New in timbuktu pro version 8 – ARRIS Timbuktu for Macintosh v8.8.3- Getting Started Guide User Manual

Page 11

Advertising
background image

Getting Started with Timbuktu Pro for Macintosh

| 11

Share Entire Desktop

When you control or observe a remote computer with two monitors, the screen-
sharing window now allows you to display both monitors together. Click the
Change Monitor button on the frame of the screen-sharing window to cycle
through the individual monitors.

Screen-Sharing Improvements

Timbuktu Pro version 8.5 features improved auto scrolling during Control ses-
sions. When you control a computer with a larger monitor than your own com-
puter, scrolling is now smoother. Enhanced auto scrolling may also make it easier
to activate a “hot” corner or open the dock on the remote computer.

In addition, screen-sharing performance has been improved for computers on fast
networks, particularly between two Timbuktu Pro version 8.5 computers.

New in Timbuktu Pro Version 8

Timbuktu Pro version 8 takes full advantage of the Internet as well as the most re-
cent improvements and features available in Mac OS X Panther (version 10.3). The
new push installation process allows you to quickly and easily deploy Timbuktu
Pro across your network. Plus, Timbuktu Pro version 8 makes use of SSH to pro-
vide both enhanced security and improved performance.

Secure SSH Connections

Timbuktu Pro now supports secure connections between computers (and be-
tween Macintosh and Windows computers) running Timbuktu Pro version 8.

When you begin a connection to a remote Timbuktu Pro computer, the Remote
User dialog box will open to enable you to select a connection option and enter
your access credentials. To establish a secure connection, select the Registered
User (Secure)
option.

In addition to connection security, connections over SSH tunnels provide the fol-
lowing functionality:

Timbuktu Pro authentication is integrated with Mac OS X user accounts and
user authentication.

The SSH tunnels provide a well-known and trusted security option for host
computers on the public Internet.

Advertising