No part of this publication may be reproduced, transmitted,
transcribed, stored in a retrieval system, or translated into
any human or computer language, in any form or by any
means, without the express written permission of Laplink
Software, Inc., 10210 NE Points Drive, Suite 400, Kirkland,
WA 98033, U.S.A.
Laplink Gold 12
pose compression library, version 1.0.4. July 24, 1996.
Copyright (c) 1995-1996 Jean-loup Gailly and Mark Adler.
Technical Support Contact
Information
Please visit www.laplink.com/support for any technical support issues or questions that you may have.
Trademarks
Laplink, the Laplink logo, Laplink Gold,SpeedSync, and
SmartXchange are registered trademarks in the United
States and/or other countries of Laplink Software, Inc.
Acrobat and the Acrobat logo are trademarks of Adobe Systems Incorporated or its subsidiaries and may be registered
in certain jurisdictions.
Other brand and product names are trademarks or registered trademarks of their respective holders.
Patents
SpeedSync® U.S. Patent Number 5,446,888
This product may contain one or more of the following
16Getting Started
19Configuring Security
32Configuring the Address Book
Chapter 4 - Connecting
48Types of Connections
51Connecting by Cable
53Connecting by Laplink Internet
55Connecting by LAN (Network)
59Connecting by Modem
61Connecting by Dial-Up Networking
63Other Connection Types
72Configuring and Saving Connections
74How to Connect
Chapter 5 - Using File Transfer
76About File Transfer
78Configuring File Transfer Options
85Manually Transferring Files & Folders
87SyncTools
91Xchange Agents
102Navigating through drives and folders
Chapter 6 - Remote Desktop & Remote
Control
108Laplink Remote Desktop & Laplink Remote
Control
109About Laplink Remote Desktop
111About Laplink Remote Control
112Hosting a Laplink Remote Control Session
113Controlling a Laplink Remote Control Session
127Customizing Laplink Remote Control
Performance
Chapter 7 - Using Print Redirection
130Using Print Redirection
131Setting up Print Redirection
133Printing Over a Laplink connection
Chapter 8 - Using Text & Voice Chat
136Using Text Chat
138Using Voice Chat
4
Chapter 9 - Troubleshooting
146Introduction to Troubleshooting
147Checklist for Modem Connections
149Checklist for Dial-Up Networking Connections
151Checklist for Network Connections
153Checklist for Laplink Internet Connections
154Checklist for ILS-based Internet connections
155Checklist for Cable Connections
157Checklist for CAPI 2.0/ISDN Connections
158Checklist for File Transfer
160Checklist for Xchange Agent
162Checklist for Remote Control
164Checklist for Remote Desktop
165Checklist for Print Redirection
166Checklist for Text Chat
167Checklist for Voice Chat
Index
Table of Remote Desktop Keyboard Shortcuts
Laplink Gold 12
5
6
1Introducing
Laplink Gold
Laplink Gold 12
8.Welcome
8.What’s new in Laplink Gold 12
8.System requirements
9.About this guide
9. Getting help
7
Welcome
With Laplink Gold 12, access files on remote PCs and servers; transfer and synchronize data
between PCs; run database applications on remote computers; provide remote technical support to coworkers or friends; operate, maintain, and even reboot remote PCs or servers - Laplink Gold 12 allows
you to do all of this with a single application, no matter where you or your PCs may be located. If you want
to keep your data synchronized or you are an IT professional needing to support remote users, Laplink
Gold 12 gives you a level of mobility, independence and control you may never have thought possible
within a single application.
What’s new in Laplink Gold 12
Laplink Gold 12 sets the standard in PC connectivity with its
new Laplink Remote Desktop, Laplink Internet, integrated
antivirus scanning, streamlined user interface and Laplink
USB 2.0 cable connectivity.
Laplink Remote Desktop
Laplink Remote Desktop allows users to use Remote Desktop control features built into Microsoft XP Professional,
Windows Server 2000 and 2003 while taking advantage of
all the other features of Laplink Gold 12, such as its secure
Internet connectivity via Laplink Internet.
Laplink Internet
Enables users to reliably and easily connect to remote computer(s) through firewalls and proxy servers without compromising security or setting special port configurations.
Integrated Antivirus Scanning
Allows users to transfer files and ensure that they are viruschecked, cleaned and, if necessary, quarantined.
User Interface
The new user interface is user friendly with a Microsoft Windows XP look and feel. Included is a Windows Explorer-like
sidebar to keep common tasks accessible while hiding
tasks that cannot be currently performed.
USB 2.0 Support
Laplink Gold 12 supports enhanced USB 2.0 cables for dramatically increased file transfer speeds. The retail box version of Laplink Gold 12 includes a USB 2.0 cable. Volume
discounts available for bulk purchases.
System requirements
Your computers must meet these requirements to install
and run Laplink Gold 12:
• Microsoft Windows 98 SE, Me, 2000, XP or Server
2000 and 2003
• Laplink Gold 12 does not support Windows 95 or NT
• 133 MHz or higher Pentium-compatible CPU
• At least 64 megabytes (MB) of RAM; more memory
generally improves responsiveness
• 30 MB of available hard disk space (for a complete
installation)
• CD-ROM or DVD drive
• Display VGA or higher resolution monitor
• Keyboard and mouse required
However, Laplink Gold 12 will connect to computers running Laplink versions 7.5 and higher.
8
Versions of Laplink prior to 7.5 may have trouble connecting
to Laplink Gold 12. For more information see General Secu-
rity on p. 19
About this guide
This documentation will assist you in using Laplink Gold 12
and acquaint you with its features, operation, and will provide a detailed product overview.To improve the usability of
this guide, step procedures are now located in the online
help system.
While you are setting up and using Laplink Gold 12, activate
the Quick Steps window and the Laplink help system.
Key terms
Guest: The computer you are using. Regardless of location, the computer initiating an outgoing connection is the
Guest computer.
Host: The computer to which you are connecting. It is hosting your connection. Regardless of location, the computer
accepting an incoming connection is the Host; it is allowing
the Guest to control it.
NOTE Laplink Software also offers Laplink Gold Host
for volume license customers who require the ability to
Laplink Gold 12
gain remote control of Host computers to provide technical support and administration. Laplink Gold Host only
allows incoming connections to be completed onto the
Host computer(s) by authorized users who have
Laplink Gold running on their Guest computers.
Local: Used to refer to the location of a printer. A “local”
printer is connected to its computer.
Icons
Product icons are used in this document to acquaint you
with the features of the product.
Contacting Laplink
If you are unable to resolve the issue, please contact
Laplink support at www.laplink.com/support
Have the following information available when contacting
Laplink support:
• The serial number of your version of Laplink Gold 12.
• The version of Microsoft Windows running on the Host
and Guest computers.
9
10
2System
Overview
Laplink Gold 12
12Features, Tools and Users
12Features
13Tools
13Users
11
Features, Tools and Users
You can do so much more than share files with Laplink Gold 12. It is ideal for troubleshooting computers
at remote locations or for working on your office computer while you’re on the road. Features like
Xchange Agent and Remote Control save time and simplify your work. Tools like Address Book and
Security allow you to manage who can access your computers and what features are available to them.
Laplink Gold gives you the freedom to leave the office without giving up access to your office computer
and network resources. Whether you’re traveling on business or working from home, you can still read
your e-mail, share the latest files with co-workers, access network programs and databases, browse the
Internet and collaborate with colleagues. Things you once could do only in the office you can now do
remotely.
Features
File Transfer transfers files between computers.
With File Transfer, you can move or copy files between
computers. Customizing any of the several File Transfer
settings simplifies complicated transfers. Laplink’s patented
SpeedSync technology makes updating files faster
because files are compared, and only changes —not entire
files—are transferred. A comprehensive security system,
including encryption and virus checking protects your valuable data at all times.
Xchange Agent synchronizes files and folders.
With Xchange Agent, you can synchronize sets of files or
folders between two computers or between local drives.
Use Xchange Agent to transfer vital information to and from
a portable computer, or to back up important files. You can
schedule Xchange Agent to run regularly, so that your information is always up to date; Xchange Agent automatically
connects, transfers files, and disconnects.
Remote Control lets you work on a computer at another
location.
With Remote Control, control another computer as though
you were sitting at that computer using its keyboard, mouse,
and programs while looking at its screen. Whether your
computer is controlling or being controlled, you have the
same setup and start-up procedures. You can even copy
information from one computer application and paste it to
the other.
Laplink Remote Desktop lets you access Windows
Remote Desktop on Microsoft Windows XP Professional, Server 2000 and Server 2003.
With Remote Desktop, access the enhanced remote control
experience available via the Remote Desktop features built
into Windows XP Professional and the Terminal Services
features built into Microsoft Windows Server 2000 and
Server 2003. You may need to purchase Microsoft Terminal
Services Server licensing separately.
Connecting through firewalls with Laplink Internet.
With Laplink Internet, securely connect to PCs and servers
behind firewalls without needing to reconfigure, disable or
open up ports on firewalls and/or proxy servers. Once you
create your Laplink Internet account and associate the computers you will want to connect with your account, log onto
any of those computers from any other computer running
Laplink Gold 12. The first year of the Laplink Internet service
is included at no additional cost.
12
Text and Voice Chat features let you communicate in
real time with the person on the other computer.
With Text Chat, exchange messages with someone by typing messages in a window. This is useful if you need to
communicate with the person at the other end while performing other services like File Transfer and Remote Control. Text Chat information is saved, and you can also cut
and paste text into the Text Chat window.
With Voice Chat, talk with someone while you perform other
services like File Transfer and Remote Control. Voice Chat
requires a microphone and sound card on each computer.
Print Redirection lets you print documents on a printer
attached to another computer.
With Print Redirection, you can print a document from a
Host computer to your local printer over Remote Control, or
print local documents to a printer at a Host location. This
means you don't have to use File Transfer to get documents
printed where you want them.
Tools
Address Book stores your host computer connection
types and permissions.
With Address Book, create lists of the Host computers to
which you want to connect. The Address Book stores the
connection type used to access the Host and the services
you want to start automatically upon connecting.
Security sets access privileges on your computer.
Laplink provides two authentication methods: Microsoft
Windows Authentication and the standard Laplink authenti-
Laplink Gold 12
cation. With Windows Authentication, now you can give
Windows domain users access to your computer, allowing
them to use their domain usernames and passwords. You
can easily limit the services available to any users and set
up log-in credentials. Encryption and Lock Out options
provide another layer of security.
Antivirus checks incoming and outgoing files for virus
infection.
A new integrated Antivirus feature keeps your Guest and
Host computers safe from computer virus infection by
checking all incoming and outgoing files with a powerful
virus scanning engine. Automatic updates keep your computers safe while you can configure preferences to allow
you to determine the level of protection you need.
Users
Most Laplink Gold 12 users will use Laplink to connect to
their personal information, to synchronize their workstation
and laptop, or access network resources.
Advanced users are typically IT and Support professionals
who use Laplink Gold 12 to access large groups of computers and users, offer integrated support and troubleshoot
problems. Advanced users would use features such as the
Address Book’s ”To import, you must have read access privi-
leges to the database. See your database administrator for
more information.” on page 44 to manage large lists of users
and their credentials.
Advanced features are available to everyone.
13
14
3Getting Started
Laplink Gold 12
16 Getting Started
19 Configuring Security
19General security
27Local security
29Encryption
30Lockout
32 Configuring the Address Book
33View options and folders
36Address Book window
37Adding an Address Book entry
39Address Book - Connection tab
41Services tab
42More Address Book toolbar options
44Setup Global
15
Getting Started
Now that you have installed and started Laplink Gold, you need to determine your permissions,
credentials and connection types. Then you will be ready to configure Laplink Gold 12 for incoming
Laplink connections using Security settings and for outgoing connections using the Address Book.
Laplink’s versatility allows connectivity over a dial-up connection, office network, the Internet and more.
How will you use Laplink Gold 12?
Before you set up Laplink Gold 12, take a few moments to
determine how you want to use Laplink Gold 12.
Laplink Gold 12 is a versatile remote access product that
helps you solve your multi-computer connectivity challenges.
This section gives brief scenarios of the typical tasks you
can perform with Laplink Gold 12.
Staying connected
Laplink Gold 12 allows you to remain connected to the data
and devices that you need to use no matter where you are.
While traveling, use a connection at the hotel to retrieve
data stored on the network at the office. At home, access
critical information. Laplink’s robust features give you the
information you need when you need it.
IT and support - Advanced features
Laplink Gold features like Global Address Book and Windows Authentication help you manage large groups of
users within your organization. Using the powerful Address
Book features, all connection information can be stored
centrally. This allows you to share saved connections with
your IT team so that everyone has needed connection information at their fingertips. Microsoft Windows Authentication
lets you set up domain users easily with their current network credentials. With Laplink, you can offer remote support
and troubleshooting to your users, no matter your or their
locations.You can also help spread the workload and share
information.
Connecting for the first time
If you have never used Laplink before, you will need to
determine credentials, permissions and connection types
for your incoming and outgoing connections. The information in this chapter will help you determine your requirements
If you are upgrading to Laplink Gold 12, there are no special procedures you need to follow. All of your previous
settings will appear in Laplink Gold 12. While it is advantageous to install Laplink Gold 12 on all computers you will
be accessing, you will be able to connect to computers
running Laplink Gold 7.5 and higher.
Security
Security settings manage incoming connections; they
determine who is allowed to connect to your computer and
what Laplink services they have access to.
Before you configure your security settings you need to
know the authentication type you will be using.
Laplink Authentication
Laplink authentication allows you to assign credentials
(User Name and Password) to incoming connections. The
16
advantage of Laplink Authentication is that you control the
access credentials, which allows you to modify them at any
time.
• If you are the only one accessing your computers via
Laplink, assign yourself a User Name and Password.
• If another Laplink user is accessing your computer, you
will need to tell them their Laplink User Name and
Password.
Windows Authentication
If you are on a network domain, you may be able to use
Windows Authentication to grant permissions. The advantage to using Windows Authentication is that users have
familiar credentials to access Laplink - they are the same
ones they use on the office network. To grant credentials to
a network user:
• You must be logged onto the network domain.
• You must know their user name.
Address Book
The Address Book manages outgoing connections. It configures the connection type and default services you will use
to access a Host.
Laplink Gold 12
Before you configure your Address Book you need to know
the credentials granted to you by the Host computer. For
each Address Book entry,
• know your connection type;
• know the credentials (User Name and Password)
needed to connect to the Host;
• know what services you have been given permissions
to (File Transfer, Remote Control, etc.);
• Know the Laplink computer name.
Connecting through Firewalls
Laplink Gold 12 provides several options for making connections through firewalls. The easiest is Laplink Internet.
Laplink Internet ensures secure connections and requires
no special configuration of firewalls. To use Laplink Internet,
you must first create an account with the Laplink Internet
service. The first year of the Laplink Internet service is
included at no additional cost.
See “Connection Types” on page40.
Once connection is completed, log in from any Laplink Gold
12 computer and see any of your computers associated
with your Laplink Internet accounts as long as they are running Laplink Gold 12, and are currently online and available
for connections.
However, you may choose to establish connections by reconfiguring the firewall. There is a detailed tutorial available
on the Laplink support site (http://www.laplink.com/support),
that will guide you through step-by-step instructions for configuring a firewall connection.
17
Computer Name
When you first installed Laplink, you were asked to enter a
unique name for your Laplink Computer. In order to config-
ure outgoing connections in your address book, you need to
know the name of the computers you will be connecting to.
From the main menu select Options > Computer Name to
see or change the computer name on a Laplink computer.
NOTE You must close all connections prior to modifying a Laplink computer name.
18
Before you can receive incoming connections, you need to configure your Laplink Security settings. By
default, Laplink is installed to only allow outgoing connections. There are four security tabs in Laplink Gold
12 - General, Local, Encryption and Lockout. This section walks you through these security options,
and explains the value of each feature. For detailed step-by-step instructions on configuring your security
settings, go to the on-line Help system. To access Laplink’s Security features, from the main menu select
Options and then Security .
General security
Laplink Gold 12
Configuring Security
From the General security tab you determine the level of
security for incoming connections and set credentials and
permissions.
Allowing incoming connections
As a safety precaution, Laplink’s default security setting is
Private System . After you install Laplink, you can connect
to other computers, but other computers cannot open connections to yours, except by cable or infrared.
To allow incoming connections, you can change the security setting to Public System. For more security, change the
security setting to Protected System and create one or
more entries in the Log-in List. In each entry, specify the
password and the login name the user must provide to open
an incoming connection, and grant the user permission to
use services and other features.
The safest way to allow incoming connections is to set up
password-protection by creating entries in the Log-in List.
If you will be the only person to connect to this computer,
make a single Log-in List entry and grant yourself whatever
privileges you want. For other users, create separate entries
for each user.
Specifying passwords
Laplink Gold passwords are case-sensitive (i and I, for
example, are treated differently). For incoming connections
from computers running Laplink Gold, you can create
secure passwords by mixing capital letters and lower case
letters.Case sensitivity has these important consequences:
• By default, security is not imposed on incoming connections over a cable. If you set up password protection for
modem and network connections, however, you can
extend that protection to cable and wireless connection
as well. On the Local Security tab, check this box:
Enforce Security for Local Connections
• If your Log-in List contains passwords assigned in an
earlier Laplink version, other computers that have also
upgraded may not be able to connect to your computer
until you assign new passwords.
• For incoming connections from computers running versions earlier than Laplink 2000, type passwords using
ALL CAPITALS. If your Log-in List has passwords for
such connections, retype them as all capitals, or assign
new passwords.
19
Creating your Log-in List
Laplink Gold supports two different ways of allowing controlled access to your computer: Laplink Authentication and
Microsoft Windows Authentication. Both can be used at the
Manage your incoming connections by configuring security
same time. The following section outlines the security features of Laplink Gold 12.
You can modify your security settings at any time.
Nobody is the highest level of security. It allows you to
connect to other computers and prohibits incoming
connections.
IT professionals might use this setting on a computer
used for support that does not require user access.
In order to set Log-in privileges, you must know the security model you want to use, and the credentials for all
incoming connections you want to add.
20
Anybody allows incoming connections from all Laplink
enabled computers who can see your machine.
To enhance security you can limit access to folders available to incoming connections by selecting Public Priv-leges.
Security Model window
Your security model determines how you assign credentials—User
Name and Password—to incoming connections
Laplink Gold 12
Laplink Authentication involves creating a login
list of user names and passwords. A login list is
unique to the computer that it is created on and
cannot be exported or shared with other Laplink
computers.
Microsoft Windows Authentication is extremely
useful for people who are on a Windows Active
Directory Network. This feature allows you to give
Laplink access to network users, so that users
need only their Windows network user names and
passwords to access the Laplink functions of your
computer.
21
.
Security Model - Laplink Authentication
Enter the log-in credentials for the
incoming connection to your
Host.
Make sure the Guest has this
information.
TIP For more information on
configuring Firewall connections see the tutorial on the
Laplink support site. From
Laplink’s main menu, select
Help, then Tutorials on the
Web.
Select the services you want the
Guest to have on your Host computer.
When allowing Remote Control
access to the Host, you can
choose to have the Host’s screen,
mouse and Keyboard disabled.
22
Laplink Gold 12
Security Model - Microsoft Windows Authentication
Select the Domain on which the
Guest is located.
Select and Add user(s) from the
Domain User list.
TIP For more information on
configuring Firewall connections see the tutorial on the
Laplink support site. From
Laplink’s main menu, select
Help > Tutorials on the
Web.
Select the services you want the
Guest to have on your Host computer.
When allowing a Remote Control
access to the Host, you can disable the Host’s screen, mouse
and keyboard.
23
Folder security
Whether you use Laplink Authentication or Microsoft Windows Authentication, when you open your computer to
incoming connections, you can specify if all drives and fold-
Folder Security window
ers—or only certain ones—are accessible to users who
connect to your computer for File Transfer. You can also
grant different privileges to different users.
Folder Security is an option
available for both Log-in List and
Public Security.
Folders denied access do not
appear in File Transfer windows
on a Remote computer.
24
Opening your computer to incoming connections does not
mean that files on all your drives and folders need to be
accessible to other users. You can “hide” certain drives and
folders so that other users will not see them in their File
Transfer windows and cannot copy files to or from them.
CAUTION You can specify a different setup for each
entry in your Log-in list. Until you specify otherwise,
every user in your Log-in List is allowed access to all of
your drives and folders.
CAUTION Denying access to a drive or folder makes
it invisible to anyone who connects for File Transfer but
has no effect in Remote Control. Anyone who connects
for Remote Control can still access all of your files.
TIP Navigate through the drives and folders on the
Folder Security tab much as you do in a File Transfer
window. For fastest navigation, double-click a drive or
folder or click the plus sign beside it.
Modem Callback
When you allow incoming modem connections, you can
require that the Guest computer be called back before a
connection is opened. Or you can let the Guest computer
determine whether to be called back. In both cases you can
supply the phone number ahead of time or leave the number to the Guest computer.
A callback occurs when one computer attempts to connect
to another. Instead of completing the connection, Laplink
reverses the call by hanging up and then dialing the caller’s
Laplink Gold 12
modem. When the caller’s modem answers, the connection
is completed and service windows are opened.
You can use callbacks as a security measure. For example,
set callbacks to require a callback to a phone number you
specify. Or you can use callbacks to save money, as when
you are connecting to your office from a hotel room.
You can set callback options when you secure your computer using the Log-in List. If necessary, specify a different
option for each listed entry.
• None Prevents callbacks. (Default)
• Optional, Any Number Lets the guest user decide
whether to be called back; users who choose to be
called back can specify the number to dial. This is the
most flexible of all the options.
• Optional, Specified Number OnlyLets the guest
user decide whether to be called back to the number
you specify or to open the connection without any callback. Only the number you specify in the Phone Number box can be dialed for the callback.
• Required, Any Number Requires Guest user to be
called back but allows them to specify the number to be
dialed. The number can vary from session to session.
• Required, Specified Number OnlyRequires the
Guest to be called back to the number you specify in
the Phone Number field.
CAUTION Do not require callbacks from computers
that connect by running Xchange Agents. The agents
will not finish because they cannot perform callbacks.
25
Modem Callback window
Laplink will call
you back using
a number you
enter, or will
connect without reversing
the call.
Laplink will call
you back at a
number you
specify, or will
disconnect.
Laplink will call
you back at a
number that
has been
specified, or
will connect
you without
reversing the
call.
Laplink will call
you back at a
number that
has been
specified, or
will disconnect.
26
Local security
The Local Security tab provides another level of security for
Host machines and those accepting local (cable or infrared)
connections. Creating password protection for your Laplink
security settings prevents unauthorized users from compromising your security system; it also keeps them from view-
Local security settings
Laplink Gold 12
ing your Address Book entries and using them to open
connections to other computers. Protecting your security
settings is a particularly good idea if you allow others to control your computer as guests.
To enhance security, check Protect Local
Security with a Password and click the Set
Password button.
NOTE The same password is required
for access to Connect Over Modem and
certain logging features.
Click to enforce credentials for cable and infrared connections to enable local connection
security.
27
Without knowledge of your password, users cannot view or
change any of this information.
• Log-in names, passwords, and other security settings;
• Phone numbers, passwords, and other information
stored in your Address Book entries;
• Privileges you have granted to Guest computers and
other settings in Remote Control Options;
• Antivirus options;
• Laplink Internet options.
28
Encryption
On the Encryption tab, you can choose to encrypt the data
you send, and choose the encryption method you want to
use.
Encryption is a good idea over Internet and other connections where your information might be intercepted and com-
Encryption protects the data you are transmiting
Laplink Gold 12
promised. You can use encryption methods provided in
Laplink, or use the powerful encryption options available in
the Windows operating system. The settings you make on
the Host computer determine encryption level for incoming
connections. By default, Laplink encrypts log-in names and
Be sure to enable encryption before
a connection is opened. Changing
the setting during a connection
won’t have any effect until the next
connection.
29
passwords, but nothing else. This setting is usually fine for
transmitting data over office networks or other secure connections.
On the Internet, intranets, or wide area networks, however,
it is usually a good idea to encrypt your data, including files,
text from chat sessions, and instructions sent to the remote
computer during Remote Control.
Lockout
On the Lockout tab, set the number of failed login attempts
you will accept from any user. When you open your computer to incoming connections, it’s a good idea to include
Lockout protection so that anyone who supplies an incorrect
password more than a particular number of times is denied
access to your computer.
Like combination safes, security passwords can be compromised. Password crackers use a variety of techniques;
some techniques are more sophisticated than others, but
almost all require guessing.
In order to gain access to your computer in Laplink, a
hacker would also need Laplink installed and running on
their system, and would need to locate your Laplink Host,
which is nearly impossible over the Internet. If you are
using Laplink with a firewall or router, the hacker would
need to get around that security as well, before they would
be able to attempt to crack passwords. All of this protection makes Laplink Gold very secure.However, use Lockout as an additional guard against unauthorized access and
bar anyone who makes repeated attempts at guessing a
password for entry to your computer.
While opening your Host computer to incoming connections, you can specify if and how data transmitted over
those connections will be encrypted. The settings on the
Guest computer are irrelevant. It is the settings on the Host
computer that determine encryption.
NOTE The only exception occurs when you connect to a
computer running a version older than Laplink 2000. In this
case only, the settings on your newer Guest computer determine encryption levels.
Monitoring failed login attempts
Lockout is designed to monitor and control access according to the login names in your Log-in List. A separate count
of failed attempts is kept for each login name; when a count
reaches the maximum you have defined for a specific user,
that user is locked out and can no longer connect to your
computer.
Beside the login names listed on the Lockout tab appear
numbers indicating the maximum number of failed login
attempts that the account is allowed to accumulate. When a
count reaches the maximum, the login name is labelled
Locked Out.
You can reset the count to zero for any or all of the log-in
names. This action also makes a locked out name usable
once again.
Unless a log-in name has been labeled Locked Out, its
count is reset to zero automatically whenever a user connects using that log-in name and the correct password. For
this reason, only consecutive failed attempts are recorded
permanently, not cumulative failed attempts.
30
Loading...
+ 138 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.