If you are looking for software to use, go to Huajun Software Park! software release

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, and business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card) and a photo of yourself holding your ID card) and send it to your email http://softwaredownload4.com/sbdm/user/login

Close >>

Send to email:news@onlinedown.net

Close >>

Location: front pagePC softwaresecurity softwareEncryption and decryption encryption software
encryption software

Encryption software 7.0

QR code
  • Software licensing: shareware
  • Software size: 47.08MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2024-10-31
  • Application platform: Winxp/vista/win7/2000/2003
  • Software language: Simplified Chinese
  • Version: 7.0

Download the service agreement at the bottom of the page

Software introduction Related topics FAQ Other versions Download address

Recommended for you:- encryption software

Basic introduction
Encryption software segment first LOGO
1. Transparent encryption technology

1. Forced encryption: After installing the system, all types of files specified in the protection policy are automatically encrypted.

2. Easy to use: It does not change the original operating habits and does not need to restrict ports; file sharing can be achieved without any processing during internal communication.

3. External obstruction: Once the file leaves the use environment, the file will be automatically destroyed, thereby protecting confidential data from being leaked.

2. File backup and version recovery

In actual use, computer virus damage, user misoperation, etc. may cause damage to encrypted files, resulting in files that cannot be restored. In order to prevent this risk, Ruixu DISE provides client dynamic backup and server centralized backup functions, which can be restored to any of the five latest modified versions.

3. Authority management system

Ruixu DISE not only has the "separation of three powers" of management roles (system administrator, file administrator and log auditor), but also has hierarchical management of user permissions. High-level users can access files of low-level users, but not vice versa.

4. Remote offline support

Users on business trips obtain authentication through hardware EKEY and can use encrypted files normally; in the event of temporary network disconnection or server failure, the client obtains authentication through "hardware fingerprint", which does not affect normal work.

5. Port management

1. Communication equipment: The use of serial ports, parallel ports, (HUB), SCSI interfaces, 1394 controllers, infrared, PCMICA cards, Bluetooth devices, MODEM, and direct cable connections can be prohibited for computers by department or user.

2. USB related devices: USB CDROM, USB storage, USB hard disk, USB network card, and other USB devices can be disabled by department or user.

6. Server supported hardware version

The hardware version of the management center is a Linux-based industrial computer with built-in firewall function, which ensures safety and reliability even if it is placed on the public network.

7. Multiple management mode switching functions

Supports administrator mode and automatic mode to handle client decryption requests. When the administrator is away from work, it can be set to automatic mode to handle decryption requests, while leaving detailed logs and backups of decrypted files for future verification.

8. Outgoing file control function

There is only one file for control of outgoing files. Users can directly double-click to run it. It is more convenient to use. Moreover, functions such as "whether it can be printed", "whether it is read-only", "open times limit", "usage time limit", etc. can be set to achieve After the preset life cycle, the file is automatically destroyed, thereby preventing the leakage of outgoing files to third parties.

9. Client-side clear and secret distinction technology

According to the specific situation of the user, you can choose client-side forced encryption or client-selected encryption. In the client-selected encryption mode, only the encrypted files downloaded to the client from the centrally managed "File Security Server" are protected, while the plaintext generated by the client is protected. No processing. This avoids user resistance caused by forced encryption of files generated by commonly used Word/Excel applications and provides greater flexibility.

10. Print content monitoring

After printing monitoring is enabled, when the system detects a printing operation, it will automatically search for all locally connected printers (real printers and virtual printers), and accurately record detailed printing operation information and printed document content. With printing monitoring, you no longer have to worry about document leaks caused by employees printing, making you safer, more worry-free, and more assured.

11. Graded Approval

It supports file decryption and hierarchical approval functions for outgoing files, supports customized approval levels and approval permissions at all levels, supports file decryption and online application and online approval functions for outgoing files, and avoids the trouble caused by manual decryption.

12. Remote management

It supports sending short messages to clients, remotely upgrading and uninstalling clients, batch upgrading and uninstalling operations for multiple users, and supports the import and export functions of policy configuration.

13. Power failure protection

Even if the document is accidentally powered off during editing, the document will not be in a "semi-encrypted" state or the document will be damaged.

14. Anti-attack protection

Unauthorized uninstallation of client software is prohibited to prevent the client process from being killed. After the client formats and reinstalls the system, the installation status of the client software can be monitored from the console.

15. Cipher text copy and paste protection

Supports control of the copy and paste function, and does not affect users' daily usage habits. Users can copy, paste, and drag between controlled documents normally. It can also be controlled to allow external copying into controlled documents, but does not allow copying from outside to controlled documents. Copy the text into the cipher text.

16. Server cluster disaster recovery mechanism

1. Support dual-machine hot backup of the server: when the "master server" is unexpectedly paralyzed, the "slave server" can take over quickly and in time.

2. Supports fault-tolerant use when the network is disconnected: the offline use mode can be set, and real-time heartbeat monitoring and authentication can be performed offline to prevent long-term open use of ciphertext caused by computer loss.

17. Asset Management

1.

Asset statistics: You can customize the distribution of hardware assets and view hardware assets by department or user.

2.

Asset changes: It is convenient for users to manage hardware assets. If there are changes in assets, the system will automatically alarm.

18. Remote maintenance

1.

View hardware information: You can view the basic information of the client, including the client's computer name, logged-in user name, operating system, IP/MAC, boot time, disk usage, computer performance, etc.

2.

Remote operation: You can log in, log off, and restart the computer remotely, and support keyboard input and login shortcut key operations.

3.

File transfer: The console and client can remotely transfer files to each other.

19. Log audit

1.

Log query: You can view in detail the files that each user has operated on the local machine and the network, including operations such as creation, access, copy, move, rename, modification, deletion, repair, upload/send and download/receive.

2.

Print audit: You can record and query the user's printing of documents, including printing time, number of printed pages, and printer name.

3.

Log backup: Back up and export files used by users, including reading, editing, printing, and copying operation logs.

Related topics

  • excel encryption topic

    excel encryption topic

  • Encrypted photo album collection

    Encrypted photo album collection

  • Special topic on encrypted mobile phone software

    Special topic on encrypted mobile phone software

FAQ