Skip to main content

What Is Remote Access to Computer Networks?


In computer networking, remote access technology allows logging into a system as an authorized user without being physically present at its keyboard.Remote access is commonly used on corporate computer networks but can also be utilized on home networks.

Remote Desktop

The most sophisticated form of remote access enables users on one computer to see and interact with the actual desktop user interface of another computer. Setting up remote desktop support involves configuring software on both the host (local computer controlling the connection) and target (remote computer being accessed). When connected, this software opens a window on the host system containing a view of the target's desktop.
Current versions of Microsoft Windows include Remote Desktop Connection software. However, this software package only supports target computers running Professional, Enterprise or Ultimate versions of the O/S, making it unsuitable for use with many home networks. For Mac OS X computers, the Apple Remote Desktop software package is also designed for business networks and sold separately. For Linux, various remote desktop software exists.
Many remote desktop solutions are based on Virtual Network Computing (VNC)technology. Software packages based on VNC work across multiple operating systems. The speed of VNC and any other remote desktop software can vary, sometimes performing effectively the same as the local computer but other times exhibiting sluggish responsiveness due to network latency.

Remote Access to Files

Basic remote network access allows files to be read from and written to the target, even without remote desktop capability in place. Virtual Private Network (VPN) technology provides remote login and file access functionality across wide area networks (WANs). A VPN requires client software be present on host systems and VPN server technology installed on the target network. As an alternative to VPNs, client/server software based on the secure shell (SSH) protocol can be also be used for remote file access. SSH provides a command line interface to the target system.
File sharing within a home or other local area network (LAN) is generally not considered to be a remote access environment.

Popular posts from this blog

IT EMPLOYEE HEALTH ISSUES

An increasing number of IT professionals have been finding it difficult to handle emotional stress, according to experts. An ‘occupational hazard,' the stress related to work needs to be addressed without delay, they emphasise.

“Coping with stress and striving for mental health welfare should be a matter of concern for all and not treated simply as a lifestyle problem of the ‘IT phenomenon',” says Nithya Chandrasekaran, a consultant physician for many IT companies in the city. Post-recession, employees feel pressured to perform well.

Regular occupational problems such as wrist problems due to constant handling of the mouse, slip disc and eye fatigue are common now, but handling stress that arises owing to fear of losing job or to cope with the increasing competition, affects the employee's performance, eventually, taking a major toll on his health, doctors explain.

The project that K. Balajee (29) was handling was pulled off after six months of its inception. Currently ma…

Internet Safety Tips and Rules

Why is it important to stay safe online?

Most of us are ‘connected’ via our laptops, mobile phones, tablets or personal computer. The potential for the internet to be a valuable and a fun resource for entertainment, making friends, keeping in touch and learning is huge. But if you use the internet, you could be at risk of illegal activity or abuse - be it bullying, fraud or something more serious. Unlike seeing someone face to face, on the net, people aren't always what they first seem.

In the same way you learn about safety when you leave the house, it is important to learn how to stay safe online. These are skills that will stay with you for life.



Internet Safety Tips for Kids and Teens
1. Spend time having fun with your parents online and helping them understand technology!
2. Never post your personal information, such as a cell phone number, home number, home address, or your location on any social networking site or through mobile apps like Snapchat or Instagram.
3. Never me…

Cyber Crime

Cyber Crime is a fast-growing area of crime.More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual, cause serious harm and pose very real threats to victims worldwide.

What is the Cyber Crime? Cyber crime encompasses any criminal act dealing with computers and networks (called hacking).  Additionally, cyber crime also includes traditional crimes conducted through the Internet.  For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.

Identity theft
Identity theft and fraud is one of the most common types of cyber crime. The term Identity Theft is used, when a person purports to be some other person, with a view to creating a fraud for financial gains. When this is done online on the…