1. Support Windows 10. 2. Major improvements in the machine code algorithm. Users reinstalling computers and changing systems will not cause machine code changes; 3. Completely separated from adboe reader, encrypted PDF files do not need to install any third-party readers; 4. Can control the print quality of authorized users; 5. Added display of file numbers; 6. Can be browsed in full screen; fully supports all versions of PDF file encryption; convert Pdf to EXE, encrypted documents can be authorized with one machine and one code, prohibit copying and printing, prohibit screen copying, etc.
Key features and functionality include:
1. Multiple encryption modes to choose from:
Non-binding mode ---- The encrypted file is not bound to the user's computer, but the user needs a reading password to open it.
Binding mode ---- One machine, one code authorization, different user computers require different reading passwords for encrypted files.
Passwordless mode ---- Encrypt and convert Pdf to EXE format. The encrypted file can be run without opening a password. Only the original file is encrypted and protected.
One-code pass mode ---- Different files encrypted with the same secret key and product number only need to be authenticated once on the same computer.
2. You can set the number of readings, valid reading, preview time, etc.
3. You can set the user's keyboard to be locked when the document is opened, or the user's mouse can only work within the reading window, and can only read and cannot do other things.
4. You can add watermarks to documents, supporting fixed watermarks and floating watermarks.
5. User prompts can be set, which users can see before opening the encrypted document.
6. Various screen copying behaviors can be prohibited.
7. You can disable reading in a virtual machine (VMware/Virtual PC).
8. You can set the encrypted file to be called only from the command line, and the correct key is required when calling.
9. You can control whether users are allowed to print documents.
10. You can set whether users are allowed to copy text, and you can control how many words can be copied at a time.
11. You can choose various page layouts when browsing.
More extended functions can be achieved:
1. Online password issuance. Users can obtain the reading password after authentication through the website designated by you, without manual participation.
2. Combine with network applications to flexibly control business logic.




















Useful
Useful
Useful