I successfully added my first remote computer to my host computer after some cliches. I installed the software on the host computer turning on unattended mode. Then I installed software on my first remote computer; tried to connect but the cliches started. I finally realized that unattended Use (on the Host) needed encryption turned on. Now I'm about to set up the second remote computer. My question: will I use the same encryption for the second remote? or do I have to regenerate a different encryption with the 2nd remote and Host? I guess what I'm asking..... Is different encryption established between remote-host pairs?