I presume one gains access to the device using a tunnelling protocol.
Not a member of The Register? Create a new account here.
Remember me on this computer? Post anonymously?