sponsored links
Description
"This program will securely encrypt and password data."
indir.biz Editor: This program will securely encrypt and password data. Most importantly, the actual login data security shield the most vulnerable
link - eliminates the password entry point. Florencio and search tables
Proposed by Herley, using possible to exclude completely the possibility of password-stealing.
Built-in paper described above, this proxy emulation provides data available
malicious software and hardware without password
During the communication between users and programs designed to steal passwords known to run even on a computer.
1. Technologies used
1.1. Data Encryption
AES-256 method. NET framework provided by this program are used.
AES-256 encryption as a standard and accepted by the general public was not in danger.
Read more on the Wikipedia web AES256
1.1.1. Password hash algorithms
SHA-512
1.2. True Input Shield (through password lookup table) to play the disability
Brute Force attacks on passwords, keyloggers are losing their popularity.
These programs, including a computer record events - the mouse motion
- Keys
- Screen shots
- Clipboard contents
1.3 suppressed. Random Numbers
lookup table and programs in high-quality pseudo-random numbers, trusting many other functions.
Mersenne Twister was created and used this program for Pseudorandom numbers. Long
number of consecutive blocks at random and frequent re-seedings (hash function) was blocked by.
2. In use
2.1. Reliable Computer
"Trusted Computer" mode, for encryption and decryption password is entered directly as plain text. Typewriter
text is selected will appear.
2.2. Unknown Computer
This mode, other systems such as computer every key values
(mouse motion, full-screen images, an attacker, clipboard content) has received reports assumes. Sign in now Encryption Shield 2.0 you can free.
sponsored links
Visitor rates
4 Star
38
Member rates
4 Star
43
Ortalama oy:
3,8
![berbat 1](/assets/js/jraty/star-on.png)
![kötü 2](/assets/js/jraty/star-off.png)
![normal 3](/assets/js/jraty/star-off.png)
![iyi 4](/assets/js/jraty/star-off.png)
![süper 5](/assets/js/jraty/star-off.png)