If you are looking for software to use, go to Huajun Software Park! software release

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, and business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card) and a photo of yourself holding your ID card) and send it to your email address http://softwaredownload4.com/sbdm/user/login

Close >>

Send to email:news@onlinedown.net

Close >>

Location: front pagePC softwaresecurity softwareEncryption and decryption Tuhang encryption software
Tuhang encryption software

Tuhang encryption software 3.08

QR code
  • Software licensing: shareware
  • Software size: 28.76MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2014-06-30
  • Application platform: Winxp/vista/win7/2000/2003
  • Software language: Simplified Chinese
  • Version: 3.08

Download the service agreement at the bottom of the page

Software introduction Related topics FAQ Download address

Basic introduction
Tuhang encryption software segment first LOGO
Through Tuhang encryption technology, sensitive data is encrypted in real time. Tuhang encryption technology adopts the innovative Tuhang encryption technology security strategy. The starting point is no longer to prevent files from being taken out; rather, it is to ensure that files taken out by anyone and in any way are in a protected state and cannot be used. , so you don’t have to worry about files being illegally stolen. Specifically speaking of Tuhang encryption technology, no one (including file creators and legal users) can ever access unprotected files, so that no one can take away the security effect of unprotected files. Because all the files stolen through emails, network intrusions, mobile storage devices (floppy disks, U disks, notebooks, etc.), Bluetooth devices, infrared devices, Trojan programs, etc. can only be files in a protected state, and these files are separated from the company's original The computer cannot be used normally. Tuhang encryption technology image file security system specifies a fixed machine with decryption authority through the master decryption authorization number, and assigns a decryption password. The encryption requirements for different enterprises, or different departments within the same enterprise, are different. Some only need to encrypt documents generated by OFFICE software, while others need to encrypt image files. As customer needs change, these customized configurations of products must be simple and fast. When the same product is used by different companies, the encryption formats should also be different. 1. Advanced encryption technology: The commercial encryption algorithm uses a symmetric algorithm (Tuhang encryption technology), the key length is 100,000 bits (random key), 8-layer public and private encryption, and Tuhang’s underlying transparent encryption technology, for any format All files can be forcibly encrypted in real time; if the encrypted drawings or documents are leaked to the public without the permission of the company, whether they are leaked in any form such as using a USB flash drive, a mobile hard disk, or sending an email, they will be a bunch of gibberish. No one can open it. (Tuhang specializes in encryption technology and has its own patented technology) 2. Flexible policy definition: Different encryption policies can be defined according to different people, departments, and organizations. The encryption policy includes file format definition policy, print control policy, screen copy policy, and backup Policy, group policy, secret level policy, offline policy; enterprises can conveniently and flexibly define policies suitable for their own management needs according to their own needs, such as the addition of special file encryption formats, control definitions for printing and copying screens, and offline management policy definitions for notebooks, etc. 3. Whole folder encryption function   

Entire folders can be encrypted at any time. (Underlying encryption, encryption calculation method independent of operating system)

  

4. Whole folder shredding function

  

Entire folders can be shredded at any time and cannot be recovered by anyone.

  

5. Perfect and stable integration: Seamless integration with operating systems (WINDOWS 32-bit, 64-bit), anti-virus software, PDM, ERP, OA and other systems, stable and flawless operation; does not affect the management and operation of other customer systems, customer encryption Security and software management are perfectly integrated and operate stably.

FAQ