2
   

Remote Access to your PC

 
 
Reply Sun 11 Mar, 2007 04:25 pm

i just started using a program that allows me to access my work computer remotely from another computer.

so far i like it -- a lot.

i can do everything that i can do sitting in front of the pc -- including shutting down and re-starting.

the speed is good -- its a little slower, especially the CAD programs.
but its a more-than-fair trade off.

friday i left the office 2 hours early, then finished the day from home...


i'm wondering --
are any security issues i should be aware of?
if our home PC gets a virus, can i pass it to the work PC remotely?
 
DrewDad
 
  3  
Reply Sun 11 Mar, 2007 04:27 pm
It's not likely to pass a virus from home to work, unless you transfer files back and forth.

Security issues - anyone with your username and password could access your work PC, and have access to your corporate network under your credentials.
0 Replies
 
DrewDad
 
  2  
Reply Sun 11 Mar, 2007 04:28 pm
Another security issue: make sure that traffic is encrypted.
0 Replies
 
Walter Hinteler
 
  2  
Reply Sun 11 Mar, 2007 04:33 pm
Using my I-Spy-On-Region-Philbis 10.5 BETA RemoteSuperSpySoftware to monitor now both computers ...


... basically, DrewDad said all.
0 Replies
 
Region Philbis
 
  1  
Reply Mon 12 Mar, 2007 01:32 am
DrewDad wrote:
It's not likely to pass a virus from home to work, unless you transfer files back and forth.
this software doesn't seem to allow it, except via e-mail.
Quote:
Security issues - anyone with your username and password could access your work PC, and have access to your corporate network under your credentials.
no one's getting my login info.
Quote:
Another security issue: make sure that traffic is encrypted.
how do i check that its encrypted?

Walter Hinteler wrote:
Using my I-Spy-On-Region-Philbis 10.5 BETA RemoteSuperSpySoftware to monitor now both computers ...
Laughing
so you're saying my paranoia is indeed justified...





Shocked what the hell was that noise?
0 Replies
 
Walter Hinteler
 
  2  
Reply Mon 12 Mar, 2007 01:58 am
Region Philbis wrote:
no one's getting my login info.


Hey, jespah, winky-winky

Region Philbis wrote:
Shocked what the hell was that noise?
0 Replies
 
Region Philbis
 
  1  
Reply Mon 12 Mar, 2007 02:00 am

not even her...
0 Replies
 
Walter Hinteler
 
  2  
Reply Mon 12 Mar, 2007 02:06 am
Well, then you really should be okay.










Besides that, I notice that you change the passwords frequently

http://i17.tinypic.com/2s6mwj5.jpg

That's good as well!
0 Replies
 
Region Philbis
 
  1  
Reply Mon 12 Mar, 2007 02:37 am

i KNEW i shouldn't have used "Walter" as a password...
0 Replies
 
DrewDad
 
  2  
Reply Mon 12 Mar, 2007 03:24 pm
The vendor should have info on encryption.
0 Replies
 
Region Philbis
 
  1  
Reply Thu 15 Mar, 2007 05:22 am
http://img143.imageshack.us/img143/817/securezg2.jpg...... this doo-hickey gives me peace of mind...
0 Replies
 
squinney
 
  2  
Reply Thu 15 Mar, 2007 05:45 am
Hey, Region. When do you need that report done that you're working on? It needs a couple of re-writes yet, from what I can see, and you really need to be in the habit of using spellcheck.
0 Replies
 
parados
 
  2  
Reply Thu 15 Mar, 2007 07:57 am
Now that everyone is done admiring your work....

Controlling one computer from another is common enough. XP comes with a built in way to do that. There are some security issues however.
Once you make your computer accessable to outside access it means anyone can try to break into it. They would have to guess your user name and password so it might be unlikely but not impossible.

There are ways to make it more secure. Most VPN (virtual private network) and remote control systems use specific ports. Sometimes you can change those ports in the firewall or the program itself. This makes it a little harder to find your computer since most hackers only probe the normal ports.

Some basic security items to consider.
1. don't allow remote log in to an administrator account. Restrict the log in to accounts that can't make changes to the system or access system files.
2. restrict remote log in to specific IP addresses. This is often done in the firewall if you know which ports your program uses and if you will only be logging in from the same place with a static IP.
3. Restrict remote log in to specific known computers. Linux does this by using a public and private key. Unless the computer logging in has the key they wan't have access.
4. Have your system write a record of all attempts to log in to a file. Check this file to see if others are attempting to break in. You will be amazed by the number of times someone probes your computer if you ever look at one of these log files. Hackers run programs that cycle through IP addresses trying several hundred names/passwords and other possible weaknesses. Most attempts are just a scan and run and if you are properly protected won't be a problem. What you really want to know is if someone is specifically targetting you and running thousands of user/pw combinations.
0 Replies
 
cjhsa
 
  0  
Reply Thu 15 Mar, 2007 08:17 am
****, John-the-ripper just died.
0 Replies
 
Region Philbis
 
  1  
Reply Thu 15 Mar, 2007 10:28 am
squinney wrote:
Hey, Region. When do you need that report done that you're working on? It needs a couple of re-writes yet, from what I can see, and you really need to be in the habit of using spellcheck.

um, i'm going to need you to go ahead and finish that report for me, mmm-kay?
0 Replies
 
Region Philbis
 
  1  
Reply Thu 15 Mar, 2007 10:29 am

this was weird, and totally unexpected --

so this morning i made the mistake of sending an e-mail to the wise-ass in the next cube.
he ran over and turned my monitor on, the bahstid.

he was laughing and messing around with the mouse when the boss walked by.

wise-ass says "hey look, boss! RP is working at home today."

so when i got in, i went over and thanked him for what he did, and told him that i'd better start looking for another job now...


the moral of the story is --
you can't always trust your work "buddies"...
0 Replies
 
squinney
 
  2  
Reply Thu 15 Mar, 2007 10:55 am
Jerk! I just checked his files.

I'll take care of him from here for ya.
0 Replies
 
Region Philbis
 
  1  
Reply Thu 15 Mar, 2007 02:17 pm

i appreciate the offer, but it won't be necessary.

he seemed reticent and remorse when i confronted him...
0 Replies
 
Region Philbis
 
  1  
Reply Thu 19 Nov, 2009 06:35 am

this program is pretty friggin cool.

yesterday we were told to power off our PC's before we went home.
in the past, that meant a human finger had to push the button to turn it back on.

no longer!
i can now do it remotely... Cool
0 Replies
 
Region Philbis
 
  1  
Reply Fri 30 Jul, 2010 03:39 pm

lately i've been accessing the home puter from work during the week.
the boys in IT must be wondering why i stopped doing all that surfing... Mr. Green
0 Replies
 
 

Related Topics

YouTube Is Doomed - Discussion by Shapeless
So I just joined Facebook.... - Discussion by DrewDad
Internet disinformation overload - Discussion by rosborne979
Participatory Democracy Online - Discussion by wandeljw
OpenDNS and net neutrality - Question by Butrflynet
Internet Explorer 8? - Question by Pitter
 
  1. Forums
  2. » Remote Access to your PC
Copyright © 2024 MadLab, LLC :: Terms of Service :: Privacy Policy :: Page generated in 3.25 seconds on 12/22/2024 at 05:33:27