Laplink Gold 12 User Manual

1
2
Copyright Notice
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any human or computer language, in any form or by any means, without the express written permission of Laplink Software, Inc., 10210 NE Points Drive, Suite 400, Kirkland, WA 98033, U.S.A.
Laplink Gold 12
pose compression library, version 1.0.4. July 24, 1996. Copyright (c) 1995-1996 Jean-loup Gailly and Mark Adler.
Technical Support Contact Information
Please visit www.laplink.com/support for any technical sup­port issues or questions that you may have.
Trademarks
Laplink, the Laplink logo, Laplink Gold, SpeedSync, and SmartXchange are registered trademarks in the United States and/or other countries of Laplink Software, Inc.
Acrobat and the Acrobat logo are trademarks of Adobe Sys­tems Incorporated or its subsidiaries and may be registered in certain jurisdictions.
Other brand and product names are trademarks or regis­tered trademarks of their respective holders.
Patents
SpeedSync® U.S. Patent Number 5,446,888 This product may contain one or more of the following
licensed products: RSA Data Security, Inc. MD5 Message­Digest Algorithm. Copyright © 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. ZLIB general pur-
For other inquiries, please see contact details below:
email: CustomerService@laplink.com Tel (USA): (425) 952.6000 Fax(USA): (425) 952.6002 Tel (UK): 44 (0) 870.2410.983 Fax (UK): 44 (0) 870.2410.984
Published by: Laplink Software, Inc.
10210 NE Points Drive Suite 400 Kirkland, WA 98033 U.S.A.
Laplink Gold User’s Guide © 2004 Laplink Software, Inc.
3
Contents
Chapter 1 - Introducing Laplink Gold
8 Welcome
Chapter 2 - System Overview
12 Features, Tools and Users
Chapter 3 - Getting Started
16 Getting Started 19 Configuring Security 32 Configuring the Address Book
Chapter 4 - Connecting
48 Types of Connections 51 Connecting by Cable 53 Connecting by Laplink Internet 55 Connecting by LAN (Network) 59 Connecting by Modem 61 Connecting by Dial-Up Networking 63 Other Connection Types 72 Configuring and Saving Connections 74 How to Connect
Chapter 5 - Using File Transfer
76 About File Transfer 78 Configuring File Transfer Options 85 Manually Transferring Files & Folders 87 SyncTools 91 Xchange Agents
102 Navigating through drives and folders
Chapter 6 - Remote Desktop & Remote
Control
108 Laplink Remote Desktop & Laplink Remote
Control 109 About Laplink Remote Desktop 111 About Laplink Remote Control 112 Hosting a Laplink Remote Control Session 113 Controlling a Laplink Remote Control Session 127 Customizing Laplink Remote Control
Performance
Chapter 7 - Using Print Redirection
130 Using Print Redirection 131 Setting up Print Redirection 133 Printing Over a Laplink connection
Chapter 8 - Using Text & Voice Chat
136 Using Text Chat 138 Using Voice Chat
4
Chapter 9 - Troubleshooting
146 Introduction to Troubleshooting 147 Checklist for Modem Connections 149 Checklist for Dial-Up Networking Connections 151 Checklist for Network Connections 153 Checklist for Laplink Internet Connections 154 Checklist for ILS-based Internet connections 155 Checklist for Cable Connections 157 Checklist for CAPI 2.0/ISDN Connections 158 Checklist for File Transfer 160 Checklist for Xchange Agent 162 Checklist for Remote Control 164 Checklist for Remote Desktop 165 Checklist for Print Redirection 166 Checklist for Text Chat 167 Checklist for Voice Chat
Index
Table of Remote Desktop Keyboard Shortcuts
Laplink Gold 12
5
6
1Introducing
Laplink Gold
Laplink Gold 12
8. Welcome
8. What’s new in Laplink Gold 12
8. System requirements
9. About this guide 9 . Getting help
7
Welcome
With Laplink Gold 12, access files on remote PCs and servers; transfer and synchronize data
between PCs; run database applications on remote computers; provide remote technical support to co­workers or friends; operate, maintain, and even reboot remote PCs or servers - Laplink Gold 12 allows you to do all of this with a single application, no matter where you or your PCs may be located. If you want to keep your data synchronized or you are an IT professional needing to support remote users, Laplink Gold 12 gives you a level of mobility, independence and control you may never have thought possible within a single application.
What’s new in Laplink Gold 12
Laplink Gold 12 sets the standard in PC connectivity with its new Laplink Remote Desktop, Laplink Internet, integrated antivirus scanning, streamlined user interface and Laplink USB 2.0 cable connectivity.
Laplink Remote Desktop
Laplink Remote Desktop allows users to use Remote Desk­top control features built into Microsoft XP Professional, Windows Server 2000 and 2003 while taking advantage of all the other features of Laplink Gold 12, such as its secure Internet connectivity via Laplink Internet.
Laplink Internet
Enables users to reliably and easily connect to remote com­puter(s) through firewalls and proxy servers without com­promising security or setting special port configurations.
Integrated Antivirus Scanning
Allows users to transfer files and ensure that they are virus­checked, cleaned and, if necessary, quarantined.
User Interface
The new user interface is user friendly with a Microsoft Win­dows XP look and feel. Included is a Windows Explorer-like sidebar to keep common tasks accessible while hiding tasks that cannot be currently performed.
USB 2.0 Support
Laplink Gold 12 supports enhanced USB 2.0 cables for dra­matically increased file transfer speeds. The retail box ver­sion of Laplink Gold 12 includes a USB 2.0 cable. Volume discounts available for bulk purchases.
System requirements
Your computers must meet these requirements to install and run Laplink Gold 12:
• Microsoft Windows 98 SE, Me, 2000, XP or Server 2000 and 2003
• Laplink Gold 12 does not support Windows 95 or NT
• 133 MHz or higher Pentium-compatible CPU
• At least 64 megabytes (MB) of RAM; more memory generally improves responsiveness
• 30 MB of available hard disk space (for a complete installation)
• CD-ROM or DVD drive
• Display VGA or higher resolution monitor
• Keyboard and mouse required
However, Laplink Gold 12 will connect to computers run­ning Laplink versions 7.5 and higher.
8
Versions of Laplink prior to 7.5 may have trouble connecting to Laplink Gold 12. For more information see General Secu-
rity on p. 19
About this guide
This documentation will assist you in using Laplink Gold 12 and acquaint you with its features, operation, and will pro­vide a detailed product overview.To improve the usability of this guide, step procedures are now located in the online help system.
While you are setting up and using Laplink Gold 12, activate the Quick Steps window and the Laplink help system.
Key terms
Guest: The computer you are using. Regardless of loca­tion, the computer initiating an outgoing connection is the Guest computer.
Host: The computer to which you are connecting. It is host­ing your connection. Regardless of location, the computer
accepting an incoming connection is the Host; it is allowing the Guest to control it.
NOTE Laplink Software also offers Laplink Gold Host for volume license customers who require the ability to
Laplink Gold 12
gain remote control of Host computers to provide tech­nical support and administration. Laplink Gold Host only allows incoming connections to be completed onto the Host computer(s) by authorized users who have Laplink Gold running on their Guest computers.
Local: Used to refer to the location of a printer. A “local” printer is connected to its computer.
Icons
Product icons are used in this document to acquaint you with the features of the product.
Contacting Laplink
If you are unable to resolve the issue, please contact Laplink support at www.laplink.com/support
Have the following information available when contacting Laplink support:
• The serial number of your version of Laplink Gold 12.
• The version of Microsoft Windows running on the Host and Guest computers.
9
10
2System
Overview
Laplink Gold 12
12 Features, Tools and Users 12 Features 13 Tools 13 Users
11
Features, Tools and Users
You can do so much more than share files with Laplink Gold 12. It is ideal for troubleshooting computers
at remote locations or for working on your office computer while you’re on the road. Features like Xchange Agent and Remote Control save time and simplify your work. Tools like Address Book and Security allow you to manage who can access your computers and what features are available to them. Laplink Gold gives you the freedom to leave the office without giving up access to your office computer and network resources. Whether you’re traveling on business or working from home, you can still read your e-mail, share the latest files with co-workers, access network programs and databases, browse the Internet and collaborate with colleagues. Things you once could do only in the office you can now do remotely.
Features
File Transfer transfers files between computers.
With File Transfer, you can move or copy files between computers. Customizing any of the several File Transfer settings simplifies complicated transfers. Laplink’s patented SpeedSync technology makes updating files faster because files are compared, and only changes —not entire files—are transferred. A comprehensive security system, including encryption and virus checking protects your valu­able data at all times.
Xchange Agent synchronizes files and folders.
With Xchange Agent, you can synchronize sets of files or folders between two computers or between local drives. Use Xchange Agent to transfer vital information to and from a portable computer, or to back up important files. You can schedule Xchange Agent to run regularly, so that your infor­mation is always up to date; Xchange Agent automatically connects, transfers files, and disconnects.
Remote Control lets you work on a computer at another location.
With Remote Control, control another computer as though you were sitting at that computer using its keyboard, mouse,
and programs while looking at its screen. Whether your computer is controlling or being controlled, you have the same setup and start-up procedures. You can even copy information from one computer application and paste it to the other.
Laplink Remote Desktop lets you access Windows Remote Desktop on Microsoft Windows XP Profes­sional, Server 2000 and Server 2003.
With Remote Desktop, access the enhanced remote control experience available via the Remote Desktop features built into Windows XP Professional and the Terminal Services features built into Microsoft Windows Server 2000 and Server 2003. You may need to purchase Microsoft Terminal Services Server licensing separately.
Connecting through firewalls with Laplink Internet.
With Laplink Internet, securely connect to PCs and servers behind firewalls without needing to reconfigure, disable or open up ports on firewalls and/or proxy servers. Once you create your Laplink Internet account and associate the com­puters you will want to connect with your account, log onto any of those computers from any other computer running Laplink Gold 12. The first year of the Laplink Internet service is included at no additional cost.
12
Text and Voice Chat features let you communicate in real time with the person on the other computer.
With Text Chat, exchange messages with someone by typ­ing messages in a window. This is useful if you need to communicate with the person at the other end while per­forming other services like File Transfer and Remote Con­trol. Text Chat information is saved, and you can also cut and paste text into the Text Chat window.
With Voice Chat, talk with someone while you perform other services like File Transfer and Remote Control. Voice Chat requires a microphone and sound card on each computer.
Print Redirection lets you print documents on a printer attached to another computer.
With Print Redirection, you can print a document from a Host computer to your local printer over Remote Control, or print local documents to a printer at a Host location. This means you don't have to use File Transfer to get documents printed where you want them.
Tools
Address Book stores your host computer connection types and permissions.
With Address Book, create lists of the Host computers to which you want to connect. The Address Book stores the connection type used to access the Host and the services you want to start automatically upon connecting.
Security sets access privileges on your computer.
Laplink provides two authentication methods: Microsoft Windows Authentication and the standard Laplink authenti-
Laplink Gold 12
cation. With Windows Authentication, now you can give Windows domain users access to your computer, allowing them to use their domain usernames and passwords. You can easily limit the services available to any users and set up log-in credentials. Encryption and Lock Out options provide another layer of security.
Antivirus checks incoming and outgoing files for virus infection.
A new integrated Antivirus feature keeps your Guest and Host computers safe from computer virus infection by checking all incoming and outgoing files with a powerful virus scanning engine. Automatic updates keep your com­puters safe while you can configure preferences to allow you to determine the level of protection you need.
Users
Most Laplink Gold 12 users will use Laplink to connect to their personal information, to synchronize their workstation and laptop, or access network resources.
Advanced users are typically IT and Support professionals who use Laplink Gold 12 to access large groups of comput­ers and users, offer integrated support and troubleshoot problems. Advanced users would use features such as the Address Book’s ”To import, you must have read access privi-
leges to the database. See your database administrator for more information.” on page 44 to manage large lists of users
and their credentials. Advanced features are available to everyone.
13
14
3Getting Started
Laplink Gold 12
16 Getting Started 19 Configuring Security 19 General security 27 Local security 29 Encryption 30 Lockout 32 Configuring the Address Book 33 View options and folders 36 Address Book window 37 Adding an Address Book entry 39 Address Book - Connection tab 41 Services tab 42 More Address Book toolbar options 44 Setup Global
15
Getting Started
Now that you have installed and started Laplink Gold, you need to determine your permissions,
credentials and connection types. Then you will be ready to configure Laplink Gold 12 for incoming Laplink connections using Security settings and for outgoing connections using the Address Book. Laplink’s versatility allows connectivity over a dial-up connection, office network, the Internet and more.
How will you use Laplink Gold 12?
Before you set up Laplink Gold 12, take a few moments to determine how you want to use Laplink Gold 12.
Laplink Gold 12 is a versatile remote access product that helps you solve your multi-computer connectivity chal­lenges.
This section gives brief scenarios of the typical tasks you can perform with Laplink Gold 12.
Staying connected
Laplink Gold 12 allows you to remain connected to the data and devices that you need to use no matter where you are. While traveling, use a connection at the hotel to retrieve data stored on the network at the office. At home, access critical information. Laplink’s robust features give you the information you need when you need it.
IT and support - Advanced features
Laplink Gold features like Global Address Book and Win­dows Authentication help you manage large groups of
users within your organization. Using the powerful Address Book features, all connection information can be stored centrally. This allows you to share saved connections with your IT team so that everyone has needed connection infor­mation at their fingertips. Microsoft Windows Authentication lets you set up domain users easily with their current net­work credentials. With Laplink, you can offer remote support
and troubleshooting to your users, no matter your or their locations.You can also help spread the workload and share information.
Connecting for the first time
If you have never used Laplink before, you will need to determine credentials, permissions and connection types for your incoming and outgoing connections. The informa­tion in this chapter will help you determine your require­ments
If you are upgrading to Laplink Gold 12, there are no spe­cial procedures you need to follow. All of your previous settings will appear in Laplink Gold 12. While it is advanta­geous to install Laplink Gold 12 on all computers you will be accessing, you will be able to connect to computers running Laplink Gold 7.5 and higher.
Security
Security settings manage incoming connections; they determine who is allowed to connect to your computer and
what Laplink services they have access to. Before you configure your security settings you need to
know the authentication type you will be using.
Laplink Authentication
Laplink authentication allows you to assign credentials (User Name and Password) to incoming connections. The
16
advantage of Laplink Authentication is that you control the access credentials, which allows you to modify them at any time.
• If you are the only one accessing your computers via Laplink, assign yourself a User Name and Password.
• If another Laplink user is accessing your computer, you will need to tell them their Laplink User Name and Password.
Windows Authentication
If you are on a network domain, you may be able to use Windows Authentication to grant permissions. The advan­tage to using Windows Authentication is that users have familiar credentials to access Laplink - they are the same ones they use on the office network. To grant credentials to a network user:
• You must be logged onto the network domain.
• You must know their user name.
Address Book
The Address Book manages outgoing connections. It con­figures the connection type and default services you will use to access a Host.
Laplink Gold 12
Before you configure your Address Book you need to know the credentials granted to you by the Host computer. For each Address Book entry,
• know your connection type;
• know the credentials (User Name and Password) needed to connect to the Host;
• know what services you have been given permissions to (File Transfer, Remote Control, etc.);
• Know the Laplink computer name.
Connecting through Firewalls
Laplink Gold 12 provides several options for making con­nections through firewalls. The easiest is Laplink Internet. Laplink Internet ensures secure connections and requires no special configuration of firewalls. To use Laplink Internet, you must first create an account with the Laplink Internet service. The first year of the Laplink Internet service is included at no additional cost.
See “Connection Types” on page40.
Once connection is completed, log in from any Laplink Gold 12 computer and see any of your computers associated with your Laplink Internet accounts as long as they are run­ning Laplink Gold 12, and are currently online and available for connections.
However, you may choose to establish connections by re­configuring the firewall. There is a detailed tutorial available on the Laplink support site (http://www.laplink.com/support), that will guide you through step-by-step instructions for con­figuring a firewall connection.
17
Computer Name
When you first installed Laplink, you were asked to enter a unique name for your Laplink Computer. In order to config-
ure outgoing connections in your address book, you need to know the name of the computers you will be connecting to.
From the main menu select Options > Computer Name to see or change the computer name on a Laplink computer.
NOTE You must close all connections prior to modify­ing a Laplink computer name.
18
Before you can receive incoming connections, you need to configure your Laplink Security settings. By
default, Laplink is installed to only allow outgoing connections. There are four security tabs in Laplink Gold 12 - General, Local, Encryption and Lockout. This section walks you through these security options, and explains the value of each feature. For detailed step-by-step instructions on configuring your security settings, go to the on-line Help system. To access Laplink’s Security features, from the main menu select Options and then Security .
General security
Laplink Gold 12
Configuring Security
From the General security tab you determine the level of security for incoming connections and set credentials and permissions.
Allowing incoming connections
As a safety precaution, Laplink’s default security setting is Private System . After you install Laplink, you can connect to other computers, but other computers cannot open con­nections to yours, except by cable or infrared.
To allow incoming connections, you can change the secu­rity setting to Public System. For more security, change the security setting to Protected System and create one or more entries in the Log-in List. In each entry, specify the password and the login name the user must provide to open an incoming connection, and grant the user permission to use services and other features.
The safest way to allow incoming connections is to set up password-protection by creating entries in the Log-in List. If you will be the only person to connect to this computer, make a single Log-in List entry and grant yourself whatever privileges you want. For other users, create separate entries for each user.
Specifying passwords
Laplink Gold passwords are case-sensitive (i and I, for example, are treated differently). For incoming connections from computers running Laplink Gold, you can create secure passwords by mixing capital letters and lower case letters.Case sensitivity has these important consequences:
• By default, security is not imposed on incoming connec­tions over a cable. If you set up password protection for modem and network connections, however, you can extend that protection to cable and wireless connection as well. On the Local Security tab, check this box: Enforce Security for Local Connections
• If your Log-in List contains passwords assigned in an earlier Laplink version, other computers that have also upgraded may not be able to connect to your computer until you assign new passwords.
• For incoming connections from computers running ver­sions earlier than Laplink 2000, type passwords using ALL CAPITALS. If your Log-in List has passwords for such connections, retype them as all capitals, or assign new passwords.
19
Creating your Log-in List
Laplink Gold supports two different ways of allowing con­trolled access to your computer: Laplink Authentication and Microsoft Windows Authentication. Both can be used at the
Manage your incoming connections by configuring security
same time. The following section outlines the security fea­tures of Laplink Gold 12.
You can modify your security settings at any time.
Nobody is the highest level of security. It allows you to connect to other computers and prohibits incoming connections.
IT professionals might use this setting on a computer used for support that does not require user access.
In order to set Log-in privileges, you must know the secu­rity model you want to use, and the credentials for all incoming connections you want to add.
20
Anybody allows incoming connections from all Laplink enabled computers who can see your machine.
To enhance security you can limit access to folders avail­able to incoming connections by selecting Public Priv- leges.
Security Model window
Your security model determines how you assign credentials—User Name and Password—to incoming connections
Laplink Gold 12
Laplink Authentication involves creating a login
list of user names and passwords. A login list is unique to the computer that it is created on and cannot be exported or shared with other Laplink computers.
Microsoft Windows Authentication is extremely useful for people who are on a Windows Active Directory Network. This feature allows you to give Laplink access to network users, so that users need only their Windows network user names and passwords to access the Laplink functions of your computer.
21
.
Security Model - Laplink Authentication
Enter the log-in credentials for the incoming connection to your Host.
Make sure the Guest has this information.
TIP For more information on configuring Firewall connec­tions see the tutorial on the Laplink support site. From Laplink’s main menu, select
Help, then Tutorials on the Web.
Select the services you want the Guest to have on your Host com­puter.
When allowing Remote Control access to the Host, you can choose to have the Host’s screen, mouse and Keyboard disabled.
22
Laplink Gold 12
Security Model - Microsoft Windows Authentication
Select the Domain on which the Guest is located.
Select and Add user(s) from the Domain User list.
TIP For more information on configuring Firewall connec­tions see the tutorial on the Laplink support site. From Laplink’s main menu, select
Help > Tutorials on the Web.
Select the services you want the Guest to have on your Host com­puter.
When allowing a Remote Control access to the Host, you can dis­able the Host’s screen, mouse and keyboard.
23
Folder security
Whether you use Laplink Authentication or Microsoft Win­dows Authentication, when you open your computer to incoming connections, you can specify if all drives and fold-
Folder Security window
ers—or only certain ones—are accessible to users who connect to your computer for File Transfer. You can also grant different privileges to different users.
Folder Security is an option available for both Log-in List and Public Security.
Folders denied access do not appear in File Transfer windows on a Remote computer.
24
Opening your computer to incoming connections does not mean that files on all your drives and folders need to be accessible to other users. You can “hide” certain drives and folders so that other users will not see them in their File Transfer windows and cannot copy files to or from them.
CAUTION You can specify a different setup for each entry in your Log-in list. Until you specify otherwise, every user in your Log-in List is allowed access to all of your drives and folders.
CAUTION Denying access to a drive or folder makes it invisible to anyone who connects for File Transfer but has no effect in Remote Control. Anyone who connects for Remote Control can still access all of your files.
TIP Navigate through the drives and folders on the Folder Security tab much as you do in a File Transfer
window. For fastest navigation, double-click a drive or folder or click the plus sign beside it.
Modem Callback
When you allow incoming modem connections, you can require that the Guest computer be called back before a connection is opened. Or you can let the Guest computer determine whether to be called back. In both cases you can supply the phone number ahead of time or leave the num­ber to the Guest computer.
A callback occurs when one computer attempts to connect to another. Instead of completing the connection, Laplink reverses the call by hanging up and then dialing the caller’s
Laplink Gold 12
modem. When the caller’s modem answers, the connection is completed and service windows are opened.
You can use callbacks as a security measure. For example, set callbacks to require a callback to a phone number you specify. Or you can use callbacks to save money, as when you are connecting to your office from a hotel room.
You can set callback options when you secure your com­puter using the Log-in List. If necessary, specify a different option for each listed entry.
None Prevents callbacks. (Default)
Optional, Any Number Lets the guest user decide whether to be called back; users who choose to be called back can specify the number to dial. This is the most flexible of all the options.
Optional, Specified Number Only Lets the guest user decide whether to be called back to the number you specify or to open the connection without any call­back. Only the number you specify in the Phone Num­ber box can be dialed for the callback.
Required, Any Number Requires Guest user to be called back but allows them to specify the number to be dialed. The number can vary from session to session.
Required, Specified Number Only Requires the Guest to be called back to the number you specify in the Phone Number field.
CAUTION Do not require callbacks from computers that connect by running Xchange Agents. The agents will not finish because they cannot perform callbacks.
25
Modem Callback window
Laplink will call you back using a number you enter, or will connect with­out reversing the call.
Laplink will call you back at a number you specify, or will disconnect.
Laplink will call you back at a number that has been specified, or will connect you without reversing the call.
Laplink will call you back at a number that has been specified, or will discon­nect.
26
Local security
The Local Security tab provides another level of security for Host machines and those accepting local (cable or infrared) connections. Creating password protection for your Laplink security settings prevents unauthorized users from compro­mising your security system; it also keeps them from view-
Local security settings
Laplink Gold 12
ing your Address Book entries and using them to open connections to other computers. Protecting your security settings is a particularly good idea if you allow others to con­trol your computer as guests.
To enhance security, check Protect Local
Security with a Password and click the Set Password button.
NOTE The same password is required
for access to Connect Over Modem and certain logging features.
Click to enforce credentials for cable and infra­red connections to enable local connection security.
27
Without knowledge of your password, users cannot view or change any of this information.
• Log-in names, passwords, and other security settings;
• Phone numbers, passwords, and other information stored in your Address Book entries;
• Privileges you have granted to Guest computers and other settings in Remote Control Options;
• Antivirus options;
• Laplink Internet options.
28
Encryption
On the Encryption tab, you can choose to encrypt the data you send, and choose the encryption method you want to use.
Encryption is a good idea over Internet and other connec­tions where your information might be intercepted and com-
Encryption protects the data you are transmiting
Laplink Gold 12
promised. You can use encryption methods provided in Laplink, or use the powerful encryption options available in the Windows operating system. The settings you make on the Host computer determine encryption level for incoming connections. By default, Laplink encrypts log-in names and
Be sure to enable encryption before a connection is opened. Changing the setting during a connection won’t have any effect until the next connection.
29
passwords, but nothing else. This setting is usually fine for transmitting data over office networks or other secure con­nections.
On the Internet, intranets, or wide area networks, however, it is usually a good idea to encrypt your data, including files, text from chat sessions, and instructions sent to the remote computer during Remote Control.
Lockout
On the Lockout tab, set the number of failed login attempts you will accept from any user. When you open your com­puter to incoming connections, it’s a good idea to include Lockout protection so that anyone who supplies an incorrect password more than a particular number of times is denied access to your computer.
Like combination safes, security passwords can be compro­mised. Password crackers use a variety of techniques; some techniques are more sophisticated than others, but almost all require guessing.
In order to gain access to your computer in Laplink, a hacker would also need Laplink installed and running on their system, and would need to locate your Laplink Host, which is nearly impossible over the Internet. If you are using Laplink with a firewall or router, the hacker would need to get around that security as well, before they would be able to attempt to crack passwords. All of this protec­tion makes Laplink Gold very secure.However, use Lock­out as an additional guard against unauthorized access and bar anyone who makes repeated attempts at guessing a password for entry to your computer.
While opening your Host computer to incoming connec­tions, you can specify if and how data transmitted over those connections will be encrypted. The settings on the Guest computer are irrelevant. It is the settings on the Host computer that determine encryption.
NOTE The only exception occurs when you connect to a
computer running a version older than Laplink 2000. In this case only, the settings on your newer Guest computer deter­mine encryption levels.
Monitoring failed login attempts
Lockout is designed to monitor and control access accord­ing to the login names in your Log-in List. A separate count of failed attempts is kept for each login name; when a count reaches the maximum you have defined for a specific user, that user is locked out and can no longer connect to your computer.
Beside the login names listed on the Lockout tab appear numbers indicating the maximum number of failed login attempts that the account is allowed to accumulate. When a count reaches the maximum, the login name is labelled Locked Out.
You can reset the count to zero for any or all of the log-in names. This action also makes a locked out name usable once again.
Unless a log-in name has been labeled Locked Out, its count is reset to zero automatically whenever a user con­nects using that log-in name and the correct password. For this reason, only consecutive failed attempts are recorded permanently, not cumulative failed attempts.
30
Loading...
+ 138 hidden pages