Division : About security?
How can the PCANY-using computers be protected from hackers or other intruders?
First, PCANY uses strong encryption technology to transmit every information.
There are other ways to protect our customer's computers:

- End-to-end process of authentification by using challenge/response method.
- Use of authentification key: Each host computer can has its unique authentification key that distinctly identify it so that they can cope with the case when code and ID were leaked.
- Tray icon shows that host PC is being accessed.
- System managers can monitor every access and log off.

Also, Koino PCANY introduced NACS that KOINO developed as its own strong authentification system. Each time customer accesses the host computer, it requires each access to undergo three rounds of authentification and confirmation with central server. Therefore, PCANY homepage at http://pcany.net/ is only website from which you can access to your computer. It is impossible to access your computer from other methods.