Archive

Posts Tagged ‘customer data leak prevention’

“How can I clear my recent documents?” Guys from AKS-LABS know how!

March 5th, 2010

Nowadays, information stored in computers is exposed to many threats. Of course, people use different software solutions to protect information. But sometimes, it seems to be impossible. Imagine such a situation. You are sharing one computer with three managers. You spend most time in the “field”, i.e. meeting with customers, but from time to time you need office PC with its database and recourses. If you are using computer after your colleague has used it, you can see which files he has accessed. Well, there is nothing bad in this. But who knows… Everybody has the right for privacy.

Or imagine that you are a system administrator who suspects that employees access and open classified files or files and documents that do not concern work. In other words, they are occupied with private things in working time.

The abovementioned situations are different, but they have a common solution. Recent Cleaner from AKS-LABS will make it possible to both erase lists of recent files and view/analyze such logs. The program is very easy in use and it is unlikely to cause any problems to users with different levels of computer literacy. If you have got a question: “How can I clear my recent documents”, AKS-LABS gives you a definite answer with its Recent Cleaner solution.

How can I clear my recent documents? Ask AKS-LABS

There is no need to type "How can I clear my recent documents" in Google. AKS-LABS has the solution

There is no need to type "How can I clear my recent documents" in Google. AKS-LABS has the solution

AS said above, this is a very simple program, so even if you want to mess things up you have no chances to succeed. There is one key menu in which you choose programs in which recent files were opened. It is possible to clear list of all files, documents and programs opened in the recent time. Thus, if you want 100% privacy, this option is exactly what you need.

It is possible to clear all files, as said above, groups of recent files (for instance all MS Office recent files or all Windows files) and individual files which you may select.

Let’s have a look at hypothetic situation. You are an administrator who needs to make sure that employees do not open forbidden Word or Excel files in their office computers. Having installed Recent Cleaner, you simple choose Excel in the left side menu and here we go… you have got 4 recently opened files. Hm…interesting…what is business offer from your competitors doing there?

To the contrary, if you are a PC user who does not want anybody to see which files you have accessed, you may finish each working session with cleaning of recent files lists.

find_password Articles , , , , , ,

Data leak prevention is something you should take care of

March 4th, 2010

Have you ever faced the problem of data leakage? We are not taking about the cases when your college roommate looked through personal photos stored in your PC. When concerning business, data leakage can cause serious problems. If your competitors somehow gained access to commercial and confidential information then you are in a trouble. Sometimes, your competitors start acting exactly like you wanted to act. This means only one thing – your employees cheat on you.

Well, this is an emergency situation and you have to do something about it. You cannot control all employees, but you can scan their computers. But there are thousands of files stored there, and it will take ages to find confidential files in network computers.

Luckily, there is Show Hidden Files solution from AKS-LABS. Why hidden files? Password protected documents and archives are suspicious. Indeed, why set a password to a file? If an employee has done so, then he has something to conceal. Consequently, password protected files are among the most interesting for you.

Show Hidden Files scans folders and hard drives to find all files, documents and archives protected with password. Thus, you do not have to waste precious time looking through all files. Just use Show Hidden Files which will provide you with excellent search results.

Data leak prevention is a key task of Show Hidden Files

Data leak prevention is a key task of Show Hidden Files

Show Hidden Files is a perfect data leak prevention tool

Show Hidden Files is a perfect data leak prevention tool

The program is very simple and thus, can be used by a wide range of people with different experience in computers and IT technologies. All you have to do is to select a directory or a hard drive which you want to scan, and the program will do everything for you.

Sure, if you have additional information on the files and archives you may use it in search by date and size options. You can find these tabs right below Search in box. If you are interested in large files only (for instance you suspect that someone has shared presentation draft which is a large file) you can adjust search settings according to your needs and requirements. As a result you will have a list of password protected files larger than, for instance, 5MB.

If you are aware of the possible date on which files were created, modified or accessed, then search by date option can be quite helpful. You can choose certain periods of time or such an option as, for example, “files created in recent 2 months.”

When the search process is finish you can summarize results in the list of found files which Show Hidden Files will make for you.

find_password Articles , , , , , ,

Data file leak prevention with Show Hidden Files utility

March 4th, 2010

Have you ever suffered losses because of data file leak? Well, this may sound like a Hollywood story to you, but the reality is – every day companies lose money because of file leakage. Important financial or fiscal information can be a serious weapon in the hands of your competitors. Can you imagine situation in which your competitors do the same things you were going to do. Exact same things! Exact same strategy! What should that mean? There is an obvious explanation – information leakage.

How can you prevent this? Create a new Gestapo in your office? Make your employees report to you every day. Hire one watchman for every employee? Everything is much simpler. As a rule, cheating employees protect forbidden files with passwords. Thus, the only thing you need to do is to find ALL password protected files, documents, pgp discs and archives.

If you have Show Hidden Files utility from AKS-LABS you will have no need in manual checking of all computers. A system administrator can enjoy comfort of his office and look for hidden files in all network computers. Maybe your employees are 100% honest! Well, be it so. But if you are armed with Show Hidden Files you will be 100% confident in them.

Data file leak prevention is a serious task for any system administrator

Data file leak prevention is a serious task for any system administrator

Purchase reliable software for data file leak prevention

Purchase reliable software for data file leak prevention

Show Hidden Files is not a complex program with numerous buttons, tabs, options and menus. You do what you see there. All functions are easy to understand. All names of the tabs speak for themselves. So, even beginners can successfully operate the program.

It is possible to select several directories or hard drives to be scanned, as well as it is possible to scan sub-folders. The search itself does not take much time. Of course, this depends on size of your hard drive.

Show Hidden Files has also two important search criteria. These are search by date and size. Of course, you can make an effective use of these search criteria if you possess relevant information, i.e. if you are aware of the files size and date. For example, you may look for files of particular size. Search by date implies looking for files which were created, accessed or modified during certain period of time. If you perform check up once every month you may choose to check files created during recent month.

Once you are done with the search you can copy all found files and archives to a folder to further work with them. It is also possible to create a list of found files.

find_password Articles , , , , , ,

Customer data leak prevention is a MUST for any business

March 4th, 2010

In the modern age of technology information security is all important. Most businesses use IT support. Moreover, businesses cannot function normally without proper IT support. The Internet is used to share information, and keeping some information confidential is a MUST. If you lose data or private/sensitive information, you will suffer serious losses. Well, this may be not loss of money. Information leakage may harm your business image which is sometimes more important than money.

System administrators in big companies have to control information flows in and outside a company network. When the network consists of 300+ computers this is not an easy task. How can you know if some employees hide something in their computers? It is physically impossible to check every PC. But check this out! If you find a password protected file in a PC, what is the first thought in your head? Right! You will think: “Why would he protect a Word file?”

So, the basic idea is – you scan computers of your employees to find all password protected files. Then you work with the files trying to break passwords. For these purposes we recommend using Find Hidden Files solution from AKS-LABS. The program is specifically designed to find all password protected files, archives and pgp discs.

Customer data leak prevention is a very serious challenge

Customer data leak prevention is a very serious challenge

Use top software for customer data leak prevention

Use top software for customer data leak prevention

Show Hidden Files can be used as a tool against cheating employees who make public personal customer information. Customer data leak prevention is a very serious task, since your customers may even sue you if they learn that their personal information is handed over to third parties.

With Show Hidden Files utility you will have an opportunity to scan network computers, so you can perform the entire procedure remotely. It is possible to select numerous locations, for instance folders from different computers.

Having additional information about files you want to find, you can use special search features as search by date and size. Search by date implies eliminating files that do not fit into search criteria. For instance, you can look for files smaller than 5 MB or larger than 60KB. Search by date is useful if you know when the files were created, modified or accessed. You can look for files created between a certain time period or in the recent days/weeks.

You can create a list of found files in txt extension, as well as copy found files to a selected directory.

find_password Articles , , , , , , ,

Database leak prevention is easy with Show Hidden Files

March 4th, 2010

Imagine that you are running a successful business, and all of a sudden you face serious problems. You competitors are acting as if they know what you were going to do, and so they are doing the same. There can be only one explanation: information leakage. But you stored all confidential information in your computers network. Perhaps, one of your employees accessed forbidden files and shared them with competitors. Well, you are in a trouble.

You contact system administrator and describe the problem. He listens and understands that existing database leak prevention system does not work. It is necessary to scan computers to find who shared sensitive information. But, what files are the most interesting to you? Well, if you run into a password protected file you will tell yourself: “Well, this guy conceals something here”. The next thing you would think of is: “Hey, it would be good to find all password protected files and crack them.”

Such a wish is a reality in AKS-LABS. Developers from this company released a program that looks for password protected files only. Show Hidden Files is a perfect tool for database leak prevention. The program will make it possible to spot all hidden files. After search process you can copy files to one location and then try to break passwords.

Show Hidden Files is a very easy to use program. All menus, tabs and functions are easy to understand, so you are unlikely to face any problems. However, if this happens you can use Help menu or contact AKS-LABS support service.

Use a reliable tool for database leak prevention

Use a reliable tool for database leak prevention

Database leak prevention is a very serious task

Database leak prevention is a very serious task

Having chosen directories and hard drives (there can be several locations) you may proceed to search. The program will spot all files protected with passwords, as well as archives and pgp discs. Hidden files will appear in the search result list. Bu the way you can apply standard right button mouse menu to these files to delete or cut them. It is also possible to copy all files to a previously selected directory.

As to the file types, Show Hidden Files can look for particular extensions. These are MS Word and Excel documents, Access databases, zip and rar archives and pgp disks. As you can see, these are the most popular office extensions.

In case you have additional information on the files you are looking for, then search by date and size tabs are the best option for you. In such a way you may eliminate undesirable files in the search result list.

find_password Articles , , , , , , ,

File leak prevention is a challenging task for system administrators

March 4th, 2010

With a rapid development of the Internet sharing of information has turned from a miracle into reality. It is possible to transfer files and huge archives via the Internet. There is no problem in uploading a 5GB file for your friends or partners to download it.

But at the same time modern technologies made it possible to steal information and use it with criminal purposes. Thus, computers need to be protected from intruders. However, it sometimes happens that employees of large companies cheat on the management by accessing and sharing sensitive information with third parties or criminals. Such actions may result in serious monetary losses or problems with competitors or even tax government authorities. As a rule, cheating employees protect forbidden files with passwords, so that no one can access them.

Progressive network security administrators use special automated system to find password protected files, as such files and archives are among the most suspicious. Show Hidden Files utility from AKS-LABS is a program that helps you find password protected files, create a list of them and copy them to one folder.

With Show Hidden Files is a perfect tool for file leak prevention. If an employee decided to protect file or archive with password, then he has something conceal. The program will scan folders and hard drives to compile a list of files and archives that are protected with passwords.

Show Hidden Files is an effective tool for file leak prevention

Show Hidden Files is an effective tool for file leak prevention

File leak prevention is a challenging task

File leak prevention is a challenging task

Show Hidden Files is widely used in police when officers confiscate computers to find crime evidence there. There is a 99,9% probability that password protected files contain important information.

Show Hidden Files can be used in the network of computers. Thus, if you are s system administrator whose goal is file leak prevention, Show Hidden Files is a very helpful solution. This search system works fast and it does not require user’s special knowledge. The program is easy and understood for users with different levels of computer literacy.

It is possible to select several folders/directories or hard drives where Show Hidden Files will search for password protected files. Once the search is complete the program can compile a list of found files, or copy the files to a selected folder.

If you possess additional information on the files, you can use search by size and date options. This will make it possible to narrow search results. For example you might be interested only in the files older than January 2, 2009.

find_password Articles , , , , , , ,

How to find hidden files? Ask us now!

March 4th, 2010

The Internet revolution has brought new threats and challenges for PC users. Security has always been an important issue for people. These days security of information is all important. Users refer to different methods to protect information from being used by third parties. There are many scammers on the Internet and companies that steal information from their competitors.

Greed makes people do stupid things. Thus, employees of large companies often access forbidden files and then send information to third parties. To protect these files and documents they use passwords. Indeed, it is really easy to protect files with passwords as you do not need any special knowledge or experience.

Many system security administrators ask a question: “How to find hidden files?” Why hidden? It is because hidden files are most suspicious. If you spot Excel document called balance-2009 then it is supposed to contain some sensitive or compromising information.

With Show Hidden Files utility you will know which employees are cheating on you.  This program focuses on search of password protected files and archives only. Show Hidden Files is very easy to use, especially for network administrators, as it can perform search in remote or network hard drives.

Don't know how to find hidden files? Ask AKS-LABS

Don't know how to find hidden files? Ask AKS-LABS

AKS-LABS will tell you how to find hidden files

AKS-LABS will tell you how to find hidden files

Show Hidden Files has a very simple interface and clear functions. You will probably need very little time to learn to operate the program. Let’s review basic steps you should take to get accurate search results.

Logically, you should select a directory or a hard drive for Show Hidden Files to look for password protected files. There can be more than one location, i.e. you can choose several hard drives or folders. There is also an option Scan sub-folders available.

Having chosen locations, the program is ready to scan them. However, if you have additional information on protected files, you may effectively use it. This concerns date and size. These two search criteria will surely help you narrow search results and find the files you have been looking for.

So, if you are interested in files of a certain or approximate size, set relevant values in the checkboxes. For example, you may be looking for files larger than 3 MB or smaller than 20MB.

Search by date implies that you know or guess when the files were created, accessed or modified. For instance, if you perform regular searches for password protected files, you may be interested only in the files created in the recent two weeks.

find_password Articles , , , ,

Find password protected files to keep information safe

March 2nd, 2010

With the rapid development of the Internet and software technologies our computers became very vulnerable to different cyber threats and attacks. The Internet is full of threats. If you do not use any tools to protect your computer and information, you are risking to lose it. However, sometimes it happens that own employees put your business in jeopardy. Some of them may access confidential files and sell them to competitors.

As a rule cheating employees try to protect such files with passwords. Thus, password protected files are among the most suspicious files. Why would anyone want to protect a file? Right! He or she has something to conceal, which is not good in terms of corporate culture.

With the help of Show Hidden Files utility from AKS-LABS you will be able to find ALL files, documents and archives protected with passwords. This program is very easy to use for people with various levels of computer literacy. In fact, there is nothing there that an ordinary PC user cannot understand. All menus and features are clear and their names speak for themselves. To make it easier for users to get desirable search results.

Use an effective tool to find password protected files

Use an effective tool to find password protected files

Find password protected files to prevent information leakage

Find password protected files to prevent information leakage

So, imagine you are a police officer who has just confiscated a computer that might contain valuable information and crime evidence. Or imagine you are a system administrator who needs to check computers in the network to find out if employees are cheating on the company. The first thing you need to do is to run Show Hidden Files. Then follow these steps:

  1. Specify directory/hard drive disk in which you want to look for password protected files. Keep in mind that if you have access to remote computers, it is possible to search in the network hard drives. You can choose several locations at a time and scan sub-folders.
  2. Search by size. If you suspect that password protected files are particularly large or small, then search by date option is a perfect choice for you. It is possible to set limits and narrow search results (for example, files larger than 2 MB or smaller than 5 MB). However, if you want to have a full picture, look for all files irrespectively of the size.
  3. Search by date. If you perform a regular check up, you are not interested in the files found 2 weeks ago. So, you may adjust the program which will search for files which have been recently created, modified or even accessed.

find_password Articles , , , , , , ,

Wipe files deleted in your computer to prevent data leakage

March 2nd, 2010

Using computer can be dangerous. Well, if your PC is not connected to the Internet and you are the only one who uses your personal computer, then you have nothing to be afraid of. But it is really difficult to find a computer that has never been connected to the Internet. In the modern age of technologies cyber attacks became too frequent. Of course, users and system administrators tend to protect computers, but hackers become shrewder and more aggressive.

One of the ways to attack computer is not restore files previously deleted in computer. If you think that you deleted a files and it can be never restored, you are mistaken. If you think that if you have deleted a file from the trash bin, this file cannot be restored, you are mistaken again. This data can be easily recovered with the help of numerous tools available on the Internet.

Data protection is very important if you computer contains some sensitive information that can be useful for your business competitors or scammers. If your company network consists of 200 and more computers it is very difficult to make sure that all files are properly deleted and they cannot be recovered by criminals.

AKS-LABS has designed a special program which protects data from being recovered. Shred Agent is the software that replaced space of the deleted files with random data. Thus, deleted files are completely wiped and cannot be recovered at all. It is possible to install Shred Agent on a server, so it is capable of working via network.

You may say that it is possible to use encryption software. But in many cases such programs are useless if hackers can recover original plaintext files. Shred Agent works on the hardware level. So, it physically replaced space, where deleted files were located, with random data. With Shred Agent you can feel sure that if you deleted the file you have deleted it forever, and no software can help ill-wishers to restore it.

Shred Agent has many advantages over similar programs, as wiping options can be adjusted, so you can decide which files need to be wiped and in what particular instances. So, let’s make a review of the program for potential users to fully understand benefits of Shred Agent.

Shred Agent will wipe deleted files

Shred Agent will wipe deleted files

Once you install Shed Agent you will see an icon in the system tray. It needs saying that Shed Agent has two modes: active and passive. In active mode it detects all the files that were deleted. Consequently, in passive mode the program has no effect. You can also hide the icon in the system tray. To activate passive mode, select Stop driver.

There is another very interesting menu – Options. This is what makes Shed Agent different from other similar utilities. By adjusting options, you can set files extensions in which you have no interest, or vice versa in which you have a particular interest. Let’s see what you can do.

Filter menu has two sub-menus: Include and Exclude. Logically, Exclude options sets file extensions which must not be wiped by the program. It may happen that all Word files used in your company contain no sensitive information, while Excel files are extremely informative and vulnerable to threats.

Protect your computer with Shred Agent

Protect your computer with Shred Agent

Include option sets masks (extensions) of files in which you have a particular interest. For instance, as said above, Excel spreadsheets as a rule contain financial information. Thus, by setting *.xls mask you order Shed Agent to completely wipe all deleted Excel files. Basically, you can do that for any file type. Masks can be added, edited and deleted.

Shred agent can locate temporary MS Office files. As known, when we create a document in any of MS Office programs a temporary file is also being created. When the doc is closed and save the temp file disappears. However, it is deleted in the way all files are deleted. Thus, if can be recovered. Shred Agent can also wipe temporary files, so nobody will be able to spot any tracks of your documents.

Thus, you may decide which files are important to you, and which ones contain no sensitive information. Shred Agent will take your preferences into account. So, having once adjusted the program you may forget that it even exists.

Shred Agent can also wipe free space in your hard drive, i.e. previously deleted files. Thus, you can feel sure that no one will access files deleted before you installed Shed Agent.

It is possible to view logs which contain information on deletion time, full path to deleted files, total size of deleted files, number of wiped files, their total size etc. In such a way you will have full information on what Shed Agent has done.

Who will make the most effective use of Shed Agent? As said above, the program protects information and files so that no one can ever recover them after being deleted. Sure, this is a must have tools for all PC users whose computers may be exposed to cyber threat. Of course, if your PC does not contain any sensitive or compromising info, you have nothing to hide. But what if information on your business may give advantage to you competitors?

Shed Agent is helpful for system and network administrator. By installing Shed Agent on a server or all PCs in the network, such an administrator makes sure that no one will have access to files that have been deleted.

This is also a good tool for security departments of banks, major corporations, financial institutions, police etc. Shed Agent makes you invulnerable to hackers wishing to restore deleted files. Loss or leakage of data can cost you much money or your reputation. With Shred Agent you can feel 100% confident.

It goes without saying that by purchasing software products from AKS-LABS you are entitled to get a high quality tech support. Thus, if you have any questions or offers as to improvement of this software, feel free to contact AKS-LABS support.

Shred Agent wipes files after being deleted

Shred Agent wipes files after being deleted

Shred Agent is a must for every system administrator

Shred Agent is a must for every system administrator

find_password Articles , , ,