Create port mappings that allow using remote resources.
Store your passwords and notes to protect your data against identity thieves.
Manage remote connections and organize remote machine data.