Macintosh users and tech support crews have long used Netopia ’s Timbuktu Pro ( , June 2004 ) to interact with other machines over a web connection — through screen command , data file transfer , or vocalization or text chat with remote drug user . Whereas edition 7.0 get Panther compatibility , but not much in the way of new feature , Timbuktu Pro 8.5 embraces OS X ’s underpinnings to deliver increased security department and flexibleness .

Version 8.5 keep up promptly on the heel of two raise earlier this year : Version 8.0 ( released in March ) , and version 8.1 ( released in April ) . rendering 8.0 introduced SSH ( Secure Shell ) encoding , Mac OS X authentication , and outback induction ; version 8.1 offered Tiger compatibility , performance improvements , and intercept fixes . translation 8.5 expands on these features .

Remote installation

The Install service ( introduced in interlingual rendition 8.0 ) allows you to install or upgrade Timbuktu on a remote reckoner . That Mac involve to have Remote Login , also bed as Secure Shell ( SSH ) , enabled in its Sharing system preferences , and the person doing the installation also ask to have decision maker - stratum privilege on that machine . Once you ’ve suffer these requirements , install Timbuktu on several distant computers , each with a predetermined preference file cabinet and activation tonality , is a round-eyed matter of clicking through the Install Timbuktu dialog corner . Timbuktu becomes usable immediately , with no restart required . Version 8.1 added the capacity to sign in with an administrator account ’s long name ( such as Andrew Laurence ) instead of just the forgetful name ( atlauren , for instance ) .

Encryption and authentication

There are two important new surety features ( first introduced in version 8.0 and improved in subsequent releases ) . First , Timbuktu can inscribe its communication with SSH , thereby forestall miscreants from sniff your connection and learning parole or watch Timbuktu ’s covert image . Competitors Apple Remote Desktop ( , March 2005 ) and the clear - source VNC do not proffer built - in encryption . secondly , you may assign Timbuktu ’s access privileges to any drug user or group defined within OS X ’s directory services . That means your Timbuktu login can be the same as your Mac OS X username and watchword ; if a group of Macs authenticates against a rough-cut server , your login works on all machines . These lineament are interlace — you may practice OS ex authentication only in SSH sitting , and you may encrypt with SSH only if using OS ex certification .

The familiar New Connection dialog box now has a radio push labeled Registered User ( Secure ) , which lets you pioneer an encrypted session . Timbuktu ’s services behave normally with encryption enable ; the only visible difference of opinion is the word “ Secure ” ( in parenthesis ) in the session window ’s title bar .

SSH performance got a striking hike in version 8.1 , and 8.5 is even faster on speedy web . For instance , Encrypted Control or Observe sessions experience just as fast as unencrypted ace , while the Exchange file transferral serve is about as rapid with encryption enable as it is without ( depending on the data being transferred ) .

Timbuktu ’s authentication works only if SSH is in its default parole mode ; innovative SSH users who have shared keys still must embark their word to employ Timbuktu .

Privacy and access privileges

The latest Timbuktu features new ways to customize secrecy place setting and user access privileges . edition 8.0 added the ability to drive a registered user to ask for permission before access your computer , thereby ameliorating concerns about unsanctioned entree . With 8.5 , a Control user can lock away the computer ’s keyboard and clean the show , thereby preventing passersby from keep onscreen activity .

Version 8.5 also append a unexampled Help Desk musical mode , which allows the program to accept incoming Timbuktu connectedness as usual , but not pioneer forthcoming ones .

By nonpayment , Exchange service user are restrict to OS X ’s substance abuser permissions and can only study or write files they own . newly in 8.5 , Exchange ’s Access All Files feature lets you give specific user access to the entire single file system . Plus , Exchange ’s Go To shortcut now work out with the removed computing machine ’s single file system .

Reaching out

Timbuktu features Bonjour supporting ( available since edition 8.0 ) . A pane in the New Connection window displays a list of Bonjour - enable computers running SSH and Timbuktu . There ’s also a TCP Security preference that let you put a Mac in stealth mode , so it does n’t show up in other computers ’ browsing lists , via either Bonjour or the familiar Timbuktu Scanner . you’re able to even limit incoming connexion to SSH - fix sessions .

A few gracious addition in version 8.5 : you may now insure Netopia ’s vane site to see if computer software updates are useable ; if you access a Mac with multiple monitors , you may view both reminder inside a single windowpane ; and improve screen and mouse control make it easier to chatter on objects in the niche of the distant computer ’s display .

Throwback

Because of its long history , much of Timbuktu ’s user interface and sensibilities hail from Mac OS 9 and before — and they ’re beginning to look old-hat . Exchange ’s two - paneling user interface goes back to System 6 , and it does n’t allow more than one transfer mathematical operation at a time . Another problem : Exchange get down sessions at the Computer story , and lists the available saucer volumes ; this sentiment made sense as the background in Mac bone 9 , but when you authenticate as a Mac OS X user , you expect to start at that user ’s Home directory . In increase , Timbuktu ’s preference region is due for a visual renovation .

Macworld’s buying advice

Timbuktu Pro remains the gold measure for Macintosh distant ascendance . The remote install , encryption , and drug user hallmark features make this a must - have ascent for anyone using 7.0 or sooner . Version 8.5 ’s new permissions and security preferences are welcome accession .