Settings Window
The Peasy Copy Commander remote access settings window is accessed from the tool bar icon. Remote file access is available to other local private computers where Sartronics Peasy Copy Commander is also installed and properly setup.
There is separate tab pages for General and History settings.
Enable remote access
Tick this to enable remote access from other devices also running Sartronics Peasy Copy Commander.
IP Port number
This is the IP port number that is used for remote communication. The default is 5658, but any value between 1000 and 65000 can be used instead. Note that this port number must be open in the computers firewall settings.
Use TLS
To enhance security the communication can be encrypted. When ticked TLS encryption is applied to all communication. Note that it will run a little slower with this option enabled.
Multicast Port number
This is used by Copy Command to .discover other device on your local private network. It must be set the same for all of them. The default is 5657, but any value between 1000 and 65000 can be used instead. Note that this port number must be open in the computers firewall settings.
Multicast Address
This is used by Copy Command to .discover other device on your local private network. It must be set the same for all of them. The default is 224.0.2.142. Note that IPv6 addresses like ff02::142 can also be used.
Access folder
This is the folder that is used for remote access. It can be set to a local place away from sensitive files. The remote machine can not see or access any files further up from this folder.
Password
To restrict access to a known password then this can be set.
Use password for saving files only
The password is only required when writing files or modifying existing files. It is not required to view or read the files.
Read only access
The files can only be read remotely then can not be changed or added to.
Confirm access
When remote system wants to read or have any access to the files then confirmation has to be granted from the source computer. A popup window on the computer will inform the user that permission is required. After 20 of no response it will go away and permission will not be granted.
Confirm write access
This works the same as above but only applies it the remote user wants to write or change any files.
Confirm time access
This is the number of seconds in which that the user on the computer has to respond to the request for access.
Use system tray
The application can hide away in the System Tray when not actively used. It will continue to wait for file sharing connections
The 'Minimize to system' tray option will hide in the System Tray when the minimize button is pressed.
Similarly the 'Close to system tray' option will hide in the System Tray when the application close button is pressed.
To open the application from the System Tray a single or double click can be used depending upon the 'Single click to show application' setting.