Remote Utilities Blog


Wake on LAN Network Options: A Great Remote Solution

Wake on LAN Network Options: A Great Remote Solution

What do you do when you need to turn on a computer at a remote site that’s been shut down? You could call somebody on site, but that only works if they’re actually there. If you need access to a computer on off hours, during the weekend, or in another situation where having somebody turn it on for you is inconvenient or impossible, there is a simple solution. This solution is called Wake on LAN, and it is an effective way to improve your remote access abilities.

by Antony , Sep 4, 2013

Continue reading

5 Tips that will Boost your Network Security

5 Tips that will Boost your Network Security

How good is your network security? Many people assume that it’s fine because they haven’t had to deal with viruses or malicious attacks, but you might be more unprotected than you think. If you use remote utilities and require a functional network at all times, you should take the steps outlined below to protect yourself. Not only will this keep you safe from viruses, but it will also protect against other malicious attacks that might slow your network down.

by Antony , Aug 29, 2013

Continue reading

The Past, Present, and Future of Wi-Fi

The Past, Present, and Future of Wi-Fi

If you’re like most people, who have at least one device that uses Wi-Fi to connect to the Internet. We’re well past the days when getting online meant using a phone cable and hearing the screeching sound of a modem whenever you got started. Nowadays, people use Wi-Fi for everything fr om casual Internet use to business networking. Where has Wi-Fi been and wh ere will it be going in the future? This article will explore its past and present as well as things still to come.

by Antony , Aug 14, 2013

Continue reading

A Complete Overview of Network Address Translation

A Complete Overview of Network Address Translation

Did you know that there is a way to convert your entire network to only one IP address? This method is known as network address translation, or NAT. That is only one use of the technology, however. It can also increase security and provide a smoother overall browsing experience depending on how it is used. This article will discuss the history of NAT and both the advantages and drawbacks of using it for your business network.

by Antony , Jul 30, 2013

Continue reading

Backing up Data on a Small Network: Dos and Don’ts

Backing up Data on a Small Network: Dos and Don’ts

Backing up your data is important, and handling data on a small network presents unique challenges. Rather than try to handle a small network in a way that isn’t custom tailored to your needs, it’s better to put together a customized protocol. When you’re planning out the data backup on your small network, keep the follows dos and don’ts in mind. This advice will help save you a lot of headaches in the long run.

by Antony , Jul 24, 2013

Continue reading

Dynamic Host Configuration Protocol (DHCP)

Dynamic Host Configuration Protocol (DHCP)

A protocol is a set of rules used to determine how computers on a network communicate. The Dynamic Host Configuration Protocol (DHCP) is a protocol commonly used to automatically generate an Internet Protocol (IP) address and other configuration details, like the Domain Name System (DNS) server address, subnet mask and default gateway to client host computers connecting to a network.

by Conrad Sallian, Jul 17, 2013

Continue reading

What is a Network Administrator?

What is a Network Administrator?

Virtually every business that has an IT department has a network administrator. Despite the common nature of this position, few people truly understand what such an individual does. By understanding what a network administrator does, you can communicate more effectively with your own administrator and also make sure that you know which qualities to look for if you are ever in the position where you need to find somebody to fill this role.

by Antony , Jun 19, 2013

Continue reading

Guide to Virtual Private Networks

Guide to Virtual Private Networks

Imagine leaving your home wearing a clearly legible sign around your neck that provides all of your most important and private information: your name, address, contact information, banking and other financial data, all of your shopping habits, places you frequent and what you do while you are there. Most of us would not want to share this information with complete strangers, for many obvious reasons. This data can put you at risk in any number of ways, including potential theft and physical harm. Yet, that is exactly what many people do every time they use internet.

by Conrad Sallian, Jun 19, 2013

Continue reading

Port Forwarding and You

Port Forwarding and You

One of the most common techniques out there for people with a remote desktop is port forwarding. This allows remote computers to access a local area network (LAN) or specific router fr om an outside location. This technique is extremely useful if you are on the go a lot but want to keep using a specific network. It is especially useful to small businesses, which use it to connect satellite offices, provide remote access to employees on the move, and more.

by Antony , Jun 12, 2013

Continue reading

A Mediated Connection vs. NAT Traversal Techniques and Hole Punching

A Mediated Connection vs. NAT Traversal Techniques and Hole Punching

When it comes to accessing a remote desktop over the Internet, there are basically two options: a direct IP to IP connection or a mediated connection. In recent years it has been an increasing trend among major remote desktop software vendors to provide the latter connection type. For a customer it is much easier to use a simple number (an ID) for connecting rather than configuring a router and grappling with port forwarding.

by Conrad Sallian, Sep 3, 2012

Continue reading