|Op. System:||Windoows All|
|File size:||41.5 MB|
Publisher description for Storage Room
Storage Room a Personal Information and Password Manager to protect the privacy while editing and viewing, even if the workstation is already inflicted by a spy and for save data exchange with up to 16384 Bit strong RSA Keys. Stores and protects bookmarks, contacts, notes, appointments, movie libraries and any tabular data like passwords, license keys, credit cards, application-, document- and internet shortcuts in special designed data sheets inside Storage Room. Arrange this data sheets in a folder structures, lock and protect any amount of folders and data sheets with an additional password and password file and decide how long any of them can remain open without user interaction, before Storage Room seals them automatically. The password generator creates high secure passwords and the virtual keyboard hides keyboard input. The Internet Explorer can be automated with an entirely new, innovative and secure way and forced into any desired location. Data like passwords and login details can be transferred by hotkeys thru the virtual input into any application. Any amount of databases can be created and backups can be managed by Storage Room. The appearance of Storage Room can be individualized with more then 30 different designs and a custom background picture. Skype connections can be created right out of the contact data sheet, files and messages can be exchanged up to 16384 Bit RSA encrypted with relatives, friends, co workers and customers. Storage Room can be locked to secure the data as long as the workstation is unattended. Any data will be secured by 256 Bit AES and two of over 400 unique encrypting algorithms on hard disc and in most part in memory. The most important data, like your passwords, will be kept encrypted in memory by several of over one thousand encrypting algorithms all the time, even while viewing and editing. Storage Room executes nearly 100 methods in Virtual Machines, in order to keep the exact encryption algorithms secure.