Teleffect by Electric Arc
Version 1.0
User's Guide
This document describes Teleffect by Electric Arc. The software and documentation are provided to you in accordance with your license agreement.
For the latest information and downloads, please see our Home Page.
Welcome to Teleffect, a shared-desktop productivity tool by Electric Arc. This User's Guide is designed for users who are familiar with installing and removing software from their computer systems, and who have a basic understanding of the network configuration of their computers.
Teleffect allows you to share a single mouse and keyboard between
multiple computers. The Teleffect software must be installed and
configured on each computer where you want this sharing. The collection
of all these computers running Teleffect is known as the Teleffect
System (see Figure 1).
Figure 1 - A Teleffect System
Each computer in the Teleffect System plays a particular role. The
computer connected to the keyboard and mouse that you will primarily
use is the Teleffect Master computer. There is only one
Teleffect Master in the Teleffect System. The other computers in the
Teleffect System that receive their keyboard and mouse input from the
Teleffect Master computer are the Teleffect Slave computers.
There can be any number of Teleffect Slave computers in the Teleffect
System.
NOTE: The mouse and keyboard attached to Slave computers can still be used while Teleffect is in use.
Teleffect has the following minimum installation requirements per platform. In addition, each computer in the Teleffect system must be assigned a network resolvable hostname or a static IP address. If you are not sure if this is the case, contact your system administrator.
showprods -D 1 | grep -i patch
Teleffect will have runtime errors if this patch is not installed.
You must choose one machine to be the Teleffect Master. The choice of which computer to make the Master is mainly a matter of personal preference. Some factors that may help you choose one machine over another are:
Before you install, you must also setup your hardware.
You will need access to the mouse and keyboard of each of the Teleffect Slave machines during installation. After installation and configuration, you can move all but the Teleffect Master mouse and keyboard out of the way.
NOTE: The mouse and keyboard attached to Slave computers can still be used while Teleffect is in use.
You must install the Teleffect software on each computer that is participating as part of the Teleffect System. The software installation process is slightly different on each platform. Refer to the appropriate section below for details.
If you have a previous version of Teleffect installed, you must uninstall it and reboot before installing a newer version or reinstalling the same version. You can check if Teleffect is already installed by going to Start->Settings->Control Panel->Add/Remove Programs and looking for "Teleffect by Electric Arc" in the scrolling list. To uninstall Teleffect, select its entry in the list and click the Add/Remove button. The installer will prompt you to uninstall a previous version of Teleffect if it detects one on your system.
The installation process for Windows® uses a standard self-extracting executable program. Depending on how you received the Teleffect program, you can launch the Setup file in one of several ways:
In addition to installing the software on your system, the Setup program also configures Teleffect for use. Below is a step-by-step guide to navigating the installation and setup process on the Windows® platform. At any point you can cancel the installation process by clicking "Cancel". If you need to go back to a previous step, you can click the "Back" button.
This screen provides you with an overview of the installation process.
Press "Next" to continue.
Please read the entire license agreement as it contains important
information on your rights and responsibilities with respect to the use
of the Teleffect software. If you do not agree with the terms, please
click "I Don't Agree" to cancel installation. Click "I
Agree" to continue with the installation process.
If you are installing the software on the Teleffect Master, select the
"Yes" option and click "Next". If you are
installing the software on a Teleffect Slave, select the "No"
option. If you select "No", the text field will become
active. Type the network name or IP address of the Teleffect Master
computer into the text field, and click "Next".
Enter your Name and Company in the blanks provided.
If you are installing the Teleffect Master you will be prompted for a license unless you are installing Teleffect on a computer that has been pre-licensed by the manufacturer. If you are installing the Teleffect Master software and do not have a permanent license, you may select a one time 30-day free evaluation license. If you do have a permanent license, select the Permanent license option and enter your License in the blanks, using 6 characters per blank.
NOTES:
Choose the directory in which you want to install Teleffect. For most
configurations, the default should be sufficient. Click the
Browse… button if you want to use a file dialog to select a
different location, or enter the location in the text field provided.
Once you are satisfied with the installation directory, press
"Next".
If you have concerns about the security of your network, or if you use Teleffect over the Internet, you may want to enable Teleffect security for an extra level of privacy. If this feature is not of interest to you, choose the "No authentication or encryption" option and press "Next". If you desire more security, select the "Password based security" option. The two password text fields will be come active. Choose a password of at least 6 characters, preferably a mix of numbers, letters of mixed case, and symbols. Do not use your Windows ® password. You will not need to type this password during normal use of Teleffect, but you will need to enter this password when configuring each computer in the Teleffect System, so you may want to write it down and keep it in a safe place. Enter the password you have chosen in the "Password" field. Your keystrokes will be printed as "*" for privacy. Retype the password exactly in the "Retype Password" field and press "Next" to continue. Teleffect will not allow you to continue if you type a password of less than 6 characters, or if the passwords do not match.
If you are interested in the implementation details of security in
Teleffect, please read the Security section
of the User's Guide for further information.
This page allows you to select the number of computers that will be
participating in your Teleffect system. Choose the appropriate
configuration and press the "Next" button. If you have more
than three computers, or if your computers are not side-by-side, see
the Advanced Information section
for other configuraiton options.
You must enter the names of the computers participating in your
Teleffect System. If you have three computers in your System, there
will be a text field for the left, middle, and right computer names. If
you have two computers in your System, there will only be text fields
for the left and right computer names. At least one of the
computer names entered must be the name of the Teleffect Master,
and names can be entered in IP dot notation if your computers do not
have network names. Press "Next" to continue. Teleffect will
take a few moments to check that it knows how to contact all the
computers you listed before proceeding.
This page reviews your installation choices. Double check all the items
to ensure there are no errors. If you do discover an error in your
configuration, use the "Back" button to go to the appropriate
installation page and correct the problem. When all information is
correct, press the "Finish" button to install Teleffect.
You must reboot your machine to begin using Teleffect. You do not need to reboot immediately, but Teleffect will not function correctly until you reboot.
The IRIX® installation process follows standard Silicon Graphics® installation conventions. You must use the swmgr(1) (or inst(1)) tool to install the software. Depending on how you received the Teleffect inst images, you can launch swmgr in one of several ways.
Once in swmgr you need only press the "Install" button to install the software. If you would like to customize the installation, you can press the "Customize Install" button to select only particular pieces of the product for installation. We strongly recommend that you use the defaults unless you are very experienced with IRIX® software administration. After installation has completed, quit swmgr and proceed to the Configuration section of the User's Guide.
Once Teleffect has been installed, it must be configured before it can be used. On Windows®, configuration is handled as part of the installation process. On IRIX®, configuration must be done in a separate step. On both platforms, you may need to change the configuration during normal use of Teleffect for a variety of reasons, which may include:
The configuration panel allows you to change virtually any aspect of your Teleffect installation. The settings are grouped into pages that can be viewed by clicking on the tabs along the top of the configuration tool, or by clicking the "Back" and "Next" buttons along the bottom of the page, depending on platform. Below is a step by step guide to each of the configuration pages. When you are done making changes, you must click "Apply" or "Ok" to make the changes permanent. If you want to discard your changes, you may press the "Cancel" button to exit the configuration tool without affecting Teleffect.
Launch the configuration tool from the Toolchest->Desktop->Customize->Teleffect menu. You can also execute the configuration tool from the command line by running /usr/sbin/teleffect.
This page provides important copyright and legal information about the
Teleffect software, as well as acknowledgements to those who have made
this product possible.
This page allows you to enable or disable Teleffect on this system.
When you apply your changes and exit the configuration tool, Teleffect
will immediately be started or stopped to match the selected state.
If you are configuring the software on the Teleffect Master, select the "Yes" option.
If you are installing the software on a Teleffect Slave, select the
"No" option. The text field becomes active. Type the name of
the Teleffect Master computer into the text field.
If you have concerns about the security of your network, or if you use Teleffect over the Internet, you may want to enable Teleffect security for an extra level of privacy. If you do not wish to use security, choose the "No authentication or encryption" option. If you desire more security, select the "Password based security" option. The two password text fields will be come active. Choose a password of at least 6 characters, preferably a mix of numbers, letters of mixed case, and symbols. Do not use your IRIX® password. You will not need to type this password during normal use of Teleffect, but you will need to enter this password when configuring each computer in the Teleffect System, so you may want to write it down and keep it in a safe place. Enter the password you have chosen in the "Password" field. Your keystrokes will be printed as "*" for privacy. Retype the password exactly in the "Retype Password" field. Teleffect will not allow you to Apply your changes if you type a password of less than 6 characters, or if the passwords do not match. If you change any of your security settings, be sure to reconfigure each computer in the Teleffect System to match the new settings.
If you are interested in the implementation details of security in
Teleffect, please read the Security section
of the User's Guide for further information.
You may choose to enable or disable cut and paste between computers in
the Teleffect System by selecting the appropriate box. Disabling
Teleffect cut and paste will not affect cut and paste on individual
machines, but will prevent Teleffect from changing the cut buffer on
other machines in the Teleffect system when you place something on the
clipboard on one.
This page allows you to select the number of computers that will be
participating in your Teleffect system. Choose the configuration
appropriate for your situation. If you have more than three computers,
or if your computers are not side-by-side, see the Advanced Information section for
other configuraiton options.
You must enter the names of the computers participating in your
Teleffect System. If you have three computers in your System, there
will be a text field for the left, middle, and right computer names. If
you have two computers in your System, there will only be text fields
for the left and right computer names. At least one of the
computer names entered must be the name of the Teleffect Master,
and names can be entered in IP dot notation if your computers do not
have network names.
This page reviews your configuration choices. Double check all the items to ensure there are no errors. If you do discover an error in your configuration, use the "Back" button to go to the appropriate configuration page and correct the problem. When all information is correct, press the "Finish" button to install Teleffect.
Go to Start->Settings->Control Panel and double click on the Teleffect icon to bring up the configuration panel. You can also use the Teleffect icon in the icon tray of the Windows® taskbar to open the configuration panel by either double clicking on the icon or right clicking and selecting the "Settings…" menu entry.
If you are configuring the software on the Teleffect Master, select the "Yes" option. The checkbox will become active. You may choose to disable cut and paste between computers in the Teleffect System by unchecking the box. This will not affect cut and paste on individual machines, but will prevent Teleffect from changing the cut buffer on other machines in the Teleffect system when you place something on the clipboard on one. NOTE: If you change a computer from being a Slave to being a Master, you may need to enter a license. Check the User Info page of the Configuration Tool.
If you are installing the software on a Teleffect Slave, select the
"No" option. The text field becomes active. Type the name of
the Teleffect Master computer into the text field.
If you have concerns about the security of your network, or if you use Teleffect over the Internet, you may want to enable Teleffect security for an extra level of privacy. If you do not wish to use security, choose the "No authentication or encryption" option. If you desire more security, select the "Password based security" option. The two password text fields will be come active. Choose a password of at least 6 characters, preferably a mix of numbers, letters of mixed case, and symbols. Do not use your Windows® password. You will not need to type this password during normal use of Teleffect, but you will need to enter this password when configuring each computer in the Teleffect System, so you may want to write it down and keep it in a safe place. Enter the password you have chosen in the "Password" field. Your keystrokes will be printed as "*" for privacy. Retype the password exactly in the "Retype Password" field. Teleffect will not allow you to Apply your changes if you type a password of less than 6 characters, or if the passwords do not match. If you change any of your security settings, be sure to reconfigure each computer in the Teleffect System to match the new settings.
If you are interested in the implementation details of security in
Teleffect, please read the Security section
of the User's Guide for further information.
This page will be enabled only when you are configuring a Teleffect Master. You may use this page to adjust the spatial relationship between the computers in the Teleffect System.
If you have two computers total in your Teleffect System (i.e. one Teleffect Master and one Teleffect Slave), select the "Two computers side-by-side" option. The Left and Right text fields will appear and be enabled. Type the name of the computer whose monitor is on the left on your desktop in the "Left" text field, and the name of the computer whose monitor is on the right in the "Right" text field.
If you have three computers in your Teleffect System (i.e. one Teleffect Master and two Teleffect Slaves), select the "Three computers side-by-side" option. The Left, Middle, and Right text fields will appear and be enabled. Type the name of the computers whose monitors are on the left, middle, and right of your desktop into the text fields provided.
If you have more than three computers in your Teleffect System, or if
the monitors of your computers are not positioned side-by-side on your
desktop, select the "Other" option and refer to the Advanced Information section of this
User's Guide for information on editing the Teleffect map configuration
by hand.
Enter your Name and Company in the blanks provided.
If you are installing the Teleffect Master you will be prompted for a license unless you are installing Teleffect on a computer that has been pre-licensed by the manufacturer. If you are installing the Teleffect Master software and do not have a permanent license, you may select a one time 30-day free evaluation license. If you do have a permanent license, select the Permanent license option and enter your License in the blanks, using 6 characters per blank.
NOTES:
This page provides important copyright and legal information about the Teleffect software, as well as acknowledgements to those who have made this product possible.
Teleffect is a tool that provides a natural and transparent way to interact with multiple computers.
Teleffect should start automatically when you boot or log in to your system. If you wish to change this behavior, consult the Advanced Information section for information on how to change the startup behavior of the Teleffect service/daemon.
On startup, any temporary licensing information will be displayed, informing you of how many days are left until your license expires. If you have a permanent or pre-licensed system, no information will be displayed. When startup is complete, the pointer will jump to the center of the Teleffect Master computer's screen, and will disappear from the Teleffect Slave screens, as there is now effectively one pointer shared across all screens in the Teleffect System.
To move from one screen to another, move the pointer off the edge of the screen closest to the screen of the computer you want to go to. For example, if you have a computer named Mars to the left of a computer named Saturn, and the pointer is currently on Saturn's screen, you can move the pointer left off the edge of Saturn's screen and see it appear at the same horizontal position on the right edge of Mars' screen.
You cannot change screens when you have a key or button down. This allows you to easily use scrollbars that are very close to the edge of the screen without accidentally changing screens in the process.
Teleffect provides you with a single, shared text clipboard across all the computers in the Teleffect system. You place text onto the Teleffect clipboard using the same action you would to place text onto the normal system clipboard. This clears the text selection on all other computers in the Teleffect system, and makes the new contents of the clipboard available for pasting on each computer you change screens to. It is important to remember that Teleffect cut and paste operations conform to the UI conventions of each platform. Thus, on Windows®, you can use the Edit menu to cut/copy/paste, while on IRIX® you sweep select text to copy and use the middle mouse button to paste. For example, you may have received email containing an accounting number on your Windows® computer, Mars, that you need to enter into a special finance package on your IRIX® machine, Saturn. Rather than retype the number into the program on Saturn, possibly making mistakes, you can instead select the text on Mars and choose the Edit->Copy option in your mail program. Any text you had selected on Saturn will become unselected, as the shared Teleffect text clipboard contents have changed. Then you change screens to Saturn, and click the middle mouse button over the text field where you need to enter the account number into the finance program. The text will be pasted from the Teleffect clipboard into the field without error.
There have been many instances of hackers intercepting confidential information that has been transmitted across a corporate Intranet or the Internet because the sender did not take adequate security precautions. Teleffect is susceptible to such snooping attacks. For example, a hacker could monitor the network and watch for users entering a password on a Teleffect Slave machine. As the keystrokes are actually sent over the network from the Teleffect Master to the Teleffect Slave, the hacker could learn the password through careful observation. Teleffect contains an encryption option to reduce this threat. When encryption is enabled, all information between the Teleffect Master and Teleffect Slave is encrypted using the password you provide, so that a hacker without the password will only see unintelligible information being transmitted between the computers. Clearly, it is important to keep your password secret or a hacker might still be able to discover what you type.
Another potential security risk is that a hacker might somehow take control of your computer by impersonating the Teleffect Slave or Teleffect Master machine. The security option provided with Teleffect uses the password you provide to authenticate all network connections made between computers in the Teleffect System before sending or accepting any keyboard or pointer input.
The encryption algorithm used in Teleffect is 40-bit DES. The implementation is derived from the work of Peter Gutmann, Eric Young, and Colin Plumb in their implementation of the cryptlib2.0 library. The data packets sent between computers in the Teleffect System are relatively small, and thus are block chained so as to complicate any plaintext attack. The authentication protocol between computers is symmetric, in that each side requires the other to be authenticated before allowing communication to proceed. Authentication is achieved by the originator sending an 8000 bit random string to the peer. The peer must then encrypt the string using the shared secret key, and send the result back to the originator. The originator also encrypts the string and compares the result with that returned by the peer. If they match, the originator considers the peer has been authenticated. The shared secret password is never transmitted over the network, and is stored in an encrypted form on each machine.
If you would like to use Teleffect's security features, you can enable them from the Teleffect configuration tool.
This section is intended for users who have special configuration needs, and who are familiar with system administration tasks on Windows NT® and IRIX® platforms.
The Teleffect program runs as a background task on the computers in the Teleffect System. The mechanism for running background tasks is particular to each platform. On all platforms, you must have Administrator or root privileges to perform these tasks.
Teleffect is a Win32 Service, and can be controlled from Control Panel->Services. On installation, Teleffect is configured to startup automatically. If you want to control when Teleffect starts, you can change its startup option to be Manual or Disabled. You can also stop and start the Teleffect service directly from this control panel. NOTE: when you stop the Teleffect service, all mouse and keyboard sharing will immediately terminate on the computer, and can only be restarted using the Services Control Panel or by rebooting the machine. The local mouse and keyboard attached to the machine will continue to function normally.
Teleffect runs as a daemon called tfxd, and may be enabled/disabled using the chkconfig(1) program. By default tfxd is enabled. Teleffect may be started manually by running the command:
/etc/config/teleffect start
and may be stopped manually by running:
/etc/config/teleffect stop
Running the Telffect configuration program will automatically stop and start tfxd as needed.
The configuration program only allows for a Teleffect System in which there are two or three computers arranged side-by-side. These are the most common spatial relationships, and should satisfy most users. Internally, Teleffect stores each screen's position as an x,y coordinate on a cartesian grid, and thus Teleffect supports more general spatial relationships than those provided by the configuration tool.
Teleffect Master stores the screens' coordinates in a data structure called the map. The coordinates in the map are such that the x-coordinate increases to the right of the origin and the y-coordinate increases upward form the origin. Each screen occupies exactly one unit cell and a single cell can contain at most one screen. When the pointer moves off the edge of a screen, the Master consults the map to determine what cell containing an active screen is nearest to the cell containing the screen the pointer just left in the direction the pointer left that screen.
The map also provides for the concept of edge wrapping. If "horizontal wrapping" is enabled, the rightmost screen in a given row will also be treated as though it is left of the leftmost screen in that row. If "vertical wrapping" is enabled, the bottom screen in a given column will also be treated as though it is above the top screen in that column. For instance, if horizontal wrapping is enabled, a mouse motion that carries the pointer off the left-hand side of the leftmost screen will cause the mouse to enter the right-hand side of the rightmost screen on that row. If horizontal wrapping is disabled, the same motion would cause the pointer to remain on the left-hand side of the leftmost screen.
The map is stored in a different location and format on each platform.
On IRIX®, the map is stored in /etc/config/tfxd.map. The map file must begin with the following header:
#Teleffect Map 1.0
Each line which describes a screen begins with the keyword "screen" and has the following format:
screen <name> x y
In a screen declaration, name is the computer's name, it's dotted IP address in decimal, or "localhost", and x and y are its Cartesian coordinates.
Both horizontal and vertical wrapping are disabled by default. The "horizontalWrap" and "verticalWrap" options can be used to enable them. If a line begins with "horizontalWrap:", there should be exactly one other token on the line following the colon -- either "true" or "false". If a line begins with "verticalWrap:", there should be exactly one other token on the line following the colon -- either "true" or "false".
Example map file (/etc/config/tfxd.map) #Teleffect Map 1.0 horizontalWrap: true screen <localhost> 0 0 screen <mars> 1 0
On Windows®, the map is stored in the registry under the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\ElectricArcLLC\Teleffect\1.0\map
The map key contains subkeys for each screen. Each screen key contains DWORD values that describe its x and y Cartesian coordinates. The map key also contains a string value for the "version" (which must be "1.0"), and DWORD flags for "horizonalWrap" and "verticalWrap".
Example registry settings [HKEY_LOCAL_MACHINE\SOFTWARE\ElectricArcLLC\Teleffect\0.80\server\map] "horizontalWrap"=dword:00000001 "version"="1.0" "verticalWrap"=dword:00000000 [HKEY_LOCAL_MACHINE\SOFTWARE\ElectricArcLLC\Teleffect\0.80\server\map\localhost] "x"=dword:00000000 "y"=dword:00000000 [HKEY_LOCAL_MACHINE\SOFTWARE\ElectricArcLLC\Teleffect\0.80\server\map\mars] "x"=dword:00000001 "y"=dword:00000000
Teleffect logs important events to the system log file. On Windows®, the system log can be found at Start->Programs->Administrative Tools(Common)->Event Viewer. Teleffect logs both Application and System Events. On IRIX®, Teleffect logs to the syslog, which is usually located in /var/adm/SYSLOG.
On Windows®, Teleffect additionally provides short status information in the tool tip for the Teleffect icon in the Taskbar Icon tray. Position the pointer over the Teleffect icon for a few seconds to cause the tool tip to appear.
Please see the troubleshooting guide for help diagnosing problems.
Teleffect is copyrighted by Electric Arc LLC, and is protected by copyright law and international treaties. Unauthorized reproduction or distribution of Teleffect, or any portion of it, may result in severe civil and criminal penalties, and will be prosecuted to the maximum extent possible under the law. All rights are reserved.
The "Teleffect" name is a registered trademark with the US trademark office.