliances -
WebExMyPC remote access software -
Whale communications SSL remote access VPN -