Your computer's files need to be accessed remotely across the Internet.
You are operating any sort of Internet server such as Personal
You want to properly and safely monitor your Internet
connection for intrusion
You use any sort of Internet-based remote
control or remote access program
such as PC Anywhere, Laplink, or Wingate.
You want to preemptively protect yourself from compromise by "inside the wall" Trojan horse