Jump to content

Remote computer: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
MicGie (talk | contribs)
A blatant advertisement for Netop.
Line 1: Line 1:
{{unref|date=July 2007}}
{{unref|date=July 2007}}
{{db-spam}}
A '''remote computer''' is a [[computer]] to which a user does not have physical access, but which he or she can access or manipulate via some kind of [[computer network|network]].
A '''remote computer''' is a [[computer]] to which a user does not have physical access, but which he or she can access or manipulate via some kind of [[computer network|network]].



Revision as of 08:40, 27 June 2011

A remote computer is a computer to which a user does not have physical access, but which he or she can access or manipulate via some kind of network.



Remote desktop is one of those wildly creative computer terms that means exactly what it sounds like. Remote desktop allows you to control desktop — and, indeed, the entire contents — of a computer from another machine entirely. You do this using a sort of remote control, except that this remote control is not a magic wand but a software application.

Remote desktop is a software application that turns one computer into the boss of another or a series of others. Remote desktop is sometimes found as part of a suite of other administrative applications; other times, remote desktop is its own entity, doing nothing but what it’s supposed to do. Remote desktop software is available for all computer platforms.

Remote desktop requires that the “master” and “slave” computers be connected to the same network. This remote desktop network can be wired or wireless. Wired networks can use direct connections or connections through routers. Wireless networks can be formed using routers or the Internet.

Advanced security protocols are standard practice inclusions in remote desktop software, especially when the network is a wireless and/or Internet one. The latest versions of remote desktop software have 128-bit encryption protocols. Older versions might have protection of a lesser nature. If you are running remote desktop software, even if your connection is direct wired, you need to run advanced security protocols as well. Not to do so is to invite piracy.

Once the administrator has entered the correct password, the remote desktop software enables that administrator to access the target computer. Then, uploads, downloads, file transfers, and software maintenance can take place. Indeed, software maintenance is one of the most common uses of remote desktop software. Often, the administrator will shut down a malfunctioning software application or install a software upgrade using remote desktop software. This saves the time that it would take the administrator to physically insert a CD into the target computer or to do a manual software upgrade download.

The target computer in a remote desktop scenario is still able to access all of its core functions. Many of these core functions, including the main clipboard, can be shared between target computer and administrator, however. Certain safety features can be built into the remote desktop software protocols such that the administrator is not able to delete or otherwise alter files without the target user’s permission. One other rather revolutionary thing that remote desktop software can do is to allow the administrator to run an audio or video application on a remote computer and have the sights and/or sounds redirected to the administrator’s computer.

Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days where security was just a matter of the highest degree of encryption. Today, a truly secure remote support solution will allow organizations to centrally control who can do what and where safe in the knowledge that when each remote session has finished it should be able to document what actually took place.

For systems in environments that need to meet and maintain compliance requirements[1], remote administration software must have strict security control. Software like Netop Remote Control 10 is able to exceed the toughest security standards including PCI DSS, ISO 27001, FIPS and HIPAA.

It is necessary to examine[2] the remote control software functionality that best serves organizations that need a highly secure tool that crosses all platforms and devices and is completely scalable in any environment. It will help IT professionals select a remote control solution that increases productivity and customer satisfaction, as well as enhances the flexibility of the IT organization and improves the company’s risk profile.

Typical Remote computer Software

References

  1. ^ "Compliance and Security Challenges with Remote Control" (PDF). SANS Analyst Program. {{cite web}}: Cite has empty unknown parameter: |1= (help)
  2. ^ "Insiders' Guide to Evaluating Remote Control Software" (PDF). Netop Business Solution. {{cite web}}: Cite has empty unknown parameter: |1= (help)