Hello,
Thank you for your message.
Please note that Remote Utilities does not offer a stealth mode - a persistent Host icon is always visible in the system tray. In addition, starting version 7 of Remote Utilities, we've implemented a persistent banner near the system tray that notifies a user that their machine is being accessed remotely. This banner is shown for all free and trial mode users and cannot be hidden or moved around. In addition, please note that Internet-ID feature in version 6 was discontinued for all free users. For more information please also see
this announcement on our forum. This is to assure you that we're doing our best to improve our software with each update and eliminate any opportunity to use our software for illegitimate purposes as well ensure that the remote user is always aware that our software is running or was installed.
In case if someone makes rogue software from legitimate software by patching it or putting it in a wrapper - either way is in itself illegal and violates our
EULA. We bear no responsibility for the consequences of such abuse of our program, and that is clearly stated in our EULA.
As per your other questions:
1. You can find
Host installation/connection log files that can provide information on when Host was installed and when it was accessed.
2. You can find information on ports used by Remote Utilities on
this page.
3. Here's also a
guide on how to uninstall Host/Agent from your system.
Last but not least, if you believe that someone got unauthorized access to your computer, please try contacting your nearest
police department and letting them know about the case so that they can investigate this further. We can provide our server logs that contain the originating IP address which is stored on our servers (i.e. the information that might help to identify whoever got the access to your computer). However, please note that the logs can be only provided if there's a
direct request from the police. Here is an excerpt from our
Privacy Policy:
Government and law enforcement agencies
We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.
This is strictly within the law and international treaties and also conforms to our privacy policy. Please feel free to provide our contact information
[email protected] to the police as well - we will be happy to provide our assistance to the investigation if it's needed.
Hope that helps.