본문으로 바로가기

컴퓨터리스트

Question   How are PCAny users protected from hackers and other intruders?
Category   Security
Posted By   Admin
Date Posted   2016-07-04
확인
Above all, PCAny transfers data using the highly secure encryption technology. Furthermore, there are several other ways we protect your valuable information:

-end-to-end encryption using challenge/response method
-authentication key can be applied to each host computer in addition to your ID and password to prevent leakage
-tray icon (taskbar) notifies that host computer is being remotely accessed
-system manager can oversee and manage all connection and disconnection

PCAny has utilized Koino's independently developed verification system called NACS, which requires a three-time verification from the central server per access. Thus access is only allowed through http://www.pcany.net from your computer.