Symantec 14541094 User Guide - Page 22
How Symantec pcAnywhere works, Understanding the difference between a host and a remote - internet security
UPC - 037648640480
View all Symantec 14541094 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 22 highlights
22 Introducing Symantec pcAnywhere How Symantec pcAnywhere works Table 1-1 Main components of pcAnywhere (continued) Name Description Symantec Packager Lets you create custom installations of pcAnywhere that you can deploy to target systems. For more information, see the Symantec pcAnywhere Administrator's Guide. How Symantec pcAnywhere works Symantec pcAnywhere uses remote control technology to let you connect to another computer or server and work as though you are sitting in front of it. Symantec pcAnywhere supports network connections over a local area network (LAN), wide area network (WAN), or the Internet. It also supports modem-to-modem connections and direct, computer-to-computer connections through a serial or parallel port and the appropriate type of cable. In most cases, the remote user initiates the connection. You provide the information that is needed to connect to the host computer. You can also select options to increase security or optimize performance. To make a connection, the host computer must be set up to wait for incoming pcAnywhere connections. The host user can select the type of device to use for connections (for example, TCP/IP). The host user can select security options to control access to the host computer. Administrators can use Quick Deploy and Connect to configure and deploy a limited-functionality, single-use host to computers that do not have a host running. You must have administrator rights on the computer to which you want to connect. See " Connecting to a computer that does not have a host running" on page 124. Understanding the difference between a host and a remote When two computers are connected using pcAnywhere, they function in a client/server relationship. The host computer, as the server, waits for connections from a remote computer and provides the requested services. When you configure a host computer, you control who can connect to the host computer and what level of access the remote user should have. For example, you can restrict a remote user from restarting the host computer. See "Ways to set up a host computer" on page 70. The remote computer, as the client, connects to the host computer and specifies the actions that should be carried out. Although the actual work is performed on