AWRC Pro (Atelier Web Remote Commander Pro)
(*Latest release 12.1/10th January 2016 )
This is the only software in the World that can connect to other computers without installing any software on the remote machine. It seems impossible. We thought that as well! But this is just the beginning of a long story…
AWRC Pro allows you to remotely gather and manipulate more information than remote privileged users can dream about. It is by far and large the most powerful remote audit and inventory software you can find. And with its great set of tools, you can do virtually anything on the remote system you can on the local system.
AWRC Pro is a must-have for System Administrators and Helpdesk personnel. Recommended for a range of special remote access requirements, from Intelligence to Parental supervision.
When full power is the minimum requirement, you need AWRC Pro…
Not only it has much more features, it has also the most powerful features. And some of those features are both UNIQUE and IMPORTANT.
Many others have been trying to imitate but had no success!
Please follow the slideshow to have an idea of the many capabilities of AWRC PRO.
Not a lot of remote access software do this these days. But many people may not need to connect to dated Operating System (or to the latest and greatest toys from Microsoft). So, let's not consider this one an important feature.
However, AWRC PRO makes the connections without previously installing any software on the remote computer. Simply, Point-And-Shoot, i.e, it Connects Directly!
- No previous software installs.
- No internet servers acting as middleman.
- No browsers.
- No Remote Desktop gadgets or helpers.
- No junk left on remote when connection terminates.
This is a UNIQUE and IMPORTANT feature, no other remote access software offers you.
- Tablet (Bottom Panel Lowered by a slider).
- Scaled amplifications or reductions.
- Full Screen.
Please watch the following slides to clarify.
Acess the File System
Files and folders can be: downloaded, uploaded, zipped, unzipped, renamed, deleted, copied and moved. You can also make new folders.
From here you can also launch a file under any user account: administrator or otherwise (even under the System Account). An account password is not needed for the logged-in user, for the account under which AWRC PRO made the connection and for the System account.
File associations are taken into consideration when launching a file.
Full System Information (I)
First, we have a group of General System Information that deals:
- Operating System.
- Processor (CPU).
- Display Adapter.
Then, we have information about Hardware Devices, in a format similar to Control Panel/Device Manager.
And we have a Physical Memory viewer (the actual bytes in memory space).
For now, let's see slides about these features, then we will continue describing what else we have under System Information.
Full System Information (II)
From within the Processes tab, you can kill a process and perform other actions (like Shutdown the system, for instance)
In the Services tab, you have complete information about all running Services.
From here, you can stop, start, pause, resume and unload services. As expected, not all services allow these operations.
Now, let's see slides about these features, then we will come back to describe more System Information capabilities.
Full System Information (III)
Finally, AWRC PRO allows Registry visualization and edition in the same way Regedit does. Unlike, all the other remote access software, it does not do a Network Registry Connection, it intervenes directly through the connection already established. So, it is much faster and can access all private hives from every user with no need to enter their credentials. In addition it allows the visualization of some secret Registry keys (here, edition is interdicted by design) .
The right to edit the Registry is set through AWRC Pro Policy (default is "not allow"), so it is safe for company use.
So, let's see slides about the features we just mentioned.
The following pieces of information are available:
- Remote Desktop/Terminal Services/Citrix Users and Sessions.
- Ports Finder (Ports opened by programs).
- Ports Statistics for various protocols.
- Routing Information.
- IP Statistics and Installed Protocols.
Special Features (I)
The first one is the Remote Console.
This one is not unique to the World, Actually, it was inspired by a classic command line utility called PsExec. However, it is much easier to use because you don't need to establish a connection (it was already established by AWRC PRO). All the important functionality of PsExec is present in the Remote Console.
In addition, Remote Console allows you to save the settings for reuse.
Special Features (II)
In many organizations tens, if not hundreds, of users connect simultaneously to a single computer through a RDP session. What these users do while connected is a complete mistery and there is no way to interevene into their sessions, even to help them fix some issue.
With AWRC PRO, you can connect to any RDP/TS or Citrix session even more easily than you do to establish a connection to a remote computer!
See through the following slides, how easy it is.
Special Features (III)
- The recording can be paused and resumed as needed.
- You can set the Frame Rate and the Quality Level.
- You can set a maximum recording file size or a maximum recording time.
- You can capture snapshots any time during recording.
- Recording can receive audio comments.
You can also record in Motion Detection mode, i.e, recording is activated when there is activity above some threshold and paused otherwise.
Special Features (IV)
It is fully controlled from the client side (local computer) and has several unique characteristics which make it suitable for different purposes, namely:
- The client can select both the Local and Remote Sound Play and Sound Capture Devices.
- The Local or the Remote Sound Play can be muted when needed.
- The sound volume can be adjusted for either the Local or Remote computer.
- The Codec can be selected.
- The Sound Play engine can be selected for the Local and Remote computers.
- Audio sessions can be, partially or in full, recorded to a file.
Other Important Features
2) Users and Groups: With a single click you will know all important statistics about every single built-in User account on the computer. You will also get the list of all Local and Global Groups.
3) Text Chat: Any time during a connection, you can open a Chat windows with the remote interactive user to exchange ideas or whatever.
4) Multiple monitors support: Although nowadays many people use 2 monitors simultaneously, AWRC PRO supports any number of them and alternates seamlessly between them with a single mouse click.
5) Full Desktop View: Independently of the number of monitors on the remote computer, you can see all of them at once.
6) Universal keyboard compatibility. All keyboard touches are properly reproduced on the remote computer, for every type of keyboard in the World. Also, the Ctrl, Alt and Windows key can be virtually clicked when they conflict with existing shortcuts in the Local computer.
7) And also: Copy clipboard content both ways, View-only mode, Hide Wallpaper and Block Remote Input.
Settings and Preferences
However, some setting can be changed in order to:
1) Make it perform better in a particular environment.
2) Fit better with personal likes and dislikes.
3) Comply with company policies for security (more about this later).
To connect you need to be an Administrator on the remote computer and Administrators have full rights and privileges.
However, some organizations, need to limit the power of remotely established connections, monitor and control when they happen, or even stop them for some computers.
AWRC PRO offers all these possibilities, lets see one by one.
Security - Connections Log
When Looging is enforced, every connection is recorded detailing Date and Time, Remote Host, Local User/Account used to connected and the Remote Interactive User at the time of connection.
The Log File is monitored for integrity and can not be tampered with.
Security - Authorization Request
In either case, access to the remote computer will not be granted until Authorization is granted by the remote interactive user. If there is no interactive user on the remote computer, access will not be possible.
Security - Notification Frame
This can be enforced either through Policy or set under Preferences.
Hovering the mouse over the Notification Frame provides details about the machine, IP address and user that established the connection.
The Notification Frame can not be killed while the connection is taking place.
Security - Policy
It is possible to limit by Levels or by setting or unsetting specific features.
It is also possible to set a password to launch AWRC PRO, in order to prevent other people from making use of it.
Policy Settings can only be altered by the person in charge of the system.
Security - Special Builds
This is useful, particularly when a large number of Seats exist and is inconvenient to adjust the Policy settings in every machine, one-by-one.
Of course, it is not be possible to have double installations of the software in the same computer, otherwise this will not make sense.
End of Presentation!
The testimony from some of our customers is very clear:
"Greetings. No requests, but a hearty thanks for a great software." Food Bank - LA
"We registered many of your apps and its a great product - keep up the good work..." Ron C. - US EPA
"It is a great product and much less intrusive than the other offerings that are out there." NYSP - New York
"I am using the AWRC Pro version users in my domain network, it is amazing software." Bayarbyamba.S - Jiguurgrand Group/Mongolia
"We try a lot, but this one [AWRC PRO] is our favorite." JS - NHS-UK London
"...herzlichen Glückwunsch zu Ihrer hervorragenden Atelier Remote Commander." Khün - Deustch Bank - Frankfurt
"I have been using your product for years. I liked it so much I paid for it out of my own pocket." Noah Parker - New York
"Superlative tool! We use it all the time." Knorr Foods Co, Japan
AWRC Pro capitalized in more than 10 years experience of AWRC and came up as a completely renewed product, featuring amazing new features such as:
- Only software in the World that can remotely access Remote Desktop (and Citrix) sessions.
- Only software in the World that can connect to, view and control Remote Desktop/Terminal Service Sessions and Citrix Apps.
- Capability to record movies even on motion detection.
- Remote Console (if you know what is PsExec, you have the idea).
- Full Unicode Support, even for Zipping and Unzipping.
- Lists Installed Programs, Updates and Hotfixes.
- Runs remotely as 64-bit on a 64-bit operating systems.
- And almost 100 more…
Comparing AWRC PRO with AWRC
|Access to the remote computer desktop enabling the launch of software with the mouse or keyboard.||Yes||Yes|
|Does not open any ports – it is absolutely transparent to any firewall, providing the Microsoft Networks operation is not blocked by the firewall.||Yes||Yes|
|Works within the company’s Microsoft Networks LANs and across the Internet.||Yes||Yes|
|You can launch multiple instances and remotely access different computers at the same time. The maximum number of simultaneous connections is limited by available memory and CPU speed. Due to its low footprint, it will handle 10 (or more) simultaneous connections without problems with current hardware. No configuration is necessary||Yes||Yes|
|A remote computer can be connected simultaneously by multiple clients.||Yes||Yes|
|Supports multiple monitors (up to 10) on the remote computer, you can view and work on any of them.||Yes||Yes|
|Simulates all keystrokes on the remote keyboard computer.||Yes||Yes|
|Wakes-up from screen-savers with a mouse-click or keystroke. Deals with password protected screen-savers.||Yes||Yes|
|Simulates the security attention sequence (Ctrl+Alt+Del) on the remote to enable logon and on the default desktop. All operating systems supported.||Yes||Yes|
|Supports User Switching sessions on Windows XP Pro and later (Vista, Windows 7, etc)||Yes||Yes|
|Provides access to disks, partitions, folders and files. The partitions or folders are not required to be open shares. Automatically resolve symbolic links and junctions, even hidden or with access restricted.||Yes||Yes|
|Remote files can be downloaded or launched in the remote system. Files can be launched as another user (equivalent to RunAs).||Yes||Yes|
|Local files can be uploaded to the remote system.||Yes||Yes|
|Files can be remotely zipped or unzipped.||Yes||Yes|
|New directories can be made and files and directories can be renamed.||Yes||Yes|
|Remote files and directories can be deleted, copied or moved.||Yes||Yes|
|Allows sending or receiving the Clipboard contents: text, pictures and other standard Windows Clipboard formats.||Yes||Yes|
|Provides disk partition information, namely File System, Type, Serial Number, Volume Label, Capacity and Free space.||Yes||Yes|
|Allows visualization of shares.||Yes||Yes|
|Allows visualization of users list and account details as well as Local and Global groups.||Yes||Yes|
|Allows instant retrieval of password hashes in 32-bit remote computers, for audit of strong password policy enforcement across the organization. (for 64-bit remote computers, see below)||Yes||Yes|
|Allows visualization and management of services. Services can be started, stopped, paused, resumed and even unloaded.||Yes||Yes|
|Allows visualization of processes. 32-bit processes can be killed. (for 64-bit processes, see below)||Yes||Yes|
|Allows remote Shutdown, Power-Off and Reboot.||Yes||Yes|
|System Information (Operating System, Processor, BIOS, Memory, Display Adapter and Logical printers).||Yes||Yes|
|Complete and detailed Hardware Devices list.||Yes||Yes|
|Physical memory viewer.||Yes||Yes|
|Ports Finder, which maps applications to open ports||Yes||Yes|
|Connections and Listening Ports, TCP statistics, UDP statistics, ICMP statistics, Routing Table, DNS Servers, Persistent Routes, IP Statistics/Settings, Installed Protocols/Protocol Details, Addressing Information Table, Net to Media Table, Interface Statistics/Settings.||Yes||Yes|
|Chat facility for conversation with a remote interactive user.||Yes||Yes|
|Provides antialiased scaling of remote desktop for comfortable viewing on the local computer. This is the best image at any scale when compared with any other remote access software.||Yes||Yes|
|Uses Windows authentication, which guarantees that only individuals with Administrator privileges on the remote system are able to connect (strong passwords are obviously recommended).||Yes||Yes|
|Can use strong encryption to keep the information out of reach from prying eyes.||Yes||Yes|
|Can request authorization from remote before initiating operations. Not enforced, except by Policy (AWRCP) or special version (AWRC).||Yes||Yes|
|Can show to remote when it is connected. Not enforced, except by Policy (AWRCP) or special version (AWRC).||Yes||Yes|
|Extended keyboard support and simulation of special shortcuts (such as Alt-Tab).||Yes||Yes|
|Complete processes information (cpu usage, command line, virtual memory, I/O counters and many others)||Yes||Yes|
|Shows last 5 characters of Product Key||Yes||Yes|
|Remotely access, control and switch between RDP/TS sessions.||Yes||No|
|Remotely access, control and switch between Citrix XenApp applications launched from a Citrix XenApp server.||Yes||No|
|Automatically runs as 64-bit on 64-bit operating system.||Yes||No|
|Can record quality movies of the connections (with audio comments if desired), including pause and resume and quality and frame rate can be set. Movies are recorded in compact .wmv format.||Yes||No|
|Can record a movie on motion detection, suitable for surveillance.||Yes||No|
|Zip and Unzip is Zip-64 compatible, supports Unicode in files names and folders and is compatible with Unicode support in Winzip.||Yes||No|
|Allows instant retrieval of password hashes in 64-bit remote computers, for audit of strong password policy enforcement across the organization.||Yes||No|
|Allows visualization of processes. 64-bit processes can be killed.||Yes||No|
|Information about monitor(s) on Vista and above (Make, Manufacturer, Serial, Year and Week of manufacturer and many other hardware details).||Yes||No|
|Full and detailed list of installed programs, updates and hotfixes, both for “all users” and for each user.||Yes||No|
|Remote Console, equivalent to Sysinternal’s PsExec in functionality but easier to use and antivirus safe (unlike PsExec, which is flagged as virus dropper).||Yes||No|
|High-end Ping tool, able to satisfy the more demanding technicians.||Yes||No|
|LAN Computers search tool to list the reachable computers, unlike ‘My Network Places’ which does not detect offline machines even after a few hours.||Yes||No|
|Can be configured to run under various feature levels in order to comply with an organization policy.||Yes||No|
|On multiple multi-monitor systems, you can view all monitors at the same time and work directly on any of them.||Yes||No|
|Impressive audio engine, fully controlled from the client. Full-duplex conversation, audio monitoring and/or recording. Allows selection of audio devices on local and remote computers.||Yes||No|
|Remote Registry view. Works like Regedit.exe. Accesses any built-in account without need to enter credentials. * For security and safety considerations, access to following capabilities will be restricted and discretionary: * Keys can be created, deleted, renamed; values can be created, edited or deleted.||Yes||No|
|Unlocks the remote computer without password. Wakes up from screen savers with logon screen without password.||Yes (Version 12 and above)||No|
|Extremely powerful forensics toolset, able to judge quality of passwords and trustworthiness of applications/OS facilities that offer themselves to store passwords.||Yes (Version 12 and above)||No|
|Access to Online Database of hash/passwords of more than 5 GB records in order to investigate strongness of Windows login password.||Yes (Version 12 and above)||No|