Skip to content

Security

  • Two-Step Verification

    Two-step verification adds an extra one-time code from email, Telegram, or an authenticator app, significantly increasing your account’s security. This article explains how to enable the feature and set up your preferred verification method.

  • Black Screen Mode

    Protecting privacy during a remote access session is often crucial—especially when the remote computer is located in a public space or an open-plan office. The black screen feature lets you hide all activity on the remote computer so no one nearby can see what you’re doing.

  • Remote Access Logging

    Logging in remote access processes is essential for transparency and security. It records all user actions, which helps investigate incidents and prevent misuse. In addition, logs allow administrators to ensure compliance with internal policies, company standards, and regulatory requirements.