Here are frequently asked questions about RemotePC, its features and remote access.
Yes, RemotePC offers secure and optimized solutions for accessing remote computers. RemotePC uses TLS v 1.2/AES-256 encryption for transferring user authentication data between remote computer and local computer. Personal Key, a unique password set for each computer, acts as an extra layer of protection.
Yes, RemotePC allows you to share your computer over any kind of Internet/LAN connection and even any firewall/proxy server.
Your computer can only be accessed if you share your RemotePC Access ID and the associated random key with another person. Without knowing the Access ID and key, it is not possible to access your computer. Do not share these credentials with a person you do not trust.
To completely prevent any access, disable the Instant Access option by clicking 'Disable Instant Access'.
Personal Key acts as a secondary password to access each computer. It is a password set by you and acts as your computer's unique access code. It is stored only on your computer and not on the RemotePC servers. Whenever you try to access any remote computer, you will be prompted to enter the personal key.
RemotePC uses TLS v 1.2/AES-256 encryption for securing data transfers between local and remote computers during remote sessions.
Yes. RemotePC uses TLS v 1.2/AES-256 encryption on data transmission during remote access.
We will never call you asking for login information, requesting payment or any other such information. If you receive a call of this nature, it is probably a phishing attempt. During such a scenario, do not share any information, and immediately contact us at firstname.lastname@example.org for quick assistance.
Yes, it may be a possibility that your ISP is blocking RemotePC and other remote access services. TalkTalk, based in the UK is one such ISP. Situations like these can be resolved by changing the router settings to use primary and secondary servers other than those of TalkTalk. For example, you can use Google's Public DNS IP addresses like 126.96.36.199.
The two-step verification process enhances the security of your account and prevents access by unauthorized parties. Once two-step verification is enabled, in addition to your password, you will need to enter a verification code sent to your registered email address or phone number, while logging in to RemotePC.
To enable two-step verification,
- Log in to RemotePC via web browser and click your username at the top-right of the screen.
- Select 'My Account' and navigate to the 'Security' tab.
- In the 'Two-step Verification' section, click 'Enable'.
- Select 'Email Address' or 'Phone Number' as your preferred method of receiving the one-time verification code and click 'Confirm'. If you have chosen 'Phone Number', enter the same and click 'Send Code'.
- Enter the verification code sent to your registered email address or phone number and click 'Verify & Enable'.
To login after two-step verification is enabled,
- On the login screen, enter your username and password and click 'Login'.
- You will be prompted to enter a verification code sent to your email address or phone number.
- Enter the code and click 'Verify'.
Trusted devices provide an additional level of security for your RemotePC account. Each time you login to your account from a new device, you are required to authorize it as a Trusted Device. You can thus prevent any unwanted access to your account.
Once you log in to your RemotePC account via a new device for the first time, you will be prompted with the following message:
A device authorization email will be sent to your registered email address. Click the 'Add to trusted devices' button in this email to add the device to the Trusted Devices list. A confirmation message will appear, informing the same.
You can view the list of all your linked devices in the 'Security' tab of your 'My Account' section.
In operation, two-factor verification and trusted devices security features are mutually exclusive. Therefore, at a given time, you can enable either two-step verification or trusted devices and not both.
If you attempt to enable two-step verification while trusted devices is enabled, a pop-up disclaimer will inform you that trusted devices will be automatically disabled and vice versa.
Yes, you can enable two-step verification or trusted devices for new and existing users.
While adding a new user, you can select either the 'Enable trusted devices' or 'Enable two-step verification' checkbox in the 'Add User' screen.
For existing users:
You can open the 'Edit User' screen by clicking displayed against an existing user, and then select the 'Enable trusted devices' or 'Enable two-step verification' checkbox.
If two-step verification is enabled:
On login your users will be asked to choose a method (Email or SMS) for receiving the one-time code. Once they verify their email address or phone number via OTP the configuration process will be complete.
During all subsequent logins, users will need to enter the code sent to their registered email address or phone number. To change the method of receiving OTP, users can go to 'My Account' > 'Security' > 'Two-step Verification' and update the preferences from email address to phone number and vice versa.
Your users will be prompted to authorize every new device at login. They will need to click the 'Add to trusted devices' button in the device authorization mailer they receive.
During two-step verification, if you are unable to receive the SMS containing the OTP, you can choose to receive the verification code via email address. Click 'Receive verification code via email address' in the two-step verification page. A code will be sent to the registered email address, you can enter the code and complete the verification process.