iolo System Sheild
ID和信息窃取是一个非常严重的危胁,即使删除数据或格式化硬盘,也不足以保证您的数据安全。只需简单的工具,就可以将数据、私人信件、信用卡帐号、个人图片、video或其他信息从已经“干净”的硬盘上取走。
System Shield是一个功能强大、简单易用的方案,能够防止信息/ID窃取。
产品概述
System Shield可以保护您的电脑,防止未经授权的数据恢复行为。
比如当您购买新的PC或硬盘时,可曾考虑过您原有硬盘上个人信息和数据的安全问题,也许您已经将其删除,然而事实上,仅仅删除文件并不能使其完全从磁盘上消失,简单的软件就可以将文件恢复。
ID和信息窃取
随着Internet的日益流行,作为一种新的网络犯罪行为,ID窃取也越来越严重的威胁着人们的信息安全。一旦别人窃取了您的ID,那么对电脑和网络而言,他所做的一切事情,如利用您的信用卡购物、填写支票甚至是犯罪行为,实施人都是ID所有者,也就是您本人。
您是否将自己的信用卡号、名字、地址或电话号码输入到了电脑文档中?可曾安装或使用过不合法的软件?也许您已将其卸载或删除掉了,然而实际上,所有这一切仍然存在于您的硬盘中,而且很容易恢复。防毒软件可以不断更新自己的病毒库,然而只有当病毒已经感染了一定数目的计算机,它们才会被发现并添加到病毒库列表中。有些雇员会登录到高级安全计算机终端,窃取公司机密。只要具备了基本的电脑知识,就可以下载并安装某些软件来恢复您已经删除的数据。
为此,iolo 最近推出的一款磁盘保护(防恢复)软件,是对 system mechanic 焚烧炉组件的提练和升华,主要功能有:
--基于防付软件性数据恢复工具和硬件性数据恢复工具,来保护你的系统、文件和信息安全!
--清理技术依从美国、德国及其他提出的安全处理要求,并能自定义数据擦除写入签名、磁盘写入方式和对 ntfs 缓冲器进行清理。
--能够根据计划自动进行清理,兼容所有 windows 系统平台和兼容 fat16、fat32、ntfs 磁盘文件格式。
--全面的驱动器安全分析功能,通过图例来说明计算机当前的风险程度。
iolo System Sheild
Fight identity theft! System Shield provides you with military-strength defense against attemps at recovering confidential information on your computer.
Identity and information theft is a very real threat, and deleting data or even formatting your hard drive is just not enough to protect your data from thieves.
System Shield is your powerful, easy to use solution against information and identity theft.
Contrary to popular belief, anything and everything you have installed, used or even just looked at on your PC is still there. Deleting a file isn’t enough. Deleting a whole directory isn’t enough. Removing files from your Recycle Bin isn’t enough. Even formatting the whole hard drive isn’t enough.
With the use of simple and readily-available tools, data, private correspondence, credit card numbers, personal pictures, videos, and other identifiable information may be pulled straight-off your supposedly "clean" hard drive.
What is System Shield™, and how does it work?
In simple terms, System Shield was designed to protect your computer from unauthorized attempts at recovering data that was intended to remain private or confidential. Most people believe that when a file is deleted, it is permanently and irrecoverably "gone". This assumption is far from the truth. Read on for more information on how our PC security software can protect you.
Identity and information theft can and does happen!
Identity theft is the designer-crime of the new century. It is primarily driven by the incredible surge in Internet popularity, coupled with the fact that most people are unaware of the dangers associated with being literally networked together with the rest of the world, and have no idea how to properly protect themselves. When someone steals your identity, they virtually BECOME you, purchasing items on credit, committing crimes, writing checks, and engaging in many other disastrous actions.
Thinking about selling, donating, or throwing away your PC?
Consider this the next time you decide to upgrade to a new PC, or even hard drive: Are you comfortable with the fact that anyone whom you sell or give these old peripherals to can, and in many cases will, extract the data that used to be on your PC? How many personal files are contained therein? How many confidential emails did you send or receive? How many private pictures found their way on to your system? What sort of websites have you "accidentally" browsed?
Incriminating evidence is probably on your PC right now!
Have you ever entered your credit card number, name, address, or telephone number in a document on your computer? Have any unsavory pictures ever made their way onto your PC? Has anything that can ever be construed as illegal been used or installed, even if they were uninstalled and deleted? All of these may still be easily recoverable! Use our PC security software, and don’t let this information fall into the wrong hands.
Even the best internet-firewalls and virus scanners aren’t 100% secure!
If you think about it, how does a company that makes a virus scanner know to add a new virus to its list? The virus must have been found, and have infected an uncounted number of computers already. The same goes for Internet security holes: they can only be protected against once they have been discovered. What does this mean? It means you need even more protection!
Trade secrets and other confidential documents are stolen every day!
There are untold numbers of cases where disgruntled employees secretly log onto high-security computer terminals in an attempt to find valuable information that may be sold or otherwise improperly confiscated. It takes five minutes for someone with basic computer skills to sit down, install, and use freely available software to recover anything you’ve deleted on any computer.
Take control of what files stay on your PC!
Most of