|
SplitSafe
SplitSafe protects your data on notebooks and PCs from unwanted access. Comparable to the concept of a pirate´s treasure map that is torn in two parts, SplitSafe divides your data and saves it on two different storage media, e.g. your notebook´s hard disk and a USB memory drive. What makes SplitSafe different from today´s security technologies? Known procedures like encryption and password protection are not safe when it comes to hacker attacks or careless use of passwords. SplitSafe closes this security gap by physically dividing the data onto two storage media and offers data security that has been certified by the German authority for product quality, the TÜV. The data is divided in such a way, that the individual parts do not allow access, reading, changing or reconstruction of the original information. All you have to do for perfect data protection is to keep your mobile storage device, e.g. a USB memory stick, apart from your notebook or PC. How does SplitSafe work? After the installation of SplitSafe an additional virtual hard disk will be available in your Windows system. Once you have connected a mobile storage medium to your notebook or PC you can save the files you want to protect on your virtual hard disk and you can access, copy open, change or delete the files as usual. If you save a file on your virtual SplitSafe drive, the data is automatically divided.
Òðåáîâàíèÿ: | Intel compatible PC, Pentium II or higher |
Trial version Îãðàíè÷åíèÿ: | 30 Days Trial |
|
 |
Advanced Key and Mouse Recorder It is designed to record and replay the keyboard and mouse activities for automating the plodding and repetitive tasks. |
 |
Acronis Disk Director Suite Acronis Disk Director Suite 10 is the only comprehensive partition and disk management suite that can help you manage ... |
 |
TicketBench Plus Create tickets and forms of all types. |
 |
IPSwitcher Basic Using your PC in the different networks? |
 |
007 Spy Software Secretly monitor and record all activity of computer users and automatically deliver logs to you via Email or FTP at ... |
|
|