I successfully added my first remote computer to my host computer after some cliches. I installed the software on the host computer turning on unattended mode. Then I installed software on my first remote computer; tried to connect but the cliches started. I finally realized that unattended Use (on the Host) needed encryption turned on. Now I’m about to set up the second remote computer. My question: will I use the same encryption for the second remote? or do I have to regenerate a different encryption with the 2nd remote and Host? I guess what I’m asking… Is different encryption established between remote-host pairs?
[reply=“Ben Bailey;d1111”] Hello Ben,
Answered this question in this thread, let me know if you have any other questions.