• Ben Bailey
    0
    I successfully added my first remote computer to my host computer after some cliches. I installed the software on the host computer turning on unattended mode. Then I installed software on my first remote computer; tried to connect but the cliches started. I finally realized that unattended Use (on the Host) needed encryption turned on. Now I'm about to set up the second remote computer. My question: will I use the same encryption for the second remote? or do I have to regenerate a different encryption with the 2nd remote and Host? I guess what I'm asking..... Is different encryption established between remote-host pairs?
  • Sergey N
    21
    Hello Ben,

    Answered this question in this thread, let me know if you have any other questions.
bold
italic
underline
strike
code
quote
ulist
image
url
mention
reveal
youtube
tweet
Add a Comment