Sugar Fish
Registered
Hello,
A friend of mine is going to be doing a lot of international traveling very shortly. I've recently backed up her laptop onto an external drive. I would like to arrange it so that she can access this drive when it is connected to my computer as though it were connected to her computer.
I have no trouble setting this up on a LAN by selecting "Connect to server" in my Finder's "Go" menu, but for computers that are in remote locations, I'm at a loss.
We are both using the latest release of Tiger, Mac OS X 10.4.11, and one or both of us will be using an Apple Airport or Airport Extreme wireless router.
I've downloaded Lobomoto's IPSecuritas program, which seems like it should be able to do the trick, but the user manual isn't particularly user-friendly.
Would somebody be able to point me to a step-by-step set of instructions for setting up a secure connection using the various software that came with Tiger, or with this IPSecuritas program, or with any relatively simple point-and-click program?
I would be ever so grateful.
Thank you for taking the time to consider my question.
A friend of mine is going to be doing a lot of international traveling very shortly. I've recently backed up her laptop onto an external drive. I would like to arrange it so that she can access this drive when it is connected to my computer as though it were connected to her computer.
I have no trouble setting this up on a LAN by selecting "Connect to server" in my Finder's "Go" menu, but for computers that are in remote locations, I'm at a loss.
We are both using the latest release of Tiger, Mac OS X 10.4.11, and one or both of us will be using an Apple Airport or Airport Extreme wireless router.
I've downloaded Lobomoto's IPSecuritas program, which seems like it should be able to do the trick, but the user manual isn't particularly user-friendly.
Would somebody be able to point me to a step-by-step set of instructions for setting up a secure connection using the various software that came with Tiger, or with this IPSecuritas program, or with any relatively simple point-and-click program?
I would be ever so grateful.
Thank you for taking the time to consider my question.