Symantec 14541094 User Guide - Page 252

About Web Remote encryption, About pcAnywhere encoding on Web Remote

Page 252 highlights

252 Connecting from a Web browser Ways to secure your Web Remote session About Web Remote encryption Encryption is a method of encoding or scrambling data to prevent unauthorized users from reading or tampering with the data. Modern methods of computer cryptography use complex mathematical algorithms to encrypt and decrypt data. The Web Remote uses encryption to ensure that the data that you send cannot be read or altered by unauthorized users while in transit. The Web Remote provides the following types of encryption: ■ pcAnywhere encoding See "About pcAnywhere encoding on Web Remote" on page 252. ■ Symmetric See "About symmetric encryption on Web Remote" on page 252. About pcAnywhere encoding on Web Remote pcAnywhere encoding applies a simple transformation to data so that the data stream cannot be easily interpreted by a third party. This encryption level is compatible with earlier versions of pcAnywhere that do not support stronger encryption techniques. For more information about pcAnywhere encoding, see the Symantec pcAnywhere User's Guide. About symmetric encryption on Web Remote Symmetric encryption encrypts and decrypts data using the same set of symmetric cryptographic keys. These keys are negotiated and exchanged using standard protocols for anonymous key exchange. During a session, both the sender and the recipient share these keys. The Web Remote lets you select the symmetric encryption algorithm that best suits your security and performance needs. Each algorithm uses a string of bits that are known as a key to perform the calculations. You can strengthen the level of encryption by selecting a higher key length. The larger the key length, the greater the number of potential patterns that can be created. This makes it more difficult to break the encryption code. Higher key lengths create stronger encryption, but they might also result in slower application performance. The key lengths that are available depend on the type of algorithm that you select and your computer's operating system. See "Configuring session encryption" on page 253. For more information about symmetric encryption, see the Symantec pcAnywhere User's Guide.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313

About Web Remote encryption
Encryption is a method of encoding or scrambling data to prevent unauthorized
users from reading or tampering with the data. Modern methods of computer
cryptography use complex mathematical algorithms to encrypt and decrypt data.
The Web Remote uses encryption to ensure that the data that you send cannot
be read or altered by unauthorized users while in transit.
The Web Remote provides the following types of encryption:
pcAnywhere encoding
See
“About pcAnywhere encoding on Web Remote”
on page 252.
Symmetric
See
“About symmetric encryption on Web Remote”
on page 252.
About pcAnywhere encoding on Web Remote
pcAnywhere encoding applies a simple transformation to data so that the data
stream cannot be easily interpreted by a third party. This encryption level is
compatible with earlier versions of pcAnywhere that do not support stronger
encryption techniques.
For more information about pcAnywhere encoding, see the
Symantec pcAnywhere
User's Guide.
About symmetric encryption on Web Remote
Symmetric encryption encrypts and decrypts data using the same set of symmetric
cryptographic keys. These keys are negotiated and exchanged using standard
protocols for anonymous key exchange. During a session, both the sender and
the recipient share these keys.
The Web Remote lets you select the symmetric encryption algorithm that best
suits your security and performance needs. Each algorithm uses a string of bits
that are known as a key to perform the calculations. You can strengthen the level
of encryption by selecting a higher key length. The larger the key length, the
greater the number of potential patterns that can be created. This makes it more
difficult to break the encryption code. Higher key lengths create stronger
encryption, but they might also result in slower application performance. The
key lengths that are available depend on the type of algorithm that you select and
your computer's operating system.
See
“Configuring session encryption”
on page 253.
For more information about symmetric encryption, see the
Symantec pcAnywhere
User's Guide.
Connecting from a Web browser
Ways to secure your Web Remote session
252