Remote Utilities 6.9.4.0

Version 6.9 : Latest Version

Remote Utilities 6.9. You can download version 6.9.4.0 from our download page. Visit Update Remote Utilities for update instructions. This has become a major release in terms of encryption and authorization. We apply the more modern TLS 1.2 encryption algorithm, which is the actual standard for advanced remote access software. The authorization system has also been significantly upgraded - now you can enable several Host authorization methods and use them side by side.

Other significant improvements are 2-stage verification (2FA or "2-factor validation"). This authentication acts as an additional layer of protection against unauthorized access to your Host. With 2-step verification enabled - you can use smartphone applications like Google Authenticator to see 2FA codes - no one can access your Host even if they guess your password

We've also added a new Host ID check mechanism that replaces the previously used "shared secret" option. Exchange of certificates between Viewer and Host occurs automatically in the background when you connect to a specific Host for the first time. If the Viewer detects that the Main certificate has changed since your last connection, a warning message will be displayed. You can then make decisions based on whether you want to continue your remote session.

On the RU Server, we add PIN code protection that allows you to protect yourself from the use of invalid migration servers for other people's remote sessions. To enable the PIN on the server, you must specify the same PIN in the Host settings and (optionally) the connection property of the Viewer. On the Viewer side, there are improvements to the connection feature. A new "Authorization" tab has been added to reflect changes to the host authorization system. On the Authorization tab, you specify which authorization method to use to enter the Remote Host. 

The default option ("Auto") works for most users, but you can always select specific authorization methods from the drop-down list. In Control and Display mode, we have added Agent Restart as a command. Using this command, you can restart Remote Agent with administrative rights (if you know the administrative credentials for remote computers) and control the UAC prompt window as it is on the Host computer.

The "Security" tab has also been updated. Now, the information stored for the security of one password and the security of the Remote Utilities can be stored separately in the connection properties. Finally, there is a new "Logout when logging out" option, which you can enable in the "Additional features" tab. With this option enabled, you exit each time you turn off the Control and Display mode, or when the session ends.

How does Remote Utilities work?

Remote Utilities communicates by pairing the host computer and the client computer. The host installs the Host software, and the client installs the Viewer program. Where "Host" means a computer that needs rejuvenation, the "Viewer" is the computer that performs the removal of the inside - the computer must control the others. There are two host software versions: Programs that are called "Host" on the download page of the regular installer, on the computer, and programs that make it easy to connect quickly to the working host without installing "Programs" on the Download page. 

When the host software starts up, the first thing you need to do is to set a password. This is an important step to protect your computer against unauthorized access. This password will be used by the Viewer to access the host computer. The host must then open the settings for the Host program and access the Internet ID connection settings option to generate a 9-digit code that can be used by the Viewer software to access the host.

Download Remote Utilities Host and Viewer :
Download Host
Free Driver
Download Viewer
Free Driver

The client PC on which the Viewer is installed can now create a new connection using the Internet ID and password configured on the host computer. Viewer programs such as the host software can also be run as downloadable and portable programs. At this point, when the connection is established, the client may start to start the device remotely against the host.

My Remarks About Remote Utilities

There are great tools in Remote Utilities that really work hard to compare with remote desktop software. The host software is a bit confusing when you try to set security options, but when you learn everything and the Viewer software can establish a connection, the tool is perfect. You can choose to display the remote screen only in viewing mode or in full control; this is very useful when you provide remote support but want to monitor what the user does and doesn't interfere. Then just a few clicks to change the mode when you are in a remote session.

I love the file transfer feature in Remote Utilities because it doesn't want the host to approve it. You can open the file transfer tool from the Viewer, transfer files from a computer and a computer, and never see a remote screen. This will certainly speed up when you want to access the files, not just when you want to access them remotely. There is also a remote Command Prompt, which appears to be normal, but runs commands against the host, not the client, which is a very clean feature to try.

I also love the Inventory manager, which shows amazing details about the host number, and the host operating system, hardware, and software supplied with the manufacturer's name. When I tried the Mobile Viewer application, I was able to connect seamlessly and I could see several monitors at once, which was fantastic.

Incoming search terms :

Discussion: