Abstract:
A computer may be capable of communicating with devices via network through multiple interfaces. When a new connection is to be established, the computer may select an interface to use for the connection. In some embodiments, the interface may be selected based on historical connection information representing the performance of previous network connections that the computer has established through the interfaces.
Abstract:
A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall. The client computer attempts communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall and operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through an outside network, and therefore should operate with more restrictive security or settings of other parameters more appropriate for use in that network location. The described approach operates even if the remote client computer has a direct connection to the network that enables it to authenticate with a domain controller.
Abstract:
A computer may be capable of communicating with devices via network through multiple interfaces. When a new connection is to be established, the computer may select an interface to use for the connection. In some embodiments, the interface may be selected based on historical connection information representing the performance of previous network connections that the computer has established through the interfaces.
Abstract:
A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall. The client computer attempts communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall and operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through an outside network, and therefore should operate with more restrictive security or settings of other parameters more appropriate for use in that network location. The described approach operates even if the remote client computer has a direct connection to the network that enables it to authenticate with a domain controller.