Articles about remote access

Chrome remote desktop running on an iPad

Adults-only Chrome add-on grabs you by the Googlies

Google's Chrome Remote Desktop app does what it says on the can: install it in Google's browser and it becomes possible to drive the host Mac, PC or Chromebook from another similarly-equipped machine. As of today it's also possible to drive a machine from iOS, as Google has been kind enough to release an app for the iPhone or …
Simon Sharwood, 13 Jan 2015
LG’s Bluetooth Magic Remote

RealVNC distances itself from factories, power plants, PCs hooked up to password-less VNC

A scan of the public internet by security researchers has seemingly revealed thousands upon thousands of computers fully accessible via VNC – with no password required. Worryingly, the unsecured systems – from PCs and shopping tills to terminals controlling factories and heating systems – are at the mercy of any passing …
John Leyden, 21 Aug 2014
Google Chrome logo

Chrome Remote Desktop adds Linux to supported OS list

Google has tweaked Chrome Remote Desktop to let it access Linux machines. Chrome Remote Desktop is a Chrome (the browser) extension that provides remote access to another desktop. Often suggested as a remote support tool, the technology is also a nice way to access a remote PC on which you left that file you really need to …
The rermote access method

Developer codes VNC-over-GIF tool

However you choose to pronounce GIF, developer Andrey Sidorov has found a great new use for the recently-resurgent-thanks-to-Tumblr file format: displaying a remote device. Sidorov used the weekend just passed to unleash a tool called VNC-over-GIF that does what is says on the can. For the uninitiated, Virtual Network Control …
Simon Sharwood, 27 May 2013
The Register breaking news

Outsourcing your own job much more common than first thought

RSA 2013 Computer programmers outsourcing their own jobs and pocketing the profit from salary differentials overseas is much more common than first thought. Last month, Verizon reported that an investigation into a client had revealed that the unnamed company's star programmer, a chap dubbed Bob, had outsourced his job to a Chinese …
Iain Thomson, 27 Feb 2013
channel

Cryptocard gobbles tasty, dead number puzzle startup

Cryptocard has acquired the patents and intellectual property of GrIDsure, a UK pattern-based authentication start-up that became insolvent earlier this month. Term of the deal, announced Friday, were undisclosed. The acquired technology will be added to Cryptocard's existing cloud-based authentication services portfolio, …
John Leyden, 18 Nov 2011
The Register breaking news

RSA makes token offer to worried customers

RSA has offered to replace its customers' security tokens following confirmation that an important customer had come under attack, in an incident made possible by an earlier high-profile hack against RSA's systems. SecurID, RSA's two-factor authentication system, uses a token which generates a pseudo-random six-digit passcode …
John Leyden, 7 Jun 2011
The Register breaking news

Second defence contractor targeted in RSA SecurID-based hack

Defence giant L-3 Communications has become the second victim of an attempted hack attack that relied on the RSA SecurID hack that took place earlier this year. A leaked internal memo, obtained by Wired, said that L-3's Stratus group had been actively targeted with attacks based on "leveraging compromised information" from the …
John Leyden, 1 Jun 2011
For Sale sign detail

Lockheed Martin suspends remote access after network 'intrusion'

Lockheed Martin has reportedly suspended remote access to email and corporate apps following the discover of a network intrusion that may be linked to the high-profile breach against RSA earlier this year. The manufacturer of F-22 and F-35 fighter planes has reset passwords in response to a "major internal computer network …
John Leyden, 27 May 2011
The Register breaking news

Winfrasoft touts pattern-based password alternative

UK software developer Winfrasoft is pushing visual patterns as an alternative to traditional passwords. Users would select, or be allocated, a pattern of squares on a six-by-six grid. Each time they logged onto a system, they would be presented with a grid of numbers (as illustrated here), from which they would have to enter …
John Leyden, 14 Apr 2011

Remote access in real life

Blog In order to have a meaningful discussion about the specifics of remote access software, we need to get a few concepts out of the way, and some terminology nailed down. The first concept that needs to be dealt with is that of “sessions”. A session is the interface you see on the screen when you log in: your background, your …
Trevor Pott, 19 May 2010
The Register breaking news

Doubt cast over ContactPoint security assurances

A UK government minister has issued assurances about the security of the government's child protection database ContactPoint, but the minister's assurances are incomplete, if not misguided, says one expert. The ContactPoint system is designed to give social workers, police and NHS staff access to case files on children, so …
John Leyden, 23 Apr 2009
The Register breaking news

Rogue sysadmin sues SF for $3m

Terry Childs, the ex-network admin accused of holding San Francisco's computer network to ransom, is suing the city for $3m. Childs, who has been in prison since July and is still awaiting trial, wants compensation for lost wages, damages and emotional distress caused by what he claims was his wrongful arrest and imprisonment …
John Oates, 5 Feb 2009
channel

eBayed VPN kit hands over access to council network

Updated An item of networking kit bought from eBay for just 99p ($1.79) gave privileged access to an internal network at an English county council. The security risks posed by unwiped computer discs - which are often offered for sale on auction sites and sometimes even obtainable from council rubbish dumps - are well documented, but …
John Leyden, 29 Sep 2008
The Register breaking news

Apple challenges Reg to patent duel

Apple will fill in some long-awaited missing features from its iPod and iPhone mobile players, a patent application published this week suggests. There's just one problem: Much of Apple's "invention" was dreamed up by Reg readers several years ago - and one embodiment is already on the market. Publication 20080189390, Remote …
The Register breaking news

And the winner is...the laptop!

Reg Technology Panel You’re out and about, and you know you’ll need to hook back to the office to pick up that important email or access that corporate system – so what do you want to take, a notebook or a handheld device? To our surprise, according to over 1,000 of you, compared to mobile access via a handheld device, remote notebook access was …
Jon Collins, 9 Jul 2007

WD ups My Book network drive capacity to 1TB

Western Digital has bumped its My Book World Edition remote-access ready network-connected external hard drive to 1TB, adding the extra storage capacity with a second disk inside the casing. So not only is there more room for information, the unit's RAID-able for better data security. western digital my book world edition ii …
Tony Smith, 26 Feb 2007

Create a news alert about remote access, or find more stories about remote access.

Biting the hand that feeds IT © 1998–2018