Host Configurator: Access tab
|Top Previous Next|
Fig.9. Host Configurator: Access tab.
Security of network connections.
Access Password defends Host Module from unauthorized remote access. Turn on option 1 (fig.9) for assigning the Access Password. Only the person who knows this password will be able to connect with this host.
With options 2 you can select kind of traffic encryption between modules. There are 2 levels of encryption:
It is default security level. It provides optimal security for cases when high speed of screen shots refreshing is required and high security of PC is not required. With this level all data transfered through network (such as mouse movements, keyboard commands, etc.) except screen shots will be encrypted.
With this level, absolutely all data will be encrypted. But this mode is more slow.
Settings change's security.
To prevent access to the Host Configurator program you can use Access Password. It will protect Host Module's settings from changes via Host Configurator program. For fulfilling this turn on option 3.
It is useful for unsecure Windows OS (Windows 95/98/Me). Under secure OS (Windows NT/2000/XP/2003) it is better to use its internal security features (to install Host Module as system service).
Note that the program's settings are stored in the registry and this password doesn't prevent registry change. But If Host Module runs as service of Windows NT/2000/XP/2003, the administrator privileges are required for changing the registry settings. Thus, it is recommended to install Host Module as a service.
Kind of remote access to this Host.
You can configure Host Module for 2 kinds of access (see option 4):
Copyright © Remote Computer Access