RemotelyAnywhere Enterprise Edition
March 23, 2004
3am Labs Ltd.Product:
$119 per license
- Ease of Use:
- Value for Money:
- Overall Rating:
No client software required.
: The client systems must have Java-enabled web browsers, which is not always acceptable.
: A useful, multi-function, administration program.
RemotelyAnywhere Enterprise Edition is unusual in that it does not need special software to be installed on the client machine. The software is installed on the machine to be controlled, and then it is controlled from any PC that has a Java-enabled web browser, (provided that it can make a connection to the host). A number of facilities are on offer, including a remote control console. When this is invoked from the client machine, a box pops up on the host indicating that a remote console session has begun.
File transfer uses a simple two-pane window that displays the contents of the directories on the client and host systems. Most file and directory operations can be performed here, including folder synchronization and folder replication. All file transfer operations are compressed and encrypted.
The host system can be managed through RemotelyAnywhere's management section. This gives the user access to most administration functions, from local file system manipulation to user account management. These are basically the same functions Windows provides, but the interfaces are different and in some cases easier to understand. It is possible to administer and view log files, services and processes.
A telnet facility is available which gives a command prompt on the host. This is implemented via a Java applet in the browser. Although the telnet server facility at the host will accept any suitable terminal emulation program, the advice is to use the Java applet provided because it uses the same encryption as the remote control system. The server uses the default port numbers, but these can be changed at the host. We strongly recommend changing default port numbers in any remote application since defaults are widely known and obvious targets for intruders.
There are a number of options available for rebooting the host, including rebooting the host software, rebooting the server, and a scheduled reboot which will cause the system to shut down and reboot at a specified time and date. This facility can be surprisingly useful. The other reboot options are "Emergency" which kills all active processes but restarts Windows correctly, and "Hard" which is a last resort and kills everything and reboots.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Information Security Risk Manager, £45-55k + bens
Infosec People - West Midlands, England, Coventry
SOC Analyst, Aldershot, £55-63k + benefits
Infosec People - England, Aldershot, Hampshire
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Sign up to our newsletters
SC Magazine UK Articles
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Met Police grab suspect with phone unlocked to get hold of data
- Cyber-security must reflect risk not just regulation
- Data centres are on the move - where will they end up?
- The information security implications of M&A deals
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Over 400,000 phishing sites have been detected each month in 2016
- TalkTalk customers urged to get routers swapped over hacker fears
- Report: Mirai 'is just the tip of the iceberg'
- Avalanche takedown involved searches in 40 countries
- India Supreme Court calls on tech giants to curb sexual assault, cyber-crime