Laplink Gold 12
The ability to use Windows Terminal Services makes this even more useful.
There is no remote install capability.
This is still a strong remote control system, and it has anti-virus capabilities as well.
Laplink's software continues to develop new capabilities while retaining its original file-transfer capabilities, making it an even more useful technical support tool.
Its core functions enable it to transfer and synchronize data between systems using a wide variety of connection methods. It still supports serial and parallel port connections, modem links, and the IPX networking protocol alongside its USB port and TCP/IP protocol capabilities.
Laplink can also use the internet to provide remote connections, either by using its Internet Locator Service (ILS) facility or by using Laplink's own internet service, which allows registered machines to communicate with each other via Laplink's web servers without needing to open up special ports on the firewall. The comprehensive file transfer operations can be automated by using the Xchange Agent, which can also provide an audit trail. The voice and text chat facilities provide a simple helpdesk function between admin and user.
The remote control facilities can now also operate with Windows Terminal Services if the target system provides them, which could be particularly useful when administering servers.
Another welcome new feature is built-in anti-virus scanning software, which checks all file transfers as they occur. This proved to be effective in detecting our collection of viruses, and the software refused to transfer the infected files.
Laplink still needs to be installed on every computer that will be involved, and there is no easy way to install it from a central location.
The Laplink program must be running on the target machine before any kind of communication can occur, and each Laplink program must have its local security options configured in order to accept remote connections.
Laplink can restrict access to specified users and can authenticate each one using either its own security system or by using Windows Domain authentication as required.
These local settings can also be protected with a password to prevent anyone remotely controlling the PC from changing the settings.