Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations gkittelson on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Alternative to VPN?

Status
Not open for further replies.

SATech

IS-IT--Management
Aug 1, 2001
86
US
I recently came across an so-called 'alternative' to VPN technology that uses the available TCP ports (80, 443, and/or 8200) over any computer with an Internet connection and browser anywhere in the world. The solution is by a company called Expertcity, Inc. and the product name is "GoToMyPC" (
Has anyone ever used this product and, if so, do you recommend it? Is it as secure as their web site discribes it to be? Pros/Cons?

Thanks,
________
S. Joseph Vergara
SVergara@Texas.net
 
Its probably just a tunneling app that uses popular ports
to masquerade what kind of traffic is really coming in.
It's still a VPN if you are tunneling protocols through any
channel to any port over a public network, so I don't see
how this is a "replacement".

 
I'm looking at it from a cost angle. My understanding is that it utilizes existing PCs/Browsers. As a purchasing agent, this would be a substantial cost savings not having to purchase the hardware and training costs associated with local implementation. I basically need to exploit any CONS (if any) that may be associated with this 'alternative'. ________
S. Joseph Vergara
SVergara@Texas.net
 
Drawbacks:
1) It is basically a proxy service using a piece of
java middleware. It only works for the win32 platform right
now.
2) The proxy relay basically sets the speed of the connection. It also introduces latency. Java is not
a particularly fast(or extremely stable)servlet.
Working with novell servers I have experienced the instability of some java components(DNS/dhcp applet:
console one) and would not rely on them. Furthermore
IE has a very bad security record:(MIME exploit,
nimda). though this seems less of an issue.
3)Your security is only as good as the proxy services.
It's like putting your encrypted email through carnivore..
can they read it..maybe, do they have the comm stream, yes.
You have got to trust the proxy provider.

4) Three sets of passwords. I have clueless users.
Three passwords means endless lost passwords, means a
semi-public db list for my own use to keep track of all passwords used since there is doubtless a service fee for
"lost passwords". 100 users , 300 passwords, just for this service.

5) Logging of all sessions, inactive timers, and mandatory login limits are great, but may be overkill for some locations.

Conclusion:
Basically it is proxied vnc with an encrypted channel, redundant security measures and some middlemen.

Good Luck
 
Thanks for your time and input marsd...good info for me to throw on the round table.

sjv ________
S. Joseph Vergara
SVergara@Texas.net
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top