TITLE

Home is Where the Connection Is

AUTHOR(S)
Day, Jo; Day, Kevin
PUB. DATE
May 2002
SOURCE
Journal of Financial Planning;May2002, Vol. 15 Issue 5, p46
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This article presents the advantages and disadvantages of various remote connection applications along with examples of how certain solutions may meet the firm's specific needs. LapLink and pcAnywhere are products that have been available for a long time and are used by many planners. Each of these applications provides encryption to prevent outsiders from seeing your remote control session. They also make it easy to transfer files. However, there are some limitations with these products that the potential road warrior needs to be aware of. First, LapLink and pcAnywhere require that the software be installed on both computers involved in the remote control session--for example, your office computer and your remote computer. This can be a problem if you are using an associate's computer or are in a cyber-café. In these situations, it may not be feasible to install LapLink or pcAnywhere on the remote computer, which means that you would need to connect your laptop directly to the Internet. Both pcAnywhere and LapLink meet the needs of the remote worker in terms of software performance and behavior, but the configuration of your network security may limit the functionality or make it difficult to maintain. That said, there are some instances where these products will meet all of your remote connection needs--such as if you only need to connect to one office computer, and you are confident that your Internet service provider will not change your firewall configuration without notice.
ACCESSION #
6658322

 

Related Articles

  • MOVING TOWARD NETWORK SECURITY AND FIREWALLS FOR PROTECTING AND PRESERVING PRIVATE RESOURCES ON THE INTERNET. Ahamed, S. S. Riaz // Journal of Theoretical & Applied Information Technology;2008, Vol. 4 Issue 2, p149 

    Computer and network security are challenging topics among executives and managers of computer corporations. Internet security is the practice of protecting and preserving private resources and information on the Internet. Even discussing security policies may seem to create a potential...

  • Making your business network secure. Handby, Simon // Computer Shopper;Nov2013, Issue 309, p158 

    In this article the author opines on making one's business network secure. Topics discussed include ensuring that a business with an internet connection is protected by a suitable firewall, while using a second-hand modem/router, checking that no ports such as those needed by certain services,...

  • Dynamic DNS.  // Network Dictionary;2007, p167 

    A reference entry for "Dynamic Domain Name Systems" (DDNS) is presented. Unlike DNS, it allows anyone hosting a Web or file transfer protocol (FTP) server to advertise a public name to prospective users. It also works with dynamic Internet Protocol (IP) addresses, like those assigned by an...

  • INTERNET BEAT.  // Macworld;Apr2005, Vol. 22 Issue 4, p20 

    This section describes two Internet software. Captain FTP 4.0, from XNet Communications, is an updated File Transfer Protocol client which adds the ability to open FTP connections in tabs within a single window as well as built-in viewers for video, audio, image and Portable Document Format...

  • Internet offers many options for backing up important files. Goldsborogh, Reid // New Orleans CityBusiness (1994 to 2008);11/8/2004, Vol. 25 Issue 19, p18 

    The article discusses options given by Internet for backing up important files. These days the Internet makes saving important data offsite easier than ever with various options available. One viable free option for home and small-office users is to save documents to the Web space provided by...

  • Improving Quality of Service from TCP/IP Performance Degradation. Seshadri, R.; Penchalaiah, N. // International Journal of Engineering & Technology (0975-4024);Feb2011, Vol. 3 Issue 1, p20 

    TCP is currently the dominate congestion control protocol for the Internet. However, as the Internet evolves into a high-speed wired-cum-wireless hybrid network, performance degradation problems of TCP have appeared, such as underutilizing high-speed links, regarding wireless loss as congestion...

  • TURBOSOFT UNVEILS TURBOFTP 4.30 SECURE FTP CLIENT.  // GUI Program News;May2005, Vol. 16 Issue 5, pN.PAG 

    This article introduces TurboFTP 4.30, a secure File Transfer Protocol (FTP) client from Turbosoft that fully supports FTP over Secure Socket Layer/Transaction Layer Security authentication, industrial strength encryption and integrity protection. TurboFTP features a built-in Folder...

  • How webbed fingers can fish with the net. Jones, Janice // People Management;3/21/1996, Vol. 2 Issue 6, p48 

    Looks at some of the tools that are available to help an individual search for and access information on the Internet. How human resource practitioners benefit from Internet resources; File Transfer Protocol (FTP) as the most commonly used applications on the Internet; Some problems of the FTP;...

  • Ask Dr. Internet. Blass, Steve // Network World;1/6/2003, Vol. 20 Issue 1, p35 

    Discusses the possibility of establishing an Internet-accessible file transfer protocol (FTP) site in an apartment complex Internet connection. Use of peer-to-peer-file sharing tool or GoToMyPc as alternative ways of setting up an FTP site.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics