<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<atom:link href="https://www.remoteutilities.com/about/blog2/rss/rss2/" rel="self" type="application/rss+xml" />
<title>Blog</title>
<link>http://www.remoteutilities.com</link>
<description></description>
<language>en</language>
	<docs>http://backend.userland.com/rss2</docs>
<lastBuildDate>Tue, 18 Aug 2020 08:31:25 -0400</lastBuildDate>
<ttl>60</ttl>
<item>
	<title>Remote Utilities for remote work and telecommuting</title>
	<link>https://www.remoteutilities.com/about/blog/Remote_Utilities/remote-work-telecommuting/</link>
	<guid>https://www.remoteutilities.com/about/blog/Remote_Utilities/remote-work-telecommuting/</guid>
	<description>
	<![CDATA[
	<p><em>With the coronavirus rapidly changing the working habits throughout the world more and more businesses ask their employees to work from home to stop the spread of coronavirus. Read below how Remote Utilities can help organizations cope with new challenges.</em></p>

<img src="/images/blog/coronavirus.jpg" alt="Coronavirus Remote Work" />

<p>Now that the COVID-19 outbreak has officially <a href="http://www.euro.who.int/en/health-topics/health-emergencies/coronavirus-covid-19/news/news/2020/3/who-announces-covid-19-outbreak-a-pandemic">reached the pandemic status</a> companies like Google and Twitter – as well as thousands of smaller businesses - tell their staff to work from home. This seems to be a wise strategy given how dangerous and highly contagious the new virus can be.</p>


	]]>
	</description>
				<pubDate>Fri, 20 Mar 2020 00:00:00 -0400</pubDate>
</item>
<item>
	<title>Viewer for Mac and Linux Beta has been released</title>
	<link>https://www.remoteutilities.com/about/blog/Remote_Utilities/viewer-for-mac-linux/</link>
	<guid>https://www.remoteutilities.com/about/blog/Remote_Utilities/viewer-for-mac-linux/</guid>
	<description>
	<![CDATA[
	<p>We are happy to announce our first ever Remote Utilities Viewer for Mac and Linux. This is a native client for these operating systems. The program doesn't require installing any additional frameworks.</p>

<img src="/images/blog/viewer-for-mac.png" alt="Viewer for Mac" />

<p>Viewer for Mac/Linux is available for beta testing (download for <a href="/download/mac.php">Mac</a> or <a href="/download/linux.php">Linux</a>) at no cost. Beta 1 has a limited feature set — more features are going to be added in subsequent beta releases (Beta 2, Beta 3 etc.) and the final release.</p>

<p>This blog post is an overview of Beta 1 with information on how to get started with the program. We will use Viewer for Mac as an example — everything written below also applies to Viewer for Linux.</p>
 
 	]]>
	</description>
				<pubDate>Thu, 12 Dec 2019 15:39:00 -0500</pubDate>
</item>
<item>
	<title>Tips: Enhancing Remote Utilities Security</title>
	<link>https://www.remoteutilities.com/about/blog/Remote_Utilities/enhancing-ru-security/</link>
	<guid>https://www.remoteutilities.com/about/blog/Remote_Utilities/enhancing-ru-security/</guid>
	<description>
	<![CDATA[
	<p><em>In this blog post you will learn about optional security features that you can enable to add another layer of protection to your Remote Utilities installation.</em></p>

<img src="/images/blog/cyber-security.jpg" alt="Security" />

<p>Remote Utilities default security settings are strong enough to satisfy even the strictest requirements. With its persistent <strong>end-to-end data transfer encryption</strong> and certificate-based <abbr>Host</abbr> and <abbr>Server</abbr> <strong>identity verification</strong> the program protects your remote transfer data from unauthorized access and warns you if your remote modules are tampered with. Besides, you must enable at least one <strong>authorization method</strong> and enter access credentials in order to <a href="/support/docs/logon-and-logoff/">log in</a> (authorize) on a remote Host. </p>

<p>But what about other security features which are not enabled by default? Further reinforcing your already strong and impregnable fortress will never hurt after all. Continue reading below to learn how to turn on additional layers of protection. </p>
	]]>
	</description>
				<pubDate>Tue, 28 May 2019 15:39:49 -0400</pubDate>
</item>
<item>
	<title>Version 6.10: Custom SMTP settings</title>
	<link>https://www.remoteutilities.com/about/blog/Remote_Utilities/version-6.10/</link>
	<guid>https://www.remoteutilities.com/about/blog/Remote_Utilities/version-6.10/</guid>
	<description>
	<![CDATA[
	<p><em>We are happy to announce the release of version 6.10. This version has some major changes to how sending emails is configured in the MSI Configurator. For the complete list of changes please refer to the <a href="/product/release-notes.php">release notes</a> page.</em></p>

<p>Starting version 6.10 you can specify your SMTP server settings in the <abbr>MSI Configurator</abbr> and therefore use your own email account for sending Internet-ID notification emails to yourself. You may use any type of SMTP server, e.g. a free account such as Gmail or a corporate email account.</p> 

<img src="/images/blog/smtp-config.png" alt="SMTP configuration" />

<div class="alert alert-warning">
<p><span class="glyphicon glyphicon-hand-up"></span> <strong>Important</strong></p>

<p>The new SMTP settings feature will replace the old “Send via email” feature that used our company's mailing server.</p>
</div>
<p>With the new feature you can edit the message template. For example, you can translate it to your native language or otherwise alter the message. Just don’t forget to include the necessary variables (marked “%”) in the message.</p> 


	]]>
	</description>
				<pubDate>Tue, 25 Dec 2018 05:51:00 -0500</pubDate>
</item>
<item>
	<title>Version 6.9: Final release</title>
	<link>https://www.remoteutilities.com/about/blog/Remote_Utilities/6.9-final/</link>
	<guid>https://www.remoteutilities.com/about/blog/Remote_Utilities/6.9-final/</guid>
	<description>
	<![CDATA[
	<p><em>We are happy to announce the final release of Remote Utilities 6.9. You can download version 6.9.4.0 from our <a href="/download/">download page</a>. For update instructions please visit <a href="/support/docs/updating-remote-utilities/">Updating Remote Utilities</a>.</em></p>

<p>This has been a massive release in terms of <strong>encryption and authorization</strong>. We implemented a more modern TLS 1.2 encryption algorithm which is the today's de facto standard for advanced remote access software. The authorization system has also been significantly improved — now you can <a href="/about/blog/Remote_Utilities/6.9-host-auth/">enable several authorization methods</a> on the Host and use them side by side.</p>

<img src="/images/blog/host-settings-authorization.png" alt="New authorization system" />

<p>Another major improvement is <strong>2-step verification</strong> (2FA, or "2 factor authentication"). This verification acts as an additional layer of protection against unauthorized access to your <abbr>Hosts</abbr>. With the 2-step verification enabled — you can use a smartphone app such as Google Authenticator to view the 2FA code — no one can get access to your Host even if they guess the password.</p>

	]]>
	</description>
				<pubDate>Sat, 20 Oct 2018 05:51:00 -0400</pubDate>
</item>
<item>
	<title>Version 6.9: PIN-code + Rerun Agent as</title>
	<link>https://www.remoteutilities.com/about/blog/Remote_Utilities/6.9-beta-2/</link>
	<guid>https://www.remoteutilities.com/about/blog/Remote_Utilities/6.9-beta-2/</guid>
	<description>
	<![CDATA[
	<p><em>Remote Utilities 6.9 Beta 2 has been released. We added PIN-code protection for <abbr>Internet-ID</abbr> connection when used with the self-hosted server, the ability to remotely restart the <abbr>Agent</abbr> as administrator and a few other features and bugfixes. See this post for details.</em></p>

<h2>PIN-code protection for Internet-ID</h2>

<p>This is related to your use of the <abbr>self-hosted server</abbr> for <abbr>Internet-ID connection</abbr>.</p>

<h3>Problem</h3>

<p>Previously, anyone who knew your server address and port could use your server to broker an Internet-ID connection for their own Viewer and Host the same way you did for yours. This could result in unidentifiable Hosts hanging in the "Idle" and "Active" tabs in the server <a href="/support/docs/ac-main-window/">Admin Console</a>. While not a security vulnerability per se, it was still an annoyance.</p> 

<img src="/images/help/ac-idle-tab.png" alt="Admin console" />

	]]>
	</description>
				<pubDate>Mon, 24 Sep 2018 05:51:00 -0400</pubDate>
</item>
</channel>
</rss>
