Security Features
Top  Previous  Next

Remote Control PC is a high-security software. It has a large number of security features that restrict access to the program and protect the computer from an unauthorized remote access. The software uses the following program-defense algorithms:

Algorithm Length of Key (bit)
RC4 128
TwoFish 256
MD5    -

Some security features are listed below:

Secure authentication and traffic encryption.
All transferred data is encrypted with 128-bit RC4 key. CHAP algorithm is used for authentification.  

Account access protection.
Account Password enables you to log into your Account and view the list of your Account computers, change Account properties, etc.  

Host PC access protection
For protection of a computer with working Host Module you should set a unique Access Password. Access Password serves for 2 purposes:  

1.This password is used to protect computer with Host Module from unauthorized remote access. Remote Admin Module will request it at each connection to the Host Module. Therefore, only the person who knows this password will be able to connect to the Host PC remotely.  

2.Access Password also can be used to prevent any change in Host Module's Settings by novice users of Host PCs.  

These security features make the program usage absolutely safe.  

Allows an access to the Host Module only from specified IP addresses and subnets.

Windows NT security
Host Module can work in 2 modes: as the system service or as the simple application.
Service mode provides better protection of Host Module settings from unauthorized change on the Host PC, as administrator privileges will be required for changing them.  

Inhibition of Full Control
You can configure Host Module for 2 kinds of access:  
·"Full Control" mode. Person who knows Access Password can view Host's screen, control it, use File Transfer, restart or turn off Host PC remotely, etc.  
·"View only" mode. Person who knows Access Password can view Host's screen only without ability to interact with it. This mode can be useful for classrooms when students have to view teacher's screen (while showing of presentation) without an ability to control it.  

Security Features