Whether you’re at work and forgot some file on your home computer, want to play some music on a train, or just want to move some files between your computers, accessing your files from anywhere is a life saver.
LogMeIn Hamachi is a VPN service that easily sets up in 10 minutes, and enables secure remote access to your business network, anywhere there's an Internet connection. It works with your existing firewall, and requires no additional configuration. Hamachi is the first networking application to deliver an unprecedented level of direct peer-to-peer connectivity. It is simple, secure, and cost-effective. Advantages of LogMeIn Hamachi: • LAN over the Internet - Arrange multiple computers into their own secure network, just as if they were connected by a physical cable. • Files and Network Drives - Access critical files and network drives.
• Zero-configuration - Works without having to adjust a firewall or router. • Security - Industry leading encryption and authentication.
• Cost Effective - Free for non-commercial use.
188.8.131.528 / May 11, 2016; 2 years ago ( 2016-05-11) (XP or later),,, Linux on ARM (beta), (Free of charge for up to 5 devices) Website LogMeIn Hamachi is a (VPN) application that is capable of establishing direct links between computers that are behind ('NAT') firewalls without requiring reconfiguration (when the user's PC can be accessed directly without relays from the Internet/WAN side); in other words, it establishes a connection over the Internet that emulates the connection that would exist if the computers were connected over a ('LAN'). It is currently available as a production version for and, as a beta version for, and as a system-VPN-based client compatible with and. For paid subscribers Hamachi runs in the background on idle computers. The feature was previously available to all users but became restricted to paid subscribers only. Contents • • • • • • • Operational summary [ ] Hamachi is a centrally-managed system, consisting of the server cluster managed by the vendor of the system and the client software, which is installed on end-user computers. Client software adds a to a computer, and it is used for intercepting outbound as well as injecting inbound traffic.