We help IT Professionals succeed at work.
Get Started

When does an unsecured wireless connection become secure?

Last Modified: 2012-05-11
Using an UNSECURED wireless connection to take over a remote computer using gotomypc, logmein, VPN or any secured remote software, and then use THAT computer to remote into another computer over a secure or cabled connection, is the second connection secured at all or is it too open?

Here is an example:
PC1 is connected to internet via an unsecured wireless connection.
PC1 remotes into PC2 using logmein. (this is an AES256-SHA 256 bit encryption)
PC2 is then used to take over PC3 via logmein over a secured or cabled network connection. Again this connection is also AES256-SHA 256 bit encryption.

Is the data transmitted between PC2 & PC3 (being viewed and controlled by PC1) secure?  if passwords are exchanged between PC2 & PC3 are they able to be intercepted and viewed due to the unscured connection between PC1 and PC2?
Watch Question
System Administrator
Top Expert 2011
This problem has been solved!
Unlock 2 Answers and 13 Comments.
See Answers
Why Experts Exchange?

Experts Exchange always has the answer, or at the least points me in the correct direction! It is like having another employee that is extremely experienced.

Jim Murphy
Programmer at Smart IT Solutions

When asked, what has been your best career decision?

Deciding to stick with EE.

Mohamed Asif
Technical Department Head

Being involved with EE helped me to grow personally and professionally.

Carl Webster
CTP, Sr Infrastructure Consultant
Ask ANY Question

Connect with Certified Experts to gain insight and support on specific technology challenges including:

  • Troubleshooting
  • Research
  • Professional Opinions
Did You Know?

We've partnered with two important charities to provide clean water and computer science education to those who need it most. READ MORE