Crypto Package Manager (CPM II) is a specialized application for strong encrypting files and folders located on local, networks, servers, or external data media.
The application allows the following actions:
Encrypt or decrypt selected files and folders;
Secure file packages;
Encrypting the files in the package;
Decrypting the files in the package;
File integrity check;
File modification control;
Checking the current status of files and directories etc.
The encryption of the files for which meta-information is available in the packages and which are physically accessible is performed based on session crypto mechanisms.
Each crypto mechanism uses a set of proven cryptographic primitives. Configuration of crypto primitives is done automatically.
All operations on the files and folders saved in the package are performed only when the files and folders are physically accessible. If they cannot be accessed (deleted, physically inaccessible network drive, or other reason), this will be reflected in the packet, recording the time when this finding was made.
FIELD OF APPLICATION
Protecting large arrays of files located on different media is a complex and difficult process to implement. The use of file packages allows the automation of this process, increases the efficiency of service, and significantly improves the security of corporate solutions.
Storing, editing, transferring, and destroying files is a process, the importance of which is often overlooked by both users and those responsible for security.
Statistics show that threats related to gaining unsanctioned access by unauthorized persons are related to this problem.
With the help of CPM, it is possible to neutralize all these problems through a highly effective professional cryptosystem using secure file packages.
CPM uses some of the most effective standard digital data encrypting algorithms used by government organizations and corporate structures.
The application allows the following actions:
Encrypt or decrypt selected files and folders;
Secure file packages;
Encrypting the files in the package;
Decrypting the files in the package;
File integrity check;
File modification control;
Checking the current status of files and directories etc.
The encryption of the files for which meta-information is available in the packages and which are physically accessible is performed based on session crypto mechanisms.
Each crypto mechanism uses a set of proven cryptographic primitives. Configuration of crypto primitives is done automatically.
All operations on the files and folders saved in the package are performed only when the files and folders are physically accessible. If they cannot be accessed (deleted, physically inaccessible network drive, or other reason), this will be reflected in the packet, recording the time when this finding was made.
FIELD OF APPLICATION
Protecting large arrays of files located on different media is a complex and difficult process to implement. The use of file packages allows the automation of this process, increases the efficiency of service, and significantly improves the security of corporate solutions.
Storing, editing, transferring, and destroying files is a process, the importance of which is often overlooked by both users and those responsible for security.
Statistics show that threats related to gaining unsanctioned access by unauthorized persons are related to this problem.
With the help of CPM, it is possible to neutralize all these problems through a highly effective professional cryptosystem using secure file packages.
CPM uses some of the most effective standard digital data encrypting algorithms used by government organizations and corporate structures.
– Áttekintés
CPM II fe Freeware szoftvere a kategória Biztonság fejlett mellett Gatelink Ltd.-ban.
A legutolsó változat-ból CPM II fe a(z) 2.5.0.0, 2023. 08. 27. megjelent. Kezdetben volt hozzá, hogy az adatbázisunkban a 2023. 08. 27..
a(z) CPM II fe a következő operációs rendszereken fut: Windows. A letölt reszelő birtokol a méret-ból 16,9MB.
CPM II fe nem volt eddig a felhasználók még.
Utolsó frissítések
Dell SupportAssist 4.8.2.29006
Hatékony műszaki támogatási megoldás Dell felhasználók számáraDeepL 25.4.1
A DeepL by DeepL SE egy AI-alapú nyelvi fordítószoftver, amely kiváló minőségű és pontos fordításokat kínál a felhasználóknak több nyelven.Nero AI Image Upscaler 27.5.21
A Nero AI Image Upscaler 2022 a Nero AG által kifejlesztett szoftvereszköz, amely mesterséges intelligenciát használ a digitális képek minőségének javítására.Opera GX Stable 118.0.5461.76
Testreszabható böngésző, amelyet kifejezetten játékosok számára terveztek.Wondershare Filmora 14.4.13.12098
Alakítsa át videóit filmes remekművekké a Wondershare Filmora segítségével!
UpdateStar által ellenőrzött biztonságos és ingyenes letöltések
Legyen naprakész
az ingyenes UpdateStar-ral.
az ingyenes UpdateStar-ral.
Legfrissebb híreink
Legutóbbi visszajelzések
![]() |
Mobile Broadband HL Service
Maradjon kapcsolatban útközben a mobil szélessávú HL szolgáltatással |
![]() |
User Experience Improvement Program Service
Fokozza felhasználói élményét az Acer Fejlesztési Program szolgáltatásával |
![]() |
Microsoft SQL Server Compact x64 ENU
Hatékony SQL Server Compact x64 rendszerekhez |
![]() |
App Explorer
Fedezze fel az alkalmazások világát a SweetLabs App Explorer segítségével. |
![]() |
HP System Event Utility
HP rendszeresemény-segédprogram: A rendszeresemények kezelésének egyszerűsítése |
![]() |
utools
Növelje termelékenységét az uTools segítségével! |
![]() |
UpdateStar Premium Edition
A szoftver naprakészen tartása még soha nem volt ilyen egyszerű az UpdateStar Premium Edition segítségével! |
![]() |
Microsoft Visual C++ 2015 Redistributable Package
Növelje a rendszer teljesítményét a Microsoft Visual C++ 2015 Redistributable Package segítségével! |
![]() |
Microsoft Edge
Új szabvány a webböngészésben |
![]() |
Google Chrome
Gyors és sokoldalú webböngésző |
![]() |
Microsoft Visual C++ 2010 Redistributable
Alapvető összetevő Visual C++ alkalmazások futtatásához |
![]() |
Microsoft Update Health Tools
Microsoft Update Health Tools: Győződjön meg arról, hogy rendszere mindig naprakész! |