|
Organize your data into menus for quick, easy access. Store passwords, notes, bookmarks, contacts, email,
events, and shortcuts to files, folders, and apps. Save GPS points from your phone. Import/Export contacts.
Create simple, searchable databases to keep track of inventory or other records.
Data Management Tools
|
Organize your data into menus for quick, easy access. Store passwords, notes, bookmarks, contacts, email,
events, and shortcuts to files, folders, and apps. Save GPS points from your phone. Import/Export contacts.
Create simple, searchable databases to keep track of inventory or other records.
Data Management Tools
|
|
|
|
|
Use commands to control your PC. Create buttons to quickly open folders, music, apps,
or websites. Record what you do and repeat it on-demand using Macros. Schedule tasks,
record your screen, even control your PC using text messages.
PC Automation Tools
|
Use commands to control your PC. Create buttons to quickly open folders, music, apps,
or websites. Record what you do and repeat it on-demand using Macros. Schedule tasks,
record your screen, even control your PC using text messages.
PC Automation Tools
|
|
|
|
|
Access files on your PC from any device with a web browser. Upload, download,
preview photos, stream music and videos, create and edit text files. Access attached storage
and network drives. Restrict users to certain folders.
Private Cloud Storage
|
Access files on your PC from any device with a web browser. Upload, download,
preview photos, stream music and videos, create and edit text files. Access attached storage
and network drives. Restrict users to certain folders.
Private Cloud Storage
|
|
|
|
|
View and control your PC's desktop right from a web browser. Intuitive touch-interface allows
scroll/zoom, click, drag, double-click, and a context menu for typing text, pressing keys, accessing
clipboard, opening a chat, locking/unlocking the screen, or focusing on a single window.
Remote Desktop Control
|
View and control your PC's desktop right from a web browser. Intuitive touch-interface allows
scroll/zoom, click, drag, double-click, and a context menu for typing text, pressing keys, accessing
clipboard, opening a chat, locking/unlocking the screen, or focusing on a single window.
Remote Desktop Control
|
|
|
|
|
Use your PC's webcam or other USB / IP cameras to create a video security system. Detect motion and
trigger alarms, notifications, or recording. Set schedules to detect motion or record continuously.
Also connect to internet webcams, traffic cams, weather or nature cams. (Uses JPEG or MJPEG protocol)
Webcam Motion Security
|
Use your PC's webcam or other USB / IP cameras to create a video security system. Detect motion and
trigger alarms, notifications, or recording. Set schedules to detect motion or record continuously.
Also connect to internet webcams, traffic cams, weather or nature cams. (Uses JPEG or MJPEG protocol)
Webcam Motion Security
|
|
|
|
|
Use the software legally for any business purpose allowed by our Terms of Service and End User License Agreement.
Commercial Use
|
Use the software legally for any business purpose allowed by our Terms of Service and End User License Agreement.
Commercial Use
|
|
|
|
|
Record every network connection, login attempt, and web request
to a file location of your choosing. Complete with timestamps and IP addresses.
Logging
|
Record every network connection, login attempt, and web request
to a file location of your choosing. Complete with timestamps and IP addresses.
Logging
|
|
|
|
|
Add your company logo as the "mouse target". Users will click on your logo to bring up the software.
Branding
|
Add your company logo as the "mouse target". Users will click on your logo to bring up the software.
Branding
|
|
|
|
|
Integrate with Outlook/Exchange servers using MAPI. Use the mail account of the
logged-in user to send files and notifications or process commands without any setup.
Automatic detection and use of internet proxy settings.
Integration
|
Integrate with Outlook/Exchange servers using MAPI. Use the mail account of the
logged-in user to send files and notifications or process commands without any setup.
Automatic detection and use of internet proxy settings.
Integration
|
|
|
|
|
Receive updates automatically as they become available (or update manually)
Software Updates
|
Receive updates automatically as they become available (or update manually)
Software Updates
|
|
|
|
|
Access your PC using a custom URL (mf327.com/pc/yourpcname).
We keep track of your IP addresses and automatically direct your browser to the right one,
whether connecting from your local network or the internet. (Similar to Dynamic DNS)
Custom URL
|
Access your PC using a custom URL (mf327.com/pc/yourpcname).
We keep track of your IP addresses and automatically direct your browser to the right one,
whether connecting from your local network or the internet. (Similar to Dynamic DNS)
Custom URL
|
|
|
|
|
Use our relay servers to pass through routers and firewalls. Access your PC or laptop
no matter where it is: at work, at a friend's house, a hotel, or on Public Wi-Fi.
All you need is an outgoing internet connection.
Access a company laptop no matter where it is: At home, a hotel,
a client site, or on Public Wi-Fi. All you need is an outgoing internet connection.
Access a workstation remotely without any router configuration.
Access to Relay Servers
|
Use our relay servers to pass through routers and firewalls. Access your PC or laptop
no matter where it is: at work, at a friend's house, a hotel, or on Public Wi-Fi.
All you need is an outgoing internet connection.
Access a company laptop no matter where it is: At home, a hotel,
a client site, or on Public Wi-Fi. All you need is an outgoing internet connection.
Access a workstation remotely without any router configuration.
Access to Relay Servers
|
|
|
|
|
Use our proxy servers to access your PC without installing certificates or adding
browser exceptions. This feature breaks end-to-end encryption and should only be
used when no other options are feasible.
Use our proxy servers to access your PC without installing certificates or adding
browser exceptions. This feature breaks end-to-end encryption and should only be
used when no other options are feasible.
Access to Proxy Servers
|
Use our proxy servers to access your PC without installing certificates or adding
browser exceptions. This feature breaks end-to-end encryption and should only be
used when no other options are feasible.
Use our proxy servers to access your PC without installing certificates or adding
browser exceptions. This feature breaks end-to-end encryption and should only be
used when no other options are feasible.
Access to Proxy Servers
|
|
|
|
|
Share files or data from your PC with temporary internet links. Sharing through mf327.com means the recipient will not have to install your Certificate.
Share Data from Your PC
|
Share files or data from your PC using temporary internet links. Sharing through mf327.com means the recipient will not have to install your Certificate.
Share Data from Your PC
|
|
|
|