Andy, www.Logmein.com select the Free Version which does everything apart from File transfer and print.
As opposed to Crossloop, you can set up the "host" so you can connect from anywhere with a simple authorisation password. Dave Crozier -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Andy Davies Sent: 06 August 2007 16:09 To: [email protected] Subject: Re: [NF] secure sockets layer protocol... over wi-fi does notlock the doors against email exploits Ted - or anyone, what do you suggest for this scenario: my own laptop (XP Pro) in an internet cafe. I want to a) link to machine(s) at home. b) Use a proxy to get onto the internet because some sites (e.g. the UK lottery) are selectively blocked depending on e.g country of access. I have crossloop installed which works OK through my nat'ing router** but needs a user to authorise access (I see that crossloop uses TightVNC under the hood - perhaps I could run it directly?) ** Actually I still can't get it to work when I'm working through our corporate vpn, despite setting crossloop up to use our proxy and specifying my login + password. Andrew Davies MBCS CITP - AndyD 8-)# "Ted Roche" <[EMAIL PROTECTED] To: [EMAIL PROTECTED] om> cc: Sent by: Subject: Re: [NF] secure sockets layer protocol... over wi-fi does not lock profoxtech-bounce the doors against email exploits [EMAIL PROTECTED] 06/08/2007 15:14 Please respond to profox On 8/6/07, Tracy Pearson <[EMAIL PROTECTED]> wrote: > If I setup a linux box with and put SSL on it. Using a dynamic dns, I use > Putty to connect and port forward my http protocols, and a few others. I suspect you are confusing SSL (Secure Sockets Layer, an encryption technique for passing https protocols, typically on port 443) with SSH (Secure Shell, a means of establishing an ecrypted tunnel betweeen two machines, typically port 22). If you are using Putty, you are using SSH. > Does this create more problems than it is worth? > Is this seen as more secure way of using hot spot wi-fi connections? I take it you are connecting from a hotspot into your internal domain, using SSH to encrypt the traffic from your machine to your domain, and forwarding the unencrypted http traffic over that domain? That's a Best Practice, as long as you own and maintain security on the end-point, the machine you're using to attach. If you are using someone else's kiosk, that machine is insecure, period. -- Ted Roche Ted Roche & Associates, LLC http://www.tedroche.com [excessive quoting removed by server] _______________________________________________ Post Messages to: [email protected] Subscription Maintenance: http://leafe.com/mailman/listinfo/profox OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED] ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.

