TechWhirl (TECHWR-L) is a resource for technical writing and technical communications professionals of all experience levels and in all industries to share their experiences and acquire information.
For two decades, technical communicators have turned to TechWhirl to ask and answer questions about the always-changing world of technical communications, such as tools, skills, career paths, methodologies, and emerging industries. The TechWhirl Archives and magazine, created for, by and about technical writers, offer a wealth of knowledge to everyone with an interest in any aspect of technical communications.
Subject:RE: Show what I'm doing, show what you're doing From:"McLauchlan, Kevin" <Kevin -dot- McLauchlan -at- safenet-inc -dot- com> To:Gregory P Sweet <gps03 -at- health -dot- state -dot- ny -dot- us> Date:Sun, 18 Nov 2012 20:56:44 -0500
Nice, succinct explanation. I learned something.
Thanks.
It's similar to what goes on in RD, !m, and other remote desktop apps, but I wasn't sure that was necessarily the model used by those services.
However, I doubt an attacker would need to be in on the connection from the first moment. Full-screen refreshes are not likely a "frequent" occurrence in such a session, but even if they occur only occasionally on the timeframe of internet/web speeds, they're still probably happening several times every minute.
But, on third thought, they must be using link-securing techniques. The transactions wouldn't be sent in-the-clear. So there's still a considerable hurdle even for the most sophisticated and well-heeled bad guys.
From: Gregory P Sweet [mailto:gps03 -at- health -dot- state -dot- ny -dot- us]
Sent: November-16-12 3:12 PM
[snip]
Most of these systems work and achieve the efficiency they do (think broadcast slides to 3000 end points with fraction of second latency) by taking a snapshot of your screen and broadcasting it. Then they constantly take snapshots (like a movie camera) but only transmit the pixels that change, so even if some data did leak out, chances are it would be a useless slice of screen near the mouse. Someone would have to break in and steal the whole stream to get anything useful. In most cases, unless you record the session and store it on the hosts servers or upload documents to the host servers, nothing persists after the session.
The information contained in this electronic mail transmission
may be privileged and confidential, and therefore, protected
from disclosure. If you have received this communication in
error, please notify us immediately by replying to this
message and deleting it from your computer without copying
or disclosing it.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Writer Tip: Create 10 different outputs with Doc-To-Help -- including Mobile and EPUB.