Symantec 14541094 User Guide - Page 22

How Symantec pcAnywhere works, Understanding the difference between a host and a remote - internet security

Page 22 highlights

22 Introducing Symantec pcAnywhere How Symantec pcAnywhere works Table 1-1 Main components of pcAnywhere (continued) Name Description Symantec Packager Lets you create custom installations of pcAnywhere that you can deploy to target systems. For more information, see the Symantec pcAnywhere Administrator's Guide. How Symantec pcAnywhere works Symantec pcAnywhere uses remote control technology to let you connect to another computer or server and work as though you are sitting in front of it. Symantec pcAnywhere supports network connections over a local area network (LAN), wide area network (WAN), or the Internet. It also supports modem-to-modem connections and direct, computer-to-computer connections through a serial or parallel port and the appropriate type of cable. In most cases, the remote user initiates the connection. You provide the information that is needed to connect to the host computer. You can also select options to increase security or optimize performance. To make a connection, the host computer must be set up to wait for incoming pcAnywhere connections. The host user can select the type of device to use for connections (for example, TCP/IP). The host user can select security options to control access to the host computer. Administrators can use Quick Deploy and Connect to configure and deploy a limited-functionality, single-use host to computers that do not have a host running. You must have administrator rights on the computer to which you want to connect. See " Connecting to a computer that does not have a host running" on page 124. Understanding the difference between a host and a remote When two computers are connected using pcAnywhere, they function in a client/server relationship. The host computer, as the server, waits for connections from a remote computer and provides the requested services. When you configure a host computer, you control who can connect to the host computer and what level of access the remote user should have. For example, you can restrict a remote user from restarting the host computer. See "Ways to set up a host computer" on page 70. The remote computer, as the client, connects to the host computer and specifies the actions that should be carried out. Although the actual work is performed on

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313

Table 1-1
Main components of pcAnywhere
(continued)
Description
Name
Lets you create custom installations of pcAnywhere that
you can deploy to target systems.
For more information, see the
Symantec pcAnywhere
Administrator's Guide
.
Symantec Packager
How Symantec pcAnywhere works
Symantec pcAnywhere uses remote control technology to let you connect to
another computer or server and work as though you are sitting in front of it.
Symantec pcAnywhere supports network connections over a local area network
(LAN), wide area network (WAN), or the Internet. It also supports
modem-to-modem connections and direct, computer-to-computer connections
through a serial or parallel port and the appropriate type of cable.
In most cases, the remote user initiates the connection. You provide the
information that is needed to connect to the host computer. You can also select
options to increase security or optimize performance. To make a connection, the
host computer must be set up to wait for incoming pcAnywhere connections. The
host user can select the type of device to use for connections (for example, TCP/IP).
The host user can select security options to control access to the host computer.
Administrators can use Quick Deploy and Connect to configure and deploy a
limited-functionality, single-use host to computers that do not have a host running.
You must have administrator rights on the computer to which you want to connect.
See
“ Connecting to a computer that does not have a host running”
on page 124.
Understanding the difference between a host and a remote
When two computers are connected using pcAnywhere, they function in a
client/server relationship. The host computer, as the server, waits for connections
from a remote computer and provides the requested services.
When you configure a host computer, you control who can connect to the host
computer and what level of access the remote user should have. For example, you
can restrict a remote user from restarting the host computer.
See
“Ways to set up a host computer”
on page 70.
The remote computer, as the client, connects to the host computer and specifies
the actions that should be carried out. Although the actual work is performed on
Introducing Symantec pcAnywhere
How Symantec pcAnywhere works
22