SoftProtect 1.1
ffective encryption software - SoftProtectnnIt keeps all your confident information from being misused by other persons. Any file or program could be encrypted into one single viable file with the help of this software. You can use USB stick, PC hardware, pin code as the base of encryption algorithm and even combine them. SoftProtect is a great tool which provides strong data safety for individual or corporate users. It combines the advantages of information protection of software and hardware.nnPowerful Protection is affordablennSoftProtect is a great combination of the possibilities of strong protection with an easy usage. This program will keeps all your private files inaccessible for others.nThe program is able to encrypt various types of files: documents, PDF files, video and photo content.nnKeep your documents in safety with SoftProtectnnA lot of companies consider that the security of the corporate data is a major point of their politics. SoftProtect can ensure the safety of all financial and other important documents and files from unauthorized access and information leak. The simple way to require all the security demands is to use SoftProtect.nnPowerful Solution for Efficient Parental ControlnnNowadays parents aim to prevent their children from improper access to some kind of information on their computer. ABTO Software offers SoftProtect as an excellent parental control solution. It allows keeping sensitive data in safety and limiting programs and files their children use.nnAnti-piracy protection and software licensingnnWith the SoftProtect more licensing possibilities are available. Software anti-piracy protection which includes software licensing, has become a major issue of IT business. We consider that the protection of licensed software is a vital to avoid illegal usage and distribution. That is why we offer SoftProtect as an anti piracy software solution to reach the high extent of development business' security requirements.
Requirements
Changes: 1.1
- Unlimited size of encrypted file;
- Possibility to use PC hardware parameters as a base of encryption;
- Checking free space on the disk;
- Possibility of ?light? encryption (using only pin code);
- Possibility of folder encryp.