Blog

Tips: Enhancing Remote Utilities Security

In this blog post you will learn about optional security features that you can enable to add another layer of protection to your Remote Utilities installation.

Security

Remote Utilities default security settings are strong enough to satisfy even the strictest requirements. With its persistent end-to-end data transfer encryption and certificate-based Host and Server identity verification the program protects your remote transfer data from unauthorized access and warns you if your remote modules are tampered with. Besides, you must enable at least one authorization method and enter access credentials in order to log in (authorize) on a remote Host.

But what about other security features which are not enabled by default? Further reinforcing your already strong and impregnable fortress will never hurt after all. Continue reading below to learn how to turn on additional layers of protection.

Read more...

Version 6.9: PIN-code + Rerun Agent as

Remote Utilities 6.9 Beta 2 has been released. We added PIN-code protection for Internet-ID connection when used with the self-hosted server, the ability to remotely restart the Agent as administrator and a few other features and bugfixes. See this post for details.

PIN-code protection for Internet-ID

This is related to your use of the self-hosted server for Internet-ID connection.

Problem

Previously, anyone who knew your server address and port could use your server to broker an Internet-ID connection for their own Viewer and Host the same way you did for yours. This could result in unidentifiable Hosts hanging in the "Idle" and "Active" tabs in the server Admin Console. While not a security vulnerability per se, it was still an annoyance.

Admin console

Read more...

Local address book encryption

This blog post gives some details about how address books work in Remote Utilities and introduces local address book encryption that became available in version 6.5.

Unlike many web-based tools Remote Utilities is stand-alone software that always stores its address book on the local disc. This also applies to synchronized address books - in this case the local copy is in sync with a remote address book.

Default address book

Address books are stored as .xml files with each book in its separate .xml file. When you first install the Viewer it automatically creates your first address book called “General address book” that you can populate with folders and records (connections):

The General address book is your default book. Its corresponding .xml file is stored in the current user’s %APPDATA% folder under the name connections_4.xml:

Read more...

5 Things you Need to Know about Phone Support Scams

Hello and welcome! Today I’m going to write about phone support scams – phone calls from people who pretend to be representatives of big-name firms like Microsoft or Facebook. These calls originate from various countries, including the U.S., and there are things you should be aware of to avoid falling victim to scammers.

There are two main types of scam:

- Paid Technical Support. The caller attempts to persuade you to pay for “technical support” or “malware removal/cleanup” services that you do not need or even buy software that is available elsewhere for free. This type of scam does not necessarily include installing malware on your PC, but it may include installing remote access software for “analyzing and troubleshooting issues” that, according to scammers, your computer might have.

- Unauthorized remote access to your computer. When the caller tries to persuade you to install remote access software and grant them access credentials in an attempt to steal information, such as your credit card data, from your computer.

Read more...

How to Use OpenPGP to Encrypt Your Email Messages and Files in the Cloud

This is a guest post by Henry Chow.

Putting up your sensitive data on cloud storage could possibly give you heebie-jeebies. A good dose of cryptography, however, is sufficient to provide you the much needed peace of mind. Implementation of open-source Pretty Good Privacy (OpenPGP) is considered as the gold standard of online encryption, and when used properly, it has the capability to even thwart the likes of NSA. Read along to find out more!

Popular encryption solutions like DiskCryptor and BitLocker do not have the potential to secure files or emails in the cloud. But the industrial strength of OpenPGP encryption can not only secure the delivery of files, but also provide verification about who create and send a message using the digital signing process.

Read more...

Importance of Network Support for Computer Network Security

This is a guest post by Ronnie Custer

The existence of any organization is definitely on the computer networks it holds. Today, not even a single organization could be found without computers in them. Each and every bit of work is done on computers. The man power is almost taken by computers now and one should be very careful about Network Support for Computer Network Security. Network Support in fact is the main thing in Computer Network Security.Monitoring, troubleshooting;fixing and helping the systems up and running everything is part of network security. At the same time, Computer Network Security is a field of computer science, which deals with securing an enterprise's infrastructure from bad guys such as hackers, malwares, virus etc.

In any organization, employees mainly do their work either with the use of their personal or official computers. Computers are inter-connected within computer networks and the security of the data needs to be taken care more into consideration. At the end protection of any bit of data is critically important in any organization. Even though thieves and hackers can be caught easily, a strong network support is obviously required to secure the safety of data and documents. Today there are countless network support services available in every country and choosing the best among them is always a difficulty work. One should choose the best and apt network service providers, based on the nature, need and requirement of business.

Read more...

This website uses cookies to improve user experience. By using this website you agree to our Terms of Service and Privacy Policy.