Security

Data encryption
Transferred data is encrypted with the secure encryption algorithms (RSA 2048 + AES 256).
UAC support
User Access Control (UAC) prompts can be controlled remotely and are no longer an obstacle.
Multiple users and permissions
Create users and set permissions for them. More...
Use Windows authorization
Piggyback on existing Windows accounts to log in on remote PCs using Remote Utilities. More...
IP filtering
Restrict access to only certain IP addresses — use white lists and black list to add IP addresses and ranges to block or allow. More...
Isolated mode
Disable all Internet-related features to use the program in a totally isolated environment. More...
Settings protection
Protect remote settings with a password against possible change by a user. More...
Ask user permission
Let the remote user decide whether to accept or reject a remote session request. More...
Notification panel
Inform a remote user about who is being connected to their PC at the moment and let them terminate the remote session if necessary. More...
Host identity check
The shared secret option provides the means of verifying identity of the remote Host. More...

© 2016 Usoris Systems LLC. Remote Utilities and Remote Utilities logo are either registered trademarks or trademarks of Usoris Systems LLC in the United States and/or other countries. All rights reserved.