We recommend the following steps are used to secure PC with the Remote Desktop Control.
On the Host Module side:
If you want to protect a computer with Host Module from unauthorized access you should do it on the computer with Host Module at first. It doesn't matter how good Remote Desktop Control Host's security is if people can just walk up to the host and access the information.
|•||Physically restrict access to the PC if it contains important information.|
|•||Use a secure operating system such as Windows NT/2000/XP/2003/Vista and use its security to protect the computer locally.|
|•||Use IP Filtering to allow access to the Host Module only from specified IP addresses and subnets.|
|•||Use Access Password to prevent any change in the settings of Host Module.|
|•||Install Host Module as a system service if it runs under Windows NT/2000/XP/2003/Vista. In this case for changing Host Module's settings or uninstalling it, the administrator privileges will be needed.|
|•||Use Host Module's log-file for the determination who has connected and when.|
On the Admin Module side:
|•||Never leave Admin Module running on your PC if other persons work sometimes on your PC. Close the Admin Module after working with it, and it will be safer. Never save entered Access Passwords on Admin computer.|
It is advisable to set all passwords of at least 8 symbols.
It is recommended for the password to be a meaningless set of letters, numbers and punctuation symbols.