• Blog
  • Forum
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • Português do Brasil
    • Русский
    • 日本語

Remote Utilities Blog

LogMeIn® Central vs. Remote Utilities

Since LogMeIn® made changes to its LogMeIn Central pricing, we have been receiving a lot of inquires. Users want to know how Remote Utilities compares to LogMeIn Central, and if it’s a good replacement.

No two products are identical – every product on the market has its pros, cons and target audience. The purpose of this post is to give you an idea of what to expect from Remote Utilities.

Note, however, that this is not a complete comparison. We highly recommend sending us an email so that we can give you personalized answers to your specific questions.

Disclaimer: In no way do we imply the superiority of one product over the other. All information used in this post was gathered from public sources, namely the official websites of both products. Usoris Systems LLC, the manufacturer of Remote Utilities and the owner of this website and blog, does NOT guarantee that this information is complete or accurate and disclaims all responsibility for any direct, indirect, consequential or incidental damages arising out of the use or misuse of the information contained herein. If you find any mistakes in product descriptions or pricing please contact us at info@usoris.com .

The Basics

LogMeIn Central is currently available in three subscription plans – Basic, Plus and Premier. The number of available features grows from Basic to Premier. To put it very simply, Remote Utilities offers roughly the same features as the LogMeIn Central Plus plan.

Read more...

5 Things you Need to Know about Phone Support Scams

Hello and welcome! Today I’m going to write about phone support scams – phone calls from people who pretend to be representatives of big-name firms like Microsoft or Facebook. These calls originate from various countries, including the U.S., and there are things you should be aware of to avoid falling victim to scammers.



There are two main types of scam:

- Paid Technical Support. The caller attempts to persuade you to pay for “technical support” or “malware removal/cleanup” services that you do not need or even buy software that is available elsewhere for free. This type of scam does not necessarily include installing malware on your PC, but it may include installing remote access software for “analyzing and troubleshooting issues” that, according to scammers, your computer might have.

- Unauthorized remote access to your computer. When the caller tries to persuade you to install remote access software and grant them access credentials in an attempt to steal information, such as your credit card data, from your computer.

Read more...

Mobile update for iOS and Android

It has been a while since we updated our mobile version. During this time we have been accumulating your requests and implemented the most important features.

Here’s what’s new in the latest mobile client release:

1. Updated start screen. The new selector/menu allows you to not only choose a specific remote PC but also immediately access its connection properties.

Read more...

How to Use OpenPGP to Encrypt Your Email Messages and Files in the Cloud

This is a guest post by Henry Chow.

Putting up your sensitive data on cloud storage could possibly give you heebie-jeebies. A good dose of cryptography, however, is sufficient to provide you the much needed peace of mind. Implementation of open-source Pretty Good Privacy (OpenPGP) is considered as the gold standard of online encryption, and when used properly, it has the capability to even thwart the likes of NSA. Read along to find out more!


Popular encryption solutions like DiskCryptor and BitLocker do not have the potential to secure files or emails in the cloud. But the industrial strength of OpenPGP encryption can not only secure the delivery of files, but also provide verification about who create and send a message using the digital signing process.

Read more...

Importance of Network Support for Computer Network Security

This is a guest post by Ronnie Custer

The existence of any organization is definitely on the computer networks it holds. Today, not even a single organization could be found without computers in them. Each and every bit of work is done on computers. The man power is almost taken by computers now and one should be very careful about Network Support for Computer Network Security. Network Support in fact is the main thing in Computer Network Security.Monitoring, troubleshooting;fixing and helping the systems up and running everything is part of network security. At the same time, Computer Network Security is a field of computer science, which deals with securing an enterprise's infrastructure from bad guys such as hackers, malwares, virus etc.


In any organization, employees mainly do their work either with the use of their personal or official computers. Computers are inter-connected within computer networks and the security of the data needs to be taken care more into consideration. At the end protection of any bit of data is critically important in any organization. Even though thieves and hackers can be caught easily, a strong network support is obviously required to secure the safety of data and documents. Today there are countless network support services available in every country and choosing the best among them is always a difficulty work. One should choose the best and apt network service providers, based on the nature, need and requirement of business.

Read more...

Feel a new mobile experience by Google Cloud Platform

With more than a billion people crazy about tablets and smartphones, there's a growing demand and a huge opportunity for mobile solutions. Users currently have at their disposal hundreds of thousands of apps, and for mobile developers to succeed, it is vital to come up with engaging, compelling and connected user experiences. This requires a necessity for services or backed components to feed the app with pertinent data, consent to interactions between users, and offer push notifications.



By using the Google Cloud Platform one can easily create a backend for their mobile solutions. You could easily decide to start small and hope to eventually get many users or you may already benefit from a sturdy customer base that you'd like to serve via a brand new mobile experience. Either way, there are smart ways you can use to develop a backend that can live up to everyone's expectations and meet the demand. Leverage the Google infrastructure; focus on implementing your app's scenarios, and stop worrying about trivial things such as load balancing or managing machines. Classic demands for compelling mobile experiences consist of:

Read more...