Windows 98 remote access

June 1998
PC Week;06/15/98, Vol. 15 Issue 24, p144
Trade Publication
Presents a step by step description of accessing Windows 98 from a remote location. The Dial-Up Networking wizard; Creating a modem based connection; Entering the Internet service provider's phone number; Creating a second dial-up connection; Entering the host's Internet Protocol (IP) address or host name.


Related Articles

  • THE CONTINUING COOKIES CONTROVERSY. Dyrli, Odvard Egil // Curriculum Administrator;Aug2000, Vol. 36 Issue 7, p26 

    Focuses on online privacy. Ways to keep one's tracks from being watched; Installation of special data file to achieve online privacy.

  • Seeking password protection. Markowitz, Michael C. // EDN;9/02/96, Vol. 41 Issue 18, p11 

    Editorial. Offers suggestions on making good password used in computer access control. Includes the avoidance of using birthdays, names, anniversaries and telephone numbers as password; Avoidance of using real words which are easy prey for password-cracking programs.

  • Untitled. Lancaster, Don // Electronics Now;Feb1994, Vol. 65 Issue 2, p73 

    Reports on developments related to computer hacking. Availability of a sign routing system from John Rees; Technological innovations on voice messaging; Proposed standard data format for printed-circuit artwork; Special effects software; Literature. INSETS: Need help? (contact...

  • Technology and the art of locating hidden assets. Titus, Karen // Commercial Law Bulletin;Sep/Oct97, Vol. 12 Issue 5, p14 

    Evaluates personal computing and surfing the Internet by using your television remote with reference to the impact of this technology on collection and bankruptcy attorneys. Comments from Lori Gulley, product manager for KnowX, an Internet public records information service; Information on...

  • Tell staff you're monitoring work e-mail so they can't argue it was confidential.  // HR Specialist: California Employment Law;Mar2011, Vol. 5 Issue 3, p3 

    The article offers information on a case regarding the usage of company computers for personal businesses.

  • More Hints for Navigating LIGHTWAVE.  // Lightwave;Feb2010, Vol. 27 Issue 2, following p31 

    The article lists the navigation bar with buttons with its functions including thumbnails that is use to change the screen, contents that shows the page of the table of contents, and share that allows to send a link to the entire issue.

  • Digital certificates are the answer to security.  // PC Week;3/17/97, Vol. 14 Issue 11, p131 

    Mentions a report from Forrester Research Inc. which predicts that passwords will be replaced by digital certificates on corporate intranets. Why the change will happen.

  • Academic freedom and the Internet. Heins, Marjorie // Academe;May/Jun98, Vol. 84 Issue 3, p19 

    Presents information on a 1996 law which was enacted by the commonwealth of Virginia, whereby commonwealth employees were prohibited from using computers owned or leased by the state for certain uses. Number of employees which the law applied to; Information on a caveat of the law which allowed...

  • Take a stab at solving WINS-related problems and you could become Firefighter of the Year. WONNACOTT, LAURA // InfoWorld;01/25/99, Vol. 21 Issue 4, p75 

    Offers advice on ways to handle Windows Internet Naming Service (WINS)-related problems of enterprise computing. Use of the Network Time Protocol (NTP) for computer time synchronization; Types of public time servers on the Internet; Considerations in server attachments.

  • Don't watch that! Lynch, Michael W. // Reason;Feb98, Vol. 29 Issue 9, p17 

    Reports on the widening of the coverage of a mandatory program blocking scheme of monitors based on ratings as proposed by the United States Congress, to include even personal computers that are not intended to receive television signals. Coverage of the proposal; Implementation of the scheme.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics