Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Remote Possibilities: Page 9 of 42

RA fell into the second tier in performance testing, behind pcAnywhere, LapLink and uRoam. It came in seventh in bitmap transfers and third in file transfers. But it stayed a few notches behind the front-runners because it lacks support for file synchronization and remote printing.

RA sniffs out machines on the network that have the program installed and identifies them by IP address or DNS name. When we chose a host machine from the browser interface, we were presented with a menu of actions, including remote access, administration, performance, system information and configuration management. Each action has subfunctions; for example, in remote access, you can start a remote-control or telnet session, chat, and transfer files. The remote-control session opens in a Java Applet. Because functions like CTRL+ALT+DEL and clipboard transfer cannot be captured through an applet, RA provides these functions through a separate submenu option. Depending on the configurations, the remote-control session can be carried out through the browser or by opening a separate window.

The performance option provides a graphic display of CPU, memory usage, disk space used, network utilization and registry quota utilization of the host machine. The configuration section, however, is the most important part of this submenu. As administrators, we could configure standard settings and deploy that configuration over the network.

Like uRoam's Firepass, RA maintains secure authentication and connection using 128-bit SSL (Secure Sockets Layer). To maintain this level of security, you can disable unsecured HTTP connections. During the authentication process, RA first looks for users registered with the program, then Windows NT users. You can disable NT authentication and limit access to registered users. Specific access to available menu options can be set for each user.

Administration is the second main option that the user sees after logging in. From here, we could view processes running on the host machine, engage in registry and file management, and manage shared resources, virtual memory and user access. The system-information option shows host information, such as which files are being accessed, what registry entries are in use and how many remote-control sessions are running, along with drive and partition information, network adapter and even the status of the motherboard.