Features

Transferred data is encrypted with the secure encryption algorithms (RSA 2048 + AES 256). User Access Control (UAC) prompts can be controlled remotely and are no longer an obstacle.
Create users and set permissions for complete control over who accesses what. >> Piggyback on existing security system and use Windows users and groups for remote access. >>
IP filtering allows you to restrict access to only certain IP addresses. Disable all Internet-related features to use the program in a totally isolated environment.
Protect remote settings with a password against possible change by a user. >> Ask user permission option lets the remote user accept or reject incoming connection. >>
Notification panel allows the remote user to see who is being connected to their PC. >> Shared secret option provides the means of verifying identity of the remote Host. >>

Twitter Facebook Google Plus Linkedin Youtube