Tired of repeating the same task again and again? With “Broadcast Input to All Terminal Sessions” for Royal TSX, you can enter your data once and apply it to multiple Terminal Sessions instantly. That means less manual work, more time saved, and a smoother workflow!
Did you know that you can copy your connection’s configuration to the Default Settings with just one click?
With “Copy to Default Settings” you can easily overwrite your Default Settings of the corresponding Connection Type!
Work faster with our AutoFill for Web Pages using TOTP MFA Code Generator in Royal TS (Win)
Read full instructions here: https://www.royalapps.com/go/kb-all-web-autofill
Need some more screen real estate? Optimize your workspace with the Compact User Interface Mode in Royal TS V7
No matching host key type found? Don’t worry! Here’s how to adjust your SSH configuration in Royal TSX!
Between reinvented remote management and new ideas, it’s worth pausing to reflect on our journey. Did you know Royal Apps has been around this long?
NoMachine is a solution for Linux that allows one to take over an existing desktop session while preventing the computer from being unlocked locally at the same time. In fact, it unlocks the computer, but blanks the screen and disables input. I think UltraVNC had similar options over 15 years ago, but only for Windows.
In principle, it should be possible to replicate this behaviour for any remote desktop tool (?).
HiDPI in #GNOME is a great way to easily spot interesting performance issues.
I tried out #GNOMEConnections to #RDP to a laptop that has a 4K display, and discovered that it's extremely slow compared to #Remmina connecting to that same machine:
* High CPU usage when the window is focused and idle (no mouse cursors moving, no animations)
* The client-moved cursor lags on the remote host
* Moving windows lags a lot
Reported as:
* https://gitlab.gnome.org/GNOME/gnome-connections/-/issues/191
* https://gitlab.gnome.org/GNOME/gnome-connections/-/issues/192
30,000+ IPs hit Microsoft Remote Desktop on Aug 24, a significant escalation from our original reporting of nearly 2,000 IPs on August 21. Full analysis: https://www.greynoise.io/blog/surge-malicious-ips-probe-microsoft-remote-desktop
#ThreatIntel #RDP #Cybersecurity #IncidentResponse #GreyNoise #SOC #VulnerabilityManagement #microsoftrdpserver
Surge in coordinated scans targets #Microsoft #RDP auth servers
On August 21, GreyNoise observed nearly 2,000 malicious IPs probing Microsoft Remote Desktop (RDP) services in a single day — a sharp deviation from baseline activity. Full blog: https://www.greynoise.io/blog/surge-malicious-ips-probe-microsoft-remote-desktop
It’s #QuickTipMonday Did you know that we've implemented a button that allows you to apply inheritance for Credentials, Tasks and Gateways on folder objects? Simply click on “Apply Inheritance”!