Summer Hours: starting May 6th
Mon-Thu: 8:00am - 9:00pm
Friday: 8:00am - noon
Sunday: 3:00pm - 9:00pm
(when classes are in session) Exceptions to the schedule
Remote Control Software (Under Construction)
Having remote control software installed on our computers allows someone to take complete control of our computer for whatever purpose they desire. Hence, it is important that the software be robust and configured in a way that prevents unauthorized personnel from using it.
Faculty and staff should check with their individual departments for software selection, configuration information, and local policies regarding remote control software use. IT recommendations for product selection and configuration will soon be provided and will be accessible by clicking on the product name below. In general, all remote control software implementations should have the following characteristics.
- Each person accessing the computer remotely should have their own account.
- The strongest form of encryption the product supports should be selected.
- Access to the remote control software from off-campus should be via the JMU Remote VPN software .
- The remote control software on the computer acting as a host should be disabled when it is not needed.
- Dial-up remote control software, dial-up access software, and modems should be configured to:
- Hang up the phone line when a user logs out
- Log the user out if the phone hangs up
- Depending on the sensitivity of the data accessible by the host computer, stronger measures may be appropriate if supported by the product in use:
- Restrict use to certain IP addresses
- No official recommendations at this time
- PuTTY SSH Unix Shell Access
In-Use and Appropriate Software:
- Microsoft Terminal Services
- Windows Remote Desktop
- Unix X-Servers protected by xhost IP restrictions (see man page for xhost)
Software under Investigation: