<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Remote Access &#8211; David&#039;s Church Information Technology</title>
	<atom:link href="/category/remote-access/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>David Szpunar: Owner, Servant 42 and Servant Voice</description>
	<lastBuildDate>Wed, 16 Sep 2009 16:26:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.2</generator>
	<item>
		<title>Palm Centro and GoDaddy SSL Certificates: Fixed!</title>
		<link>/2009/09/16/palm-centro-and-godaddy-ssl-certificates-fixed/</link>
					<comments>/2009/09/16/palm-centro-and-godaddy-ssl-certificates-fixed/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Wed, 16 Sep 2009 16:25:50 +0000</pubDate>
				<category><![CDATA[Companies]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Websites]]></category>
		<category><![CDATA[Daryl Hunter]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Exchange 2003]]></category>
		<category><![CDATA[Exchange 2007]]></category>
		<category><![CDATA[GoDaddy]]></category>
		<category><![CDATA[RapidSSL]]></category>
		<category><![CDATA[RapidSSL Online]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=408</guid>

					<description><![CDATA[We have many Palm phones running Palm OS, in particular we have a lot of Palm Centros although we have some other models as well (but they all run Palm OS, not Windows Mobile). We&#8217;ve had GoDaddy SSL certificates for a while for our Exchange 2003 server. Until now, I&#8217;ve never had an issue with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We have many Palm phones running Palm OS, in particular we have a lot of Palm Centros although we have some other models as well (but they all run Palm OS, not Windows Mobile). We&#8217;ve had GoDaddy <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> certificates for a while for our Exchange 2003 server. Until now, I&#8217;ve never had an issue with GoDaddy certificates where the phone would reject them, but yesterday I renewed the two-year <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> certificate we had (since it expires October 3rd and I don&#8217;t want to let it run out&#8211;again :-)</p>
<p>So I make it through the renewal process, which required generating a new CSR (Certificate Signing Request) for a brand new certificate from the server since the original one had a bit length of 1024 and GoDaddy only accepts 2048 to 4096 bit lenghts (this is a new requirement). After completing the process and getting the certificate installed, I got a nice helpdesk call from a user this morning who has a Centro: &#8220;<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> certificate not accepted due to possible expiration.  Check device date &amp; time and re-sync.&#8221;</p>
<p>Joy oh joy, exactly what I&#8217;d been looking for, another problem and wasted time!</p>
<p>OK, enough sarcasm (but really, can you ever have enough?). Time for Google and <a title="Daryl Hunter's blog" href="http://www.darylhunter.me/">Daryl Hunter</a> from the Church IT Roundtable! Although GoDaddy auto-renewed my <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> certificate, I was actually contemplating buying one of their UCC certificates to be ready for when we went to Exchange 2007. Fortunately I read Daryl Hunter&#8217;s <a title="Daryl Hunter: Exchange 2007 - SSL without a UCC Certificate" href="http://www.darylhunter.me/churchit/2009/09/exchange-2007-ssl-without-a-ucc-certificate.html">post about Exchange 2007 without UCC certs</a>, and stuck with the regular certificate for now, because per <a title="Palm Support: Certificate Modification Tool for enterprise and advanced end-users" href="http://kb.palm.com/wps/portal/kb/common/article/43375_en.html">Palm KB article 43375</a>, certificates with Subject Alternate Names (SANs), such as UCC certs, are not supported at all on Palm devices (&#8220;<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> v3 certificates which rely on the Subject Alternate Name field to do load balancing across virtual site names do not work with Palm OS devices.&#8221;). So a UCC cert isn&#8217;t even an option for me, but it&#8217;s cheaper to do Daryl&#8217;s method anyway! For now I don&#8217;t have to worry about it, since I just have Exchange 2003 for now, and that&#8217;s not the present issue (but we will likely be on Exchange 2007 or Exchange 2010 by the time the certificate expires). Additionally, the same article (which has a tool for installing new trusted root certificates on <em>some</em> Palm OS devices&#8211;but I didn&#8217;t want to mess with touching every single Palm OS device here! And, the tool works on Windows 2000 or XP only, not Vista (and I&#8217;m sure not Windows 7 either)) specifically states that, &#8220;GoDaddy Class 2 certificates do not work with Palm OS devices.&#8221; Time to drop GoDaddy!</p>
<p>Daryl&#8217;s favorite <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> certificate vendor (and now, mine too!) is <a title="RapidSSL Online" href="http://www.rapidsslonline.com/">RapidSSL Online</a>. They sell certificates from RapidSSL.com for $17.95 per year (or cheaper, for multiple years), and they&#8217;re single root certificates (which menas you don&#8217;t have to install intermediate certificates on your server). While RapidSSL Online is cheap, <a title="RapidSSL.com" href="http://www.rapidssl.com/">RapidSSL.com</a> directly has a 30 day trial certificate you can sign up for to test for a month, and this is the way I went. When that certificate expires I&#8217;ll be purchasing a multi-year certificate from RapidSSL Online, but I wanted to make sure it would work, and it does! I don&#8217;t know for sure, but it appears that RapidSSL.com is the company holding the root certificate, while RapidSSL Online is either a reseller or a sub-company of the parent selling the certificates at a discount (the RapidSSL.com certificates aren&#8217;t expenive but still cost a lot more than from RapidSSL Online!). Either way, RapidSSL Online claims that their RapidSSL certificates are issued by RapidSSL.com so they should be the same (I haven&#8217;t made a purchase yet), and Daryl Hunter has used RapidSSL Online successfully for years across multiple installations.</p>
<p>I generated a new CSR for a new certificate, again (just like I had to do for GoDaddy). I installed the free certificate on my Exchange server&#8217;s IIS (I also then exported it and imported the .pfx file onto my <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 firewall since it does the authentication up front for external clients, but that&#8217;s a pretty unique case and in most cases you want this done on the Exchange server). They were right, it&#8217;s just a single root on the certificate, signed by Equifax! I had my Palm Centro users (two had complained by this point) try syncing again. It worked! My iPhone also works fine still, and I haven&#8217;t had any negative reports from the four Palm Pre users here either. None of my users have Windows Mobile, and my one Blackberry user connects though Blackberry Professional Server rather than with ActiveSync.</p>
<p>So, adios GoDaddy <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span>; fortunately they will refund all but $15 of my certificate (for processing since it was issued), and I&#8217;ll still come out ahead with RapidSSL Online (GoDaddy was $60 for two years, while RapidSSL Online is only $70 for five years!).</p>
<p>One thing I&#8217;ll have to be careful of when I go to Exchange 2007 is that once I use Windows Server 2008 to generate the CSR, it appears I will need to go to extra pains to make sure the CSR is in Printstring format instead of UTF-8, as Palm OS doesn&#8217;t support UTF-8 certificates either (Server 2003 uses Printstring by default). Daryl located this useful post while helping me troubleshoot: <a title="The Teklog: Ranting about Palm Centro Versamail ActiveSync and SBS 2008" href="http://teklogic.net/tekblog/ranting-about-palm-centro-versamail-activesync-and-sbs-2008">Ranting about Palm Centro Versamail ActiveSync and SBS 2008</a>. Useful info, I&#8217;m sure I&#8217;ll be going back when it&#8217;s time to renew next time and Server 2008 is in place. By then, I hope we are Palm OS-free; although I loved my Treo 600 and Treo 650 both, the web is littered with forum and blog posts from people who have <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> issues with Palm OS devices (the Palm Pre and Pixi are much more flexible and up-to-date with the Palm WebOS). I was happy GoDaddy &#8220;just worked&#8221; in the past, frustrated that they &#8220;just didn&#8217;t work&#8221; this time, and happy to save money and move to a company that&#8217;s quicker/faster/easier!</p>]]></content:encoded>
					
					<wfw:commentRss>/2009/09/16/palm-centro-and-godaddy-ssl-certificates-fixed/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Comcast Home Internet without the cr*pware</title>
		<link>/2009/02/17/comcast-cable-internet-without-software/</link>
					<comments>/2009/02/17/comcast-cable-internet-without-software/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 17 Feb 2009 17:48:45 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Comcast]]></category>
		<category><![CDATA[home]]></category>
		<category><![CDATA[internet]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=359</guid>

					<description><![CDATA[This morning we switched at home from 1.5Mbit AT&#38;T DSL to 6Mbit Comcast Cable internet (yay!). I remembered from last time we had Comcast that they (like AT&#38;T) like to send a CD that you are required to use to activate your modem, but also happens to install things that no sane IT person would [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>This morning we switched at home from 1.5Mbit AT&amp;T DSL to 6Mbit Comcast Cable internet (yay!). I remembered from last time we had Comcast that they (like AT&amp;T) like to send a CD that you are required to use to activate your modem, but also happens to install things that no sane IT person would want on their computer. Things like a PC Doctor. And (years ago, maybe not this time), custom IE throbbers. Also, McAfee antivirus software (ewww!). Yeah, not gonna happen here.</p>
<p>What was my solution this time? VMware Player and Windows XP! I grabbed a Windows XP virtual machine and ran it on my laptop in VMware Player, which worked just fine on Windows 7 (another reason not to run the Comcast stuff&#8230;who knows if it&#8217;s Windows 7 compatible). The biggest &#8220;issue&#8221; I had was that I had to disable all protocols bound to the LAN adapter on my laptop except for the VMware Bridge Adapter (to allow the virtual machine network access). That way the virtual machine got the DHCP and proxy settings from the cable modem when I turned it on, rather than my laptop (leaving the VM unable to connect). Once the VM had the &#8220;only&#8221; network connection, the wizard proceed normally and I got everything connected just fine (the wizard is much more streamlined than it used to be at least).</p>
<p>After it&#8217;s working, I just turned off the cable modem and plugged the WAN port of my wireless router into the modem, and turned it back on. Everything was smooth sailing from there. It does apparently lock to your <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> address but that is reset when the modem reboots.</p>
<p>Interestingly, the modem is an RCA brand modem, which is funny since I asked specifically when I talked to Comcast yesterday what brand the modem would be and they specifically said a Surfboard, which is by Motorola. Oh well, as long as it works I don&#8217;t care too much. Better than my old DLink from last time!</p>
<p>Now, if only Comcast would expand their trial of 16-20Mbit speeds (instead of 6Mbit) from South Bend to Indy, life would be awesome!</p>
<p>I&#8217;ve gotten a few draft posts written but nothing finished yet (I know it&#8217;s been a while!). However, the big news today is that Veeam Backup 3.0 was released this morning, which I already have a license for and I&#8217;m working to clean off the server that I&#8217;ll be running it on! It will definitely get a review when it&#8217;s up and running. I&#8217;m excited!</p>]]></content:encoded>
					
					<wfw:commentRss>/2009/02/17/comcast-cable-internet-without-software/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Remote Desktop and SSH with mRemote, free and open source</title>
		<link>/2008/09/01/remote-desktop-ssh-with-mremote-free-opensource/</link>
					<comments>/2008/09/01/remote-desktop-ssh-with-mremote-free-opensource/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Mon, 01 Sep 2008 16:38:26 +0000</pubDate>
				<category><![CDATA[Cool Tools]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[RDP]]></category>
		<category><![CDATA[remote control]]></category>
		<category><![CDATA[Remote Desktop]]></category>
		<category><![CDATA[Secure Shell]]></category>
		<category><![CDATA[SSH]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=276</guid>

					<description><![CDATA[mRemote is one of my best Cool Tools finds in quite a while.Â  I first heard about it from this 4sysops post comparing free RDP clients. For a long time, I thought all I needed was the built-in Windows Remote Desktop Client. I was very wrong. Sure, it&#8217;ll get the job done, if you don&#8217;t [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a title="mRemote: Free Remote Control Interface" href="http://www.mremote.org/">mRemote</a> is one of my best Cool Tools finds in quite a while.Â  I first heard about it from this <a title="4sysops: Comparison of six free RDP client tools" href="http://4sysops.com/archives/comparison-of-six-free-rdp-client-tools/">4sysops post comparing free RDP clients</a>. For a long time, I thought all I needed was the built-in Windows Remote Desktop Client. I was very wrong. Sure, it&#8217;ll get the job done, if you don&#8217;t mind windows all over the place, managing a bunch of connection settings files, and manually editing said files to get Console connections. Or hey, you could always start RDP from the command line if you want to connect to a server&#8217;s console session using a switch. But with the free and open source mRemote software, you can have one window with connections organized by folder, inheriting settings in a hierarchy (or not, as you prefer, per setting), and giving you tab-based access to your open remote control windows! All this with a configuration file you can copy and use on multiple computers, or the option of storing connection settings in a SQL Server database (I haven&#8217;t tried this; I might if it supported using a MySQL database).</p>
<p>In addition to Remote Desktop, you can also open webpages (<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HyperText Transfer Protocol' );"><acronym class="uttInitialism">HTTP</acronym></span> or <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span>, using Internet Explorer or optionally the Gecko rendering engine that Firefox uses if you download xulrunner&#8230;see the instructions within mRemote). And connect to <span class="ubernym uttAcronym" onmouseover="domTT_activate(this, event, 'content', 'Secure command-line access with additional features, comparable to telnet on steroids','caption', 'Secure SHell' );"><acronym class="uttAcronym">SSH</acronym></span> sessions using PuTTY, which comes with mRemote, right inside other tabs.</p>
<p>There are other tools out there that do similar things. <a title="Royal TS" href="http://code4ward.net/cs2/">Royal TS</a> is one, and in fact was the first one I found (<a title="4sysops: RoyalTS vs. visionapp Remote Desktop - Two free RDP connection management tools" href="http://4sysops.com/archives/royalts-vs-visionapp-remote-desktop-two-free-rdp-connection-management-tools/">see review from 4sysops here</a>). There are others in the original 4sysops post I linked to, which compared six free RDP clients and mentioned a paid one. mRemote does everything I need in a comfortable way that I&#8217;m very pleased with, at my favorite price. It works fine with Server 2008 and Vista, and using the smartsize setting so the remote desktop fills whatever resolution is available inside the mRemote window makes for an efficient work area that&#8217;s as large as you can fit on your screen!</p>
<p>If you use Remote Desktop on more than just an occasional basis or to connect to more than one system, you need mRemote, or one of the other similar tools if you find it&#8217;s a better fit.</p>
<p>What if you&#8217;re away from your laptop or desktop and need to Remote Desktop from just about anywhere you can get cellular data coverage with AT&amp;T? Well, you have to have an iPhone too, but I highly <a title="ExistDifferently.com: Remote Desktop for the iPhone: WinAdmin ($11.99)" href="http://www.existdifferently.com/2008/remote-desktop-iphone-winadmin/">recommend WinAdmin for the iPhone</a> to fill that need. That&#8217;s a review I wrote as a part of my iPhone Apps reviews over at my personal blog earlier today, and it ties in well with this full-sized mRemote companion :-) (As you might have guessed, writing about WinAdmin actually sparked the idea to blog about mRemote. They complement each other well! Seriously, I think I hear mRemote telling WinAdmin how it thinks of it fondly as a younger brother, whenever my iPhone is next to my laptop :-)</p>
<p>The obligatory &#8220;why I haven&#8217;t been blogging&#8221;: Busy playing with iPhone :-D Too much fun to waste time writing about other stuff (even writing about iPhone Apps has taken a backseat until today!), but I&#8217;ve got a few ideas planned and things to write about up ahead. For now, enjoy having a bit less in your feedreader; I know I&#8217;ve been falling quite behind in my own blogreading too! <a title="My Twitter: dszp" href="http://www.twitter.com/dszp">Twitter</a> and the <a title="#citrt IRC channel via web-based Mibbit client" href="http://tinyurl.com/citrtirc">#citrt IRC channel</a> are also to blame in large part, but not in a bad way. I&#8217;m not the only one; see <a title="Jason Powell: My Blogging Frequency Diminished Due to IRC, Twitter and Life" href="http://www.jasonpowell.net/jason_powell_church_it/2008/08/my-blogging-fre.html">Jason Powell&#8217;s post about it</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/09/01/remote-desktop-ssh-with-mremote-free-opensource/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>iPhone has been ordered!</title>
		<link>/2008/07/18/iphone-has-been-ordered/</link>
					<comments>/2008/07/18/iphone-has-been-ordered/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Fri, 18 Jul 2008 05:15:30 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[iPhone]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=255</guid>

					<description><![CDATA[I ordered an iPhone 3G today! (Well, yesterday technically&#8230;on Thursday) Should be here in less than a week supposedly, and I&#8217;ve already downloaded 71 of the free applications from the iPhone App Store in iTunes, ready to install! The WordPress app is done (Matt Mullenweg posted about it) but hasn&#8217;t been put in the store [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I ordered an <a title="Apple.com iPhone 3G" href="http://www.apple.com/iphone">iPhone 3G</a> today! (Well, yesterday technically&#8230;on Thursday) Should be here in less than a week supposedly, and I&#8217;ve already downloaded 71 of the free applications from the iPhone App Store in iTunes, ready to install! The <a title="WordPress iPhone App blog" href="http://iphone.wordpress.com/">WordPress app</a> is done (<a title="Matt Mullenweg: iPhone Native WordPress Client" href="http://ma.tt/2008/07/iphone-native-wordpress-client/">Matt Mullenweg posted about it</a>) but hasn&#8217;t been put in the store by Apple yet (oh yeah, <a title="Official WordPress Development Blog: WordPress 2.6" href="http://wordpress.org/development/2008/07/wordpress-26-tyner/">WordPress 2.6 is out</a>! Woohoo!). I&#8217;m looking forward to it! There are several paid apps ranging from $1 to $10 that I will consider at some point after I have the phone in-hand (and maybe some more $$!).</p>
<p>Why did I choose the iPhone? Well, I&#8217;m tired of my Treo 650, which is showing its age. I like the multi-touch interface, I like the data speeds, I like the screen size, and I like that, because it&#8217;s so popular, people are writing sites and apps (both!) specifically to work well on it. That means I can do more with it than with any other phone, or at least I can do so much so easily compared to other phone options right now. OK, I have to correct myself, <em>will be</em> able to do&#8230;gotta get the thing first! Oh yeah, and <em>now it does Exchange ActiveSync</em> with Push email, calendar, and contacts! That&#8217;s the one thing that made me sit up and take a look. Before, I at least told myself (and others) that I was OK giving the iPhone a pass&#8211;yes it was cool, but it wasn&#8217;t truly functional if you need Exchange access. Supposedly, that&#8217;s no longer true! It seems that the $30/mo data plan, unlike AT&amp;T has been <a title="My post: Contemplating the iPhone 3G" href="http://infotech.davidszpunar.com/2008/06/12/contemplating-iphone-3g/">claiming per my previous post</a>, works just fine with ActiveSync, which makes sense from a technical level.</p>
<p>It&#8217;s a 16GB black iPhone, if you were wondering, and I&#8217;m going to use it to replace <a title="My post: Crunch. I Finally Own Something Fromâ€“Apple!" href="http://infotech.davidszpunar.com/2007/11/24/crunch-i-finally-own-something-from-apple/">my iPod Classic</a> 80GB I think (the first Apple product I&#8217;ve ever owned) which is why I opted for the larger version; my iPod has over 20GB of podcasts and I&#8217;ll still have to pare that down to fit on the iPhone! Shouldn&#8217;t be hard; I didn&#8217;t try on the iPod because there&#8217;s plenty of space. I&#8217;m already with AT&amp;T (but no longer in a contract), and the monthly plan will only cost me $10 per month more than what I&#8217;m already paying as part of my family&#8217;s FamilyTalk plan, so while I considered a 2G used iPhone, the 3G made enough sense given the subsidy for me.</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/07/18/iphone-has-been-ordered/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Using Free Wireless and VPNs</title>
		<link>/2008/05/31/free-wireless-wifi-vpn-security/</link>
					<comments>/2008/05/31/free-wireless-wifi-vpn-security/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 01 Jun 2008 03:23:22 +0000</pubDate>
				<category><![CDATA[Companies]]></category>
		<category><![CDATA[Cool Services]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[People]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[public wireless]]></category>
		<category><![CDATA[Tony Dye]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=251</guid>

					<description><![CDATA[I read Tony Dye&#8217;s post on Wireless Safety: The VPN Question and wanted to share a comment. It turned into a post of its own, so I&#8217;ve moved it into one :-) Read his post first so this makes sense. If a laptop user establishes a VPN connection to your corporate VPN server, and doesn&#8217;t [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I read <a title="Tony Dye's blog" href="http://tonydye.typepad.com/">Tony Dye&#8217;s</a> post on <a title="Wireless Safety: the VPN Question" href="http://tonydye.typepad.com/main/2008/05/wireless-safe-1.html">Wireless Safety: The <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> Question</a> and wanted to share a comment. It turned into a post of its own, so I&#8217;ve moved it into one :-) Read his post first so this makes sense.</p>
<p>If a laptop user establishes a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connection to your corporate <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> server, and doesn&#8217;t use split tunneling (in other words, from the time they&#8217;re connected, all traffic goes through the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> as its default gateway no matter what), assuming that you&#8217;re using a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> client that verifies the identity of the server (rather than blindly trusting DNS, which is easily spoofable on a wireless network), the user moves from the realm of insecurity into a much more secure environment, similar to being plugged into your wired network at the office. Of course, then your office WAN connection has to support <em>everything</em> they do, including web browsing!</p>
<p>However, using a free or paid &#8220;<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>&#8221; service from a company that just turns your wireless connection into a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>-enabled &#8220;wired&#8221; connection is only going to help thwart unencrypted wifi sniffing and other such attacks. Unless you also use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> and other encryption technologies, those services are just giving you a wired internet connection just like your home connection rather than the easier-to-sniff unencrypted wireless. It&#8217;s better than nothing, but it&#8217;s not like an encrypted pipe into your own network.</p>
<p>Don&#8217;t discount unencrypted wireless attacks. It&#8217;s never happened to me, but if you hop over and read some of <a title="Chief Security Monkey: Case Files Index" href="http://blogs.ittoolbox.com/security/investigator/archives/official-securitymonkey-case-file-index-14787">Security Monkey&#8217;s case files</a> at you&#8217;ll discover that there&#8217;s a lot of bad stuff going on in the world on computers :-) Those case files are slightly modified true stories from this guy&#8217;s career! His old 2005-2007 podcast episodes are worth listening to for some cool security tips and tools as well, to digress for a moment!</p>
<p>I don&#8217;t have a good answer; <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connections to the office make internet run very slowly unless you have the WAN bandwidth to support fast throughput to and from all your remote users including web browsing! But that&#8217;s a much more secure way to operate. The number of ways wireless can be hijacked, sniffed, spoofed, and hacked, especially if it&#8217;s unencrypted to begin with, is downright scary! At the very least use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> with verified certificates for anything you do of any importance (or if passwords are transmitted) on an encrypted wireless connection. As an IT guy, I can tell you (or myself) whether a particular session (POP3, IMAP, <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HyperText Transfer Protocol' );"><acronym class="uttInitialism">HTTP</acronym></span>, <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span>, etc.) is happening over an encrypted connection or not and can be careful. However, the average user is, obviously, not going to know or even care necessarily if Outlook is using POP3 unencrypted or via <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span>, or using <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span> securely. And if they log into Gmail, they&#8217;re not likely to know that although their password is always encrypted on login, their email is transmitted in the clear unless they initiate the session using <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> from the start (using https://mail.google.com/ rather than http://mail.google.com)./ Even if their email contains passwords and confirmations for other accounts!</p>
<p>Stuart mentioned <a title="WiTopia homepage" href="http://www.witopia.net/">WiTopia</a> on <a title="Stuart's comment on Tony Dye's post" href="http://tonydye.typepad.com/main/2008/05/wireless-safety.html#comment-115001000">his comment</a> to <a title="Tony Dye: Wireless Safety Basics" href="http://tonydye.typepad.com/main/2008/05/wireless-safety.html">Tony&#8217;s original post</a>. I&#8217;d never heard of them before, but I&#8217;ve seen similar services to their personalVPN product. That service appears to be, like I mentioned above, just a way to get a &#8220;wired quality&#8221; connection to the internet over unsecured wireless. An admirable service and a worthy goal even with its limitations, but what caught my eye even more was their <a title="WiTopia's SecureMyWiFi Service" href="http://www.witopia.net/securemore.html">SecureMyWifi</a> service. It&#8217;s still a wireless service but it has to do with your own on-campus wireless access. It lets you move away from using <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span> with a Pre-Shared Key (<span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'WPA-PSK, also known as WPA Personal, this wireless network security setting uses a single key shared among clients and base station for authentication and encryption of network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/WPA-PSK&quot;&gt;link&lt;/a&gt;)','caption', 'Pre-Shared Key' );"><acronym class="uttAbbreviation">PSK</acronym></span>), also known as <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>-Personal, and use their <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> services to authenticate users individually to your encrypted wireless access points. It seems a bit pricey (to me&#8211;it&#8217;s currently a $99 setup fee, $99/year for one access point, and $14.95/year for each additional access point), but we have the same thing set up using Microsoft&#8217;s free (built-in on Windows Server 2003) <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft\'s RADIUS server, which comes included as a part of Windows Server. (&lt;a href=&quot;http://www.microsoft.com/technet/network/ias/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', ' 	Internet Authentication Service' );"><acronym class="uttInitialism">IAS</acronym></span> <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> server in-house. If you aren&#8217;t familiar with how to set it all up, the WiTopia service could be quite beneficial! They charge per access point, but at Lakeview we have a centrally-managed access points system with one controller that takes care of authentication. I assume that the WiTopia service is based on unique <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> keys for each access point client; since the central controller (currently running 12 access points) acts as a single client, it should look like &#8220;one&#8221; access point to the service. Whether or not this is allowed with their terms of service I have no idea; we are not likely going to use the service since I already do this in-house for free, but I would recommend reading the terms and/or contacting them if you plan on doing something similar to remain in the spirit of their offering.</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/05/31/free-wireless-wifi-vpn-security/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>Synergy Keyboard and Mouse Sharing App</title>
		<link>/2007/11/09/synergy-keyboard-and-mouse-sharing-app/</link>
					<comments>/2007/11/09/synergy-keyboard-and-mouse-sharing-app/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Fri, 09 Nov 2007 22:44:08 +0000</pubDate>
				<category><![CDATA[Cool Tools]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Matt Cutts]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/11/09/synergy-keyboard-and-mouse-sharing-app/</guid>

					<description><![CDATA[A few weeks ago, I ran into a post (I think it was from Matt Cutts but if I saw it somewhere else, I apologize for the lack of credit) that talked about a little tool called Synergy. It hasn&#8217;t been updated since last year, but it seems to work well enough for its purpose: [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A few weeks ago, I ran into a post (I think it was from <a href="http://www.mattcutts.com/blog/how-to-configure-synergy-in-six-steps/" title="Matt Cutts: How to configure Synergy in six steps">Matt Cutts</a> but if I saw it somewhere else, I apologize for the lack of credit) that talked about a little tool called <a href="http://synergy2.sourceforge.net/" title="Synergy 2 homepage">Synergy</a>. It hasn&#8217;t been updated since last year, but it seems to work well enough for its purpose: two computers, one keyboard and mouse, connected via network. It&#8217;s a bit arcane to set up (and I&#8217;ve just used the Windows version, there are Linux and Mac options available), but it works as advertised. Here&#8217;s a quick overview, but the Matt Cutts post and the documentation on the Synergy website provide plenty of help:</p>
<ol>
<li>The computer whose mouse and keyboard you want to use is the server. Install Synergy and configure the Server options, and enter Test mode (make sure to use the computer&#8217;s network name when creating &#8220;screens,&#8221; or create a pretty name with an alias that is the network name).</li>
<li>Configure the positioning of how each computer&#8217;s screen is related to the other (you have to create the link in both directions).</li>
<li>Click Start once you&#8217;ve finished with Test mode and it works.</li>
<li>Â The computer you want to control with the server&#8217;s keyboard and mouse is the Client. Install Synergy on this computer, too.</li>
<li>Enter the network name of the server you already set up, and click Start. Use Test mode to see if it will connect without errors; you can then try it out to see if it works (if the server is running).</li>
<li>Click Start once you&#8217;ve finished with test mode and it works.</li>
<li>Have loads of fun!</li>
</ol>
<p>I set this up at work, with my desktop as the server and my laptop as the client. Ta-da, now I can use my nicer mouse and Natural keyboard on my laptop, just by moving the cursor off the desktop&#8217;s screen! This is really slick.</p>
<p>What is it missing? Security, for one. There is no authentication between the client and server. So someone else running this software on your network could connect depending on how your computer is configured. I assume the traffic can be sniffed and interpreted, if someone were so inclined (but this would likely be difficult, on a switched LAN, and with the need to decipher mouse and keyboard controls). I imagine the keyboard would be much more useful to sniff than the mouse, which would be almost useless. On a home network, this probably isn&#8217;t an issue. At work, it depends on your co-workers: if they&#8217;re probably never heard of this software and you&#8217;re the only IT guy, it is very unlikely they would even know to look for such a thing! One way to slightly increase security would be to use a non-standard port. The default is 24800, but if you change this on the Advanced button, someone running the same software would have to do more work to figure out how to connect (don&#8217;t forget to set the same port on client and server!).</p>
<p>The other thing that&#8217;s missing is a polished interface. There is a GUI for Windows, but you should probably read the Using Synergy guide on their site the first time through when defining Screens and Links (positions relative to each other). Mac and Linux appear to be configured via text file only, but they do have the steps listed on their site. I haven&#8217;t tested this, but it does sound exciting to use a Windows computer&#8217;s keyboard and mouse to control a Mac or Linux machine right next to it! Or any of the other directions you could go.</p>
<p>With those caveats, if you have the two computers in close proximity you need to test this, I highly recommend going geek crazy and testing this. Just be sure to keep the computer equipment out from under your chin; it doesn&#8217;t generally take kindly to liquids, including drool!</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/11/09/synergy-keyboard-and-mouse-sharing-app/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>How We&#8217;re Doing Remote Access (VPN, RDP, LogMeIn)</title>
		<link>/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/</link>
					<comments>/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 01 Jul 2007 17:53:59 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/</guid>

					<description><![CDATA[Mike Mayfield over at Pleasant Valley Baptist Church IT (&#8220;pvcbit&#8221;) posted a question about VPN remote access permissions. I wrote a blog post in March with a little bit of information on this relating to the Microsoft ISA 2004 firewall, but we&#8217;re actually using a combination of services for remote access right now (I mentioned [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Mike Mayfield over at <a href="http://pvbcit.blogspot.com/" title="pvbcit homepage">Pleasant Valley Baptist Church IT</a> (&#8220;pvcbit&#8221;) posted a question about <a href="http://pvbcit.blogspot.com/2007/06/who-has-access-through-vpn.html" title="pvbcit: Who has access through VPN?"><span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> remote access permissions</a>. I wrote a blog post in March with a little bit of information on this <a href="http://infotech.davidszpunar.com/2007/03/06/traditional-vpns-not-just-all-or-nothing-access/" title="My post: VPNS: Not just all or nothing access">relating to the Microsoft <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 firewal</a>l, but we&#8217;re actually using a combination of services for remote access right now (I mentioned LogMeIn on my prior post as well). Here is another quick look at what we&#8217;re currently doing for <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>.</p>
<p>Basically, because we have <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span>, I can limit what particular user groups are able to do over their <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connection, just like any other firewall rules. Very few people get file server access at all (actually, me and one guy who connects from his church laptop) over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>. The rest are limited to Exchange server connectivity or Remote Desktop primarily, although now that we have <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span> in place, it&#8217;s much simpler than <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> for the user and so that&#8217;s used almost exclusively for remote Outlook access now, and is as much as most people need (if they have a laptop they have an offline copy of most of their files anyway).</p>
<p>For those that still require remote access to their desktop at work (especially if they don&#8217;t have a church-owned laptop), I&#8217;ve been moving from <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> with Remote Desktop access (complicated to train someone to use since the connection is separate from the RDP client) to LogMeIn.com for remote access.  There&#8217;s a free version and a Pro version, with remote printing and file transfer being the main additional features of Pro. The main benefit? It&#8217;s easy and just requires a web browser, it&#8217;s fast, and not very expensive (with the special we got anyway, or the free version is of course free!). I have run into an issue with a new remote user that hasn&#8217;t gotten LogMeIn to work on their own but I haven&#8217;t had a chance to troubleshoot this yet (I&#8217;m sure it relates to the steps to get the ActiveX or Firefox plugin installed for LogMeIn initially).</p>
<p>We have a Terminal Services server with a handful of user licenses that we use for some volunteers that need remote access from their home computer but don&#8217;t have a dedicated desktop at work. I haven&#8217;t attempted LogMeIn through Terminal Services, but I assume it wouldn&#8217;t work properly with the multiple sessions that make Terminal Services useful, and would only allow access to the console session. For this, we still use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>, with a CD created from the <a href="http://www.isaserver.org/img/upl/vpnkitbeta2/cmak.htm" class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The Connection Manager Administration Kit allows you to create customized Dial-up Networking connectoids or dialers for your VPN or dial-up users.','caption', 'Connection Manager Administration Kit' );"><acronym class="uttInitialism">CMAK</acronym></a> along with an auto-running tutorial created with <a href="http://www.debugmode.com/wink/" title="Wink free Tutorial and Presentation creation software homepage">Wink</a> that walks users through installing the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connectoid (which has all of the settings preset) and starting a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connection. Using custom commands in the <a href="http://www.isaserver.org/img/upl/vpnkitbeta2/cmak.htm" class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The Connection Manager Administration Kit allows you to create customized Dial-up Networking connectoids or dialers for your VPN or dial-up users.','caption', 'Connection Manager Administration Kit' );"><acronym class="uttInitialism">CMAK</acronym></a> connectoid, I&#8217;ve included a Remote Desktop settings file that automatically runs upon connection, automatically opening and connecting to the Terminal Server inside the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> once it&#8217;s connected. When Remote Desktop is closed, the connectoid logs off the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>. The integration of <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> and Remote Desktop isn&#8217;t perfect, but it&#8217;s a lot easier this way (most of the time) than trying to get people to understand connecting to the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> first, then connecting with Remote Desktop manually, and disconnecting in reverse. The more automated the better! These <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connections are of course limited through <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> to be allowed to connect only to the Terminal Server, and only through the RDP protocol.</p>
<p>One thing&#8217;s for sure: when allowing an unmanaged computer on the network, especially as unsupervised as a remote connection is, it pays from a security standpoint to keep the leash as tight as possible! And it&#8217;s the unintentional risks (spyware, viruses, etc.) more often than malicious users that cause a problem. The best part is, protecting from one helps to protect from the other (in general).</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Traditional VPNs: Not Just All-or-Nothing Access</title>
		<link>/2007/03/06/traditional-vpns-not-just-all-or-nothing-access/</link>
					<comments>/2007/03/06/traditional-vpns-not-just-all-or-nothing-access/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 06 Mar 2007 05:27:38 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/03/06/traditional-vpns-not-just-all-or-nothing-access/</guid>

					<description><![CDATA[Most people think that when they use traditional VPN technologies, such as PPTP, L2TP, and/or IPSec, that they are opening their network to a full, unfiltered connection from a computer, which is especially bad for a home computer, with unknown anti-virus and anti-spyware status, connected to a work network. This is true. However, with a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Most people think that when they use traditional <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> technologies, such as PPTP, L2TP, and/or IPSec, that they are opening their network to a full, unfiltered connection from a computer, which is especially bad for a home computer, with unknown anti-virus and anti-spyware status, connected to a work network. This is true. However, with a Microsoft <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 firewall (<span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2006 likely supports this from everything I&#8217;ve read about it, I just haven&#8217;t tested it myself), which can terminate PPTP and L2TP <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connections, <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> users are on a separate network controlled by the standard <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> firewall rules. You can set up user groups within <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> and assign certain groups of users certain network permissions, with the same granularity as firewall rules for another network segment, including the Internet.</p>
<p>This means users can connect using the standard Microsoft <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> clients, but they can only do what you allow via firewall rules. A network administrator could have full network access if needed, while users connecting to Terminal Services could be allowed to connect using only Remote Desktop (<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Together with IP (Internet Protocol), TCP is one of the primary foundation protocols on the internet and many other networks.','caption', 'Transmission Control Protocol' );"><acronym class="uttInitialism">TCP</acronym></span> port 3389), and only to the terminal server, based on their user name.</p>
<p>This is great! [sarcasm]It&#8217;s so great that we&#8217;ve started using <a href="http://www.logmein.com/" title="LogMeIn.com homepage">LogMeIn</a> services for some of our remote access.[/sarcasm&gt;]Why? Well, configuring both the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connectoid (even with the <a href="http://www.isaserver.org/img/upl/vpnkitbeta2/cmak.htm" class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The Connection Manager Administration Kit allows you to create customized Dial-up Networking connectoids or dialers for your VPN or dial-up users.','caption', 'Connection Manager Administration Kit' );"><acronym class="uttInitialism">CMAK</acronym></a>) and Remote Desktop, not to mention actually using them, can be a bit of a chore for some users, especially if they&#8217;re setting it up at home where it&#8217;s harder to walk them through it. LogMeIn, on the other hand, has an excellent, web-based interface, very compatible remote control, and some easy options like remote printing and file transfer that are harder to set up with plain-vanilla <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>. LogMeIn has a free version, without file transfer or remote printing, which is excellent for proving basic remote support to people like family (I should know, that&#8217;s how I use it!), or connecting to your home computer remotely (yep, that I do, too). The Pro version is normally almost $13/month per remotely-controlled PC, which is a bit pricey. They have a special going on right now, however (unknown end date) where you get 5 computers for $20/month (or more at the same price, if needed) that makes it much attractive, and I&#8217;ve switched our two heaviest non-Terminal Services users over (it wouldn&#8217;t work for Terminal Services because of the multiple sessions issue), plus myself.</p>
<p>They also offer a service calls LogMeIn IT Reach, for the same price (and special price) as the LogMeIn Pro service, but it is targeted towards IT users managing servers remotely. The web interface to logs, shares, users, performance stats, and more is excellent! Better in some cases than the built-in Windows tools in some cases, in my opinion. And the price, at the moment, is excellent and worth every penny, if you need more than the basic features. Just a happy customer.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/03/06/traditional-vpns-not-just-all-or-nothing-access/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
