TIPS AND TRICKS
     
 
  1. Remote Access is where another user can log into your computer and takes Total control of your system and has total access to all your data and programs.

  2. The first disadvantage is directly related to the first advantage: if an intruder gains access to your LAN connection, they may be able to access all the resources on your network.

  3. Services used over the internet are usually reached over several gateways (called router) who decide on which way your data should go. All those machines "see" your login and password. As long as every gateway is managed by reliable persons, this is not a problem. If one of those machines is hacked, your login / password may be sniffed and used to access to your data or misuse your computer without any problems.

  4. One disadvantage of Windows remote login is that by allowing the remote access to your system and network it easily gets infected with spyware and viruses which chocks your network and ultimately creates problems as machines behave abnormally and user’s system comes to a complete halt.

  5. By allowing remote access, an attacker can gain remote system level access to any default installation of Windows XP. The attacker could also execute a Denial of Service (DoS) and a Distributed Denial of Service (DDoS) attack against vulnerable systems.

  6. The risk is HIGH in remote accessing. An outsider can gain system level access to any Windows XP system that has been installed with default settings.

  7. The problem could enable an attacker to send a user’s system to a bogus download site solely for the purpose of slowing or stopping the user’s system.

  8. By allowing remote accessing, Internet and internal LAN, server may or may not have its own firewall software running locally. This is an all too common setup where there is little to no protection, and is very vulnerable to many attacks, information "leakage" and more.

  9. Thus Remote access requires communications hardware, software, and actual physical links, although this can be as simple but it allows the exploitation of remote code execution vulnerabilities at Administrator level.

  10. Thus by allowing the remote access, it can affect your security in a big way as it means that one is compromising on three “AAA’s of security which are Authentication, Authorization and Auditing and is the Heart of every network.
 
© 2007 EDS Technologies.