Hi, The consensus view of this list seems to be that relying on the encryption built into Terminal Services connections is not good enough and that SSH or VPN should be deployed to wrap such connections.
In the absence of this additional measure, the things a hacker would need to obtain or circumvent to gain access to a practice datafile are: 1. The practice routers external IP 2. The port of the Terminal Services service on the router 3. The Windows user password 4. The practice software database password Of these, (3) is likely to be the strongest roadblock for a determined hacker. My question is, does Terminal Services have any provision for more beefed up security natively e.g. Certificates, dongles, MAC address restriction, IP restrictions etc? In other words, are there any measures that can be deployed other than VPN and SSH that can beef up the Windows/Terminal Services security. Cheers, Simon _______________________________________________ Gpcg_talk mailing list [email protected] http://ozdocit.org/cgi-bin/mailman/listinfo/gpcg_talk
