Trial of 99-key computer information security disk

IT 168 Evaluation Room Now everyone says that this era is the information age, and all kinds of information are transmitted to each other in various ways, including information that can be transmitted to each other and things that cannot be widely circulated in theory. For example, the source code of a game masterpiece was leaked not long ago, which made its company quite angry. Now there are many computer experts who take pleasure in cracking other people's secrets, with the aim of proving how superb their computer skills are.

Nowadays, how to protect the security of information has become the focus of more and more friends, especially those in enterprises, institutions and state organs. If someone steals confidential information, the loss cannot be measured by money. Even among individual users, encryption of private data is very important. For example, there must be a lot of private information in the personal computer at work that you don't want others to see, so how should you encrypt it? Today we will introduce an encryption product-99-key computer information security and confidentiality product.

# $[* 1690 18 . jpg * # a * # 0 * # 0 * # center *]$ #

This product looks like an ordinary USB flash drive, and there is nothing special about it. In fact, it is a security system based on USB interface, a product combining software and hardware. Without input/output devices, it only uses USB interface to encrypt and protect files. Only after inserting the security lock (something that looks like a U disk) into the USB interface and entering the correct password can you open the safe of the hard disk. This product has five functions: operating system locking, user identity authentication, dynamic encryption of file safe, arbitrary file input encryption, and information room flashing.

# $[* 169020 . jpg * # a * # 0 * # 0 * # center *]$ #

1. Temporarily lock the computer. When doing important, confidential and private work on the computer, you need to leave the computer temporarily without turning it off. At the same time, you can set a temporary lock to prevent others from using or viewing the computer. When you need to leave, as long as you lower the button, all the operating parts of the computer (screen, keyboard, mouse, etc. ) will enter the locked state, insert the security lock and enter the password before resuming the pre-locked state to continue working;

# $[* 169023 . jpg * # a * # 0 * # 0 * # center *]$ #

2. Disable safe mode. Friends who use Microsoft operating system know that the operating system has a safe mode. Some computer experts can crack the encryption system by entering security mode, which brings trouble to users. And anyone who uses this product can't enter the safe mode. This better protects the encryption system.

3, boot lock function. This function is that you can't access the operating system without an encryption key. No matter native login or LAN login, stand-alone works cannot be realized without encryption keys and passwords.

# $[* 169029 . jpg * # a * # 0 * # 0 * # center *]$ #

4. Right-click Encrypt. This function is mainly to facilitate users to encrypt mobile products. Right click to encrypt the file to be encrypted. This encrypted file can be stored on any storage medium, such as floppy disk, USB flash drive, mobile hard disk, etc. Of course, right-click encryption can also be performed in the above media.

5. Physical deletion of information. You may know that the shredder actually means this function. Generally, deleted files can be recovered from the recycle bin, and experts can even recover deleted files from an empty recycle bin. However, after using this function, the information you deleted is irreversible, thus ensuring the absolute safety and reliability of confidential information.

After reading the function introduction, let's take a look at his actual installation and use.

# $[* 169035 . gif * # a * # 0 * # 0 * # center *]$ #

First of all, we mentioned earlier that this is an encryption product combining software and hardware, so its application is also very important. The first security procedure will prompt: "If you don't have an electronic key, please don't install this software, or you may not be able to uninstall it." After installing the software, restart the computer to install the encryption key. After installing the encrypted disk for the first time, the system will automatically discover new hardware, and then install the corresponding driver. After everything is installed, you can set up your own encryption system.

# $[* 169045 . gif * # a * # 0 * # 0 * # center *]$ #

When using the system for the first time, the option of "Please establish users in user management now and then authenticate" will pop up, and the user management window will pop up. When you choose to add a new user, you will enter the next interface.

In this interface, the new user you create will correspond to a user encrypted directory. After entering the encryption system correctly, you can put all the files that need to be kept secret in this directory to achieve the encryption effect. Ordinary users can't find your encrypted directory under normal operation. Only by inserting the encryption key and entering the correct password can your file be used normally.

# $[* 169053 . gif * # a * # 0 * # 0 * # center *]$ #

In the system setting interface, such as "unlock key allows the computer to be locked", "disable safe mode" and "boot lock function" are all set here. We have introduced the specific functions in detail in front, so I won't repeat them here.

# $[* 169049 . gif * # a * # 0 * # 0 * # center *]$ #

Finally, the document shredder function. In this interface, users can physically delete a file and a directory. Please rest assured that any files and directories deleted in this way cannot be recovered.

abstract

Although an encryption product is rarely used by ordinary home users, it is still very important in some specific occasions and people with specific needs. This 99-key encryption product encrypts the user's data by combining software and hardware, and at the same time expands the application space, such as temporarily locking the computer, encrypting the operating system, and thoroughly cleaning the deleted files. All of these are considered for users from the perspective of security. So we feel that the encryption effect and practicability of this product are still very strong.

But we remind everyone that for an encrypted product, its encryption key must be kept well, and the password you enter must also be remembered. Once you forget it, it will be unimaginable. There may be no other way but to reinstall the operating system.

General distributor: Beijing Yinhe Jiujiu Technology Development Co., Ltd. Tel: 010-62501011/23.

Beijing Agent: Dejinfeng Technology 0 10-82627420