RE: Show what I'm doing, show what you're doing

Subject: RE: Show what I'm doing, show what you're doing
From: "McLauchlan, Kevin" <Kevin -dot- McLauchlan -at- safenet-inc -dot- com>
To: Gregory P Sweet <gps03 -at- health -dot- state -dot- ny -dot- us>
Date: Sun, 18 Nov 2012 20:56:44 -0500

Nice, succinct explanation. I learned something.
Thanks.

It's similar to what goes on in RD, !m, and other remote desktop apps, but I wasn't sure that was necessarily the model used by those services.

However, I doubt an attacker would need to be in on the connection from the first moment. Full-screen refreshes are not likely a "frequent" occurrence in such a session, but even if they occur only occasionally on the timeframe of internet/web speeds, they're still probably happening several times every minute.

But, on third thought, they must be using link-securing techniques. The transactions wouldn't be sent in-the-clear. So there's still a considerable hurdle even for the most sophisticated and well-heeled bad guys.



From: Gregory P Sweet [mailto:gps03 -at- health -dot- state -dot- ny -dot- us]
Sent: November-16-12 3:12 PM



[snip]
Most of these systems work and achieve the efficiency they do (think broadcast slides to 3000 end points with fraction of second latency) by taking a snapshot of your screen and broadcasting it. Then they constantly take snapshots (like a movie camera) but only transmit the pixels that change, so even if some data did leak out, chances are it would be a useless slice of screen near the mouse. Someone would have to break in and steal the whole stream to get anything useful. In most cases, unless you record the session and store it on the hosts servers or upload documents to the host servers, nothing persists after the session.





The information contained in this electronic mail transmission
may be privileged and confidential, and therefore, protected
from disclosure. If you have received this communication in
error, please notify us immediately by replying to this
message and deleting it from your computer without copying
or disclosing it.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Writer Tip: Create 10 different outputs with Doc-To-Help -- including Mobile and EPUB.

Read all about them: http://bit.ly/doc-to-help-10-outputs
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

You are currently subscribed to TECHWR-L as archive -at- web -dot- techwr-l -dot- com -dot-

To unsubscribe send a blank email to
techwr-l-leave -at- lists -dot- techwr-l -dot- com


Send administrative questions to admin -at- techwr-l -dot- com -dot- Visit
http://www.techwhirl.com/email-discussion-groups/ for more resources and info.

Looking for articles on Technical Communications? Head over to our online magazine at http://techwhirl.com

Looking for the archived Techwr-l email discussions? Search our public email archives @ http://techwr-l.com/archives


References:
Show what I'm doing, show what you're doing: From: McLauchlan, Kevin
Re: Show what I'm doing, show what you're doing: From: Gregory P Sweet

Previous by Author: RE: Possible to encrypt "free" mail?
Next by Author: RE: Win 7 WORD crashes... Going to wrong Library?
Previous by Thread: RE: Show what I'm doing, show what you're doing
Next by Thread: Possible to encrypt "free" mail?


What this post helpful? Share it with friends and colleagues:

Sponsored Ads


Sponsored Ads