Crypto Package Manager (CPM II) is a specialized application for strong encrypting files and folders located on local, networks, servers, or external data media.
The application allows the following actions:
Encrypt or decrypt selected files and folders;
Secure file packages;
Encrypting the files in the package;
Decrypting the files in the package;
File integrity check;
File modification control;
Checking the current status of files and directories etc.
The encryption of the files for which meta-information is available in the packages and which are physically accessible is performed based on session crypto mechanisms.
Each crypto mechanism uses a set of proven cryptographic primitives. Configuration of crypto primitives is done automatically.
All operations on the files and folders saved in the package are performed only when the files and folders are physically accessible. If they cannot be accessed (deleted, physically inaccessible network drive, or other reason), this will be reflected in the packet, recording the time when this finding was made.
FIELD OF APPLICATION
Protecting large arrays of files located on different media is a complex and difficult process to implement. The use of file packages allows the automation of this process, increases the efficiency of service, and significantly improves the security of corporate solutions.
Storing, editing, transferring, and destroying files is a process, the importance of which is often overlooked by both users and those responsible for security.
Statistics show that threats related to gaining unsanctioned access by unauthorized persons are related to this problem.
With the help of CPM, it is possible to neutralize all these problems through a highly effective professional cryptosystem using secure file packages.
CPM uses some of the most effective standard digital data encrypting algorithms used by government organizations and corporate structures.
The application allows the following actions:
Encrypt or decrypt selected files and folders;
Secure file packages;
Encrypting the files in the package;
Decrypting the files in the package;
File integrity check;
File modification control;
Checking the current status of files and directories etc.
The encryption of the files for which meta-information is available in the packages and which are physically accessible is performed based on session crypto mechanisms.
Each crypto mechanism uses a set of proven cryptographic primitives. Configuration of crypto primitives is done automatically.
All operations on the files and folders saved in the package are performed only when the files and folders are physically accessible. If they cannot be accessed (deleted, physically inaccessible network drive, or other reason), this will be reflected in the packet, recording the time when this finding was made.
FIELD OF APPLICATION
Protecting large arrays of files located on different media is a complex and difficult process to implement. The use of file packages allows the automation of this process, increases the efficiency of service, and significantly improves the security of corporate solutions.
Storing, editing, transferring, and destroying files is a process, the importance of which is often overlooked by both users and those responsible for security.
Statistics show that threats related to gaining unsanctioned access by unauthorized persons are related to this problem.
With the help of CPM, it is possible to neutralize all these problems through a highly effective professional cryptosystem using secure file packages.
CPM uses some of the most effective standard digital data encrypting algorithms used by government organizations and corporate structures.
Resumen
CPM II fe es un software de Freeware en la categoría de Seguridad desarrollado por Gatelink Ltd..
La última versión de CPM II fe es 2.5.0.0, aparecido en 27/08/2023. Inicialmente fue agregado a nuestra base de datos en 27/08/2023.
CPM II fe se ejecuta en los siguientes sistemas operativos: Windows. El archivo de descarga tiene un tamaño de 16,9MB.
CPM II fe no ha sido calificada por nuestros usuarios aún.
Últimas actualizaciones
Dell SupportAssist 4.8.2.29006
Solución de soporte técnico eficiente para los usuarios de DellDeepL 25.4.1
Traduce con precisión con DeepLNero AI Image Upscaler 27.5.21
Nero AI Image Upscaler 2022 es una herramienta de software desarrollada por Nero AG que utiliza la inteligencia artificial para mejorar la calidad de las imágenes digitales.Opera GX Stable 118.0.5461.76
Navegador personalizable diseñado específicamente para jugadores.Wondershare Filmora 14.4.13.12098
¡Transforma tus videos en obras maestras cinematográficas con Wondershare Filmora!Últimas noticias
Últimas reseñas
Serial Port ActiveX Control
Comunicación serie fiable con control ActiveX de puerto serie |
|
![]() |
DiskInternals Partition Recovery
Recupere sin esfuerzo las particiones perdidas con DiskInternals Partition Recovery |
Awave Studio
Awave Studio: La caja de herramientas definitiva para el diseño de sonido |
|
![]() |
Voicemeeter
¡Mejora tu audio con Voicemeeter! |
![]() |
Adobe Creative Suite Master Collection
¡Da rienda suelta a tu potencial creativo con Adobe Creative Suite Master Collection! |
Digital Image Recovery
Restaure recuerdos perdidos con la recuperación de imágenes digitales |
![]() |
UpdateStar Premium Edition
¡Mantener su software actualizado nunca ha sido tan fácil con UpdateStar Premium Edition! |
![]() |
Microsoft Visual C++ 2015 Redistributable Package
¡Aumente el rendimiento de su sistema con el paquete redistribuible de Microsoft Visual C++ 2015! |
![]() |
Microsoft Edge
Un nuevo estándar en la navegación web |
![]() |
Google Chrome
Navegador web rápido y versátil |
![]() |
Microsoft Visual C++ 2010 Redistributable
Componente esencial para ejecutar aplicaciones de Visual C++ |
![]() |
Microsoft Update Health Tools
Herramientas de estado de Microsoft Update: ¡asegúrese de que su sistema esté siempre actualizado! |