컴퓨터리스트
- 5 Most Frequently Asked Questions:
| Question | How are PCAny users protected from hackers and other intruders? | ||||||
| Category | Security | ||||||
| Posted By | Admin | ||||||
| Date Posted | 2016-07-04 | ||||||
| 확인 | |||||||
| Above all, PCAny transfers data using the highly secure encryption technology. Furthermore, there are several other ways we protect your valuable information: -end-to-end encryption using challenge/response method -authentication key can be applied to each host computer in addition to your ID and password to prevent leakage -tray icon (taskbar) notifies that host computer is being remotely accessed -system manager can oversee and manage all connection and disconnection PCAny has utilized Koino's independently developed verification system called NACS, which requires a three-time verification from the central server per access. Thus access is only allowed through http://www.pcany.net from your computer. |
|||||||
