Archive

Posts Tagged ‘data leak prevention’

Recent Cleaner, delete my recent documents, please! :)

March 5th, 2010

Since computers are so popular and used virtually everywhere, it is becoming increasingly difficult to keep your PC private. You family uses it. You colleagues may ask you to let them spend several minutes at your laptop. This is Ok for you, but you really do not want to let them see which files you have recently opened.

If you do not know that most programs have lists of recent files, then learning this fact may be a sensation for you. But for experienced PC users this is a well known fact. It is possible to see which files you have recently opened. Sure, if you are not a secret agent or an assassin, you have nothing to conceal. However, sometimes you do not feel comfortable when somebody known what files you have recently opened.

System administrators often have to keep an eye on employees. Some of them are occupied with private things, while others cheat on the company, i.e. access forbidden files which contain sensitive and confidential information. With Recent Cleaner from AKS-LABS administrators will have an opportunity to see which files were recent opened in a particular PC. Moreover, this program makes it possible to see files opened in the most popular office programs. Of course, this is MS Office software product family. We all use Word, Excel, Power Point, Front Page and Access. Recent Cleaner will display a list of recent files once you click on a relevant button. You can also view an entire list of files and programs recently opened in a particular computer.

You ask yourself: "How to delete my recent documents?" Here is the solution

You ask yourself: "How to delete my recent documents?" Here is the solution

Recent Cleaner, delete my recent documents, please! :)

Recent Cleaner, delete my recent documents, please! :)

The program has one main menu which is located on the left side. This is the list of programs, and as said above, you choose recent files by clicking on an icon. Recent Cleaner makes it possible to erase recent files lists in different ways. Thus, you can erase ALL records, in a lists of all recent files in all programs. It is possible to delete file in groups, for example all Excel files or Win rar archives. Finally, you can choose individual files to be deleted. For example, you have opened one file in your colleague’s computer. Using Recent Cleaner you can delete this file from recent files list, so that he does not know that you were using MS Word.

There is also a reporting function. The report displays the number of recent files as well as number of deleted recent files.

find_password Articles , , , , ,

Data leak prevention is something you should take care of

March 4th, 2010

Have you ever faced the problem of data leakage? We are not taking about the cases when your college roommate looked through personal photos stored in your PC. When concerning business, data leakage can cause serious problems. If your competitors somehow gained access to commercial and confidential information then you are in a trouble. Sometimes, your competitors start acting exactly like you wanted to act. This means only one thing – your employees cheat on you.

Well, this is an emergency situation and you have to do something about it. You cannot control all employees, but you can scan their computers. But there are thousands of files stored there, and it will take ages to find confidential files in network computers.

Luckily, there is Show Hidden Files solution from AKS-LABS. Why hidden files? Password protected documents and archives are suspicious. Indeed, why set a password to a file? If an employee has done so, then he has something to conceal. Consequently, password protected files are among the most interesting for you.

Show Hidden Files scans folders and hard drives to find all files, documents and archives protected with password. Thus, you do not have to waste precious time looking through all files. Just use Show Hidden Files which will provide you with excellent search results.

Data leak prevention is a key task of Show Hidden Files

Data leak prevention is a key task of Show Hidden Files

Show Hidden Files is a perfect data leak prevention tool

Show Hidden Files is a perfect data leak prevention tool

The program is very simple and thus, can be used by a wide range of people with different experience in computers and IT technologies. All you have to do is to select a directory or a hard drive which you want to scan, and the program will do everything for you.

Sure, if you have additional information on the files and archives you may use it in search by date and size options. You can find these tabs right below Search in box. If you are interested in large files only (for instance you suspect that someone has shared presentation draft which is a large file) you can adjust search settings according to your needs and requirements. As a result you will have a list of password protected files larger than, for instance, 5MB.

If you are aware of the possible date on which files were created, modified or accessed, then search by date option can be quite helpful. You can choose certain periods of time or such an option as, for example, “files created in recent 2 months.”

When the search process is finish you can summarize results in the list of found files which Show Hidden Files will make for you.

find_password Articles , , , , , ,

Data file leak prevention with Show Hidden Files utility

March 4th, 2010

Have you ever suffered losses because of data file leak? Well, this may sound like a Hollywood story to you, but the reality is – every day companies lose money because of file leakage. Important financial or fiscal information can be a serious weapon in the hands of your competitors. Can you imagine situation in which your competitors do the same things you were going to do. Exact same things! Exact same strategy! What should that mean? There is an obvious explanation – information leakage.

How can you prevent this? Create a new Gestapo in your office? Make your employees report to you every day. Hire one watchman for every employee? Everything is much simpler. As a rule, cheating employees protect forbidden files with passwords. Thus, the only thing you need to do is to find ALL password protected files, documents, pgp discs and archives.

If you have Show Hidden Files utility from AKS-LABS you will have no need in manual checking of all computers. A system administrator can enjoy comfort of his office and look for hidden files in all network computers. Maybe your employees are 100% honest! Well, be it so. But if you are armed with Show Hidden Files you will be 100% confident in them.

Data file leak prevention is a serious task for any system administrator

Data file leak prevention is a serious task for any system administrator

Purchase reliable software for data file leak prevention

Purchase reliable software for data file leak prevention

Show Hidden Files is not a complex program with numerous buttons, tabs, options and menus. You do what you see there. All functions are easy to understand. All names of the tabs speak for themselves. So, even beginners can successfully operate the program.

It is possible to select several directories or hard drives to be scanned, as well as it is possible to scan sub-folders. The search itself does not take much time. Of course, this depends on size of your hard drive.

Show Hidden Files has also two important search criteria. These are search by date and size. Of course, you can make an effective use of these search criteria if you possess relevant information, i.e. if you are aware of the files size and date. For example, you may look for files of particular size. Search by date implies looking for files which were created, accessed or modified during certain period of time. If you perform check up once every month you may choose to check files created during recent month.

Once you are done with the search you can copy all found files and archives to a folder to further work with them. It is also possible to create a list of found files.

find_password Articles , , , , , ,

Customer data leak prevention is a MUST for any business

March 4th, 2010

In the modern age of technology information security is all important. Most businesses use IT support. Moreover, businesses cannot function normally without proper IT support. The Internet is used to share information, and keeping some information confidential is a MUST. If you lose data or private/sensitive information, you will suffer serious losses. Well, this may be not loss of money. Information leakage may harm your business image which is sometimes more important than money.

System administrators in big companies have to control information flows in and outside a company network. When the network consists of 300+ computers this is not an easy task. How can you know if some employees hide something in their computers? It is physically impossible to check every PC. But check this out! If you find a password protected file in a PC, what is the first thought in your head? Right! You will think: “Why would he protect a Word file?”

So, the basic idea is – you scan computers of your employees to find all password protected files. Then you work with the files trying to break passwords. For these purposes we recommend using Find Hidden Files solution from AKS-LABS. The program is specifically designed to find all password protected files, archives and pgp discs.

Customer data leak prevention is a very serious challenge

Customer data leak prevention is a very serious challenge

Use top software for customer data leak prevention

Use top software for customer data leak prevention

Show Hidden Files can be used as a tool against cheating employees who make public personal customer information. Customer data leak prevention is a very serious task, since your customers may even sue you if they learn that their personal information is handed over to third parties.

With Show Hidden Files utility you will have an opportunity to scan network computers, so you can perform the entire procedure remotely. It is possible to select numerous locations, for instance folders from different computers.

Having additional information about files you want to find, you can use special search features as search by date and size. Search by date implies eliminating files that do not fit into search criteria. For instance, you can look for files smaller than 5 MB or larger than 60KB. Search by date is useful if you know when the files were created, modified or accessed. You can look for files created between a certain time period or in the recent days/weeks.

You can create a list of found files in txt extension, as well as copy found files to a selected directory.

find_password Articles , , , , , , ,

Database leak prevention is easy with Show Hidden Files

March 4th, 2010

Imagine that you are running a successful business, and all of a sudden you face serious problems. You competitors are acting as if they know what you were going to do, and so they are doing the same. There can be only one explanation: information leakage. But you stored all confidential information in your computers network. Perhaps, one of your employees accessed forbidden files and shared them with competitors. Well, you are in a trouble.

You contact system administrator and describe the problem. He listens and understands that existing database leak prevention system does not work. It is necessary to scan computers to find who shared sensitive information. But, what files are the most interesting to you? Well, if you run into a password protected file you will tell yourself: “Well, this guy conceals something here”. The next thing you would think of is: “Hey, it would be good to find all password protected files and crack them.”

Such a wish is a reality in AKS-LABS. Developers from this company released a program that looks for password protected files only. Show Hidden Files is a perfect tool for database leak prevention. The program will make it possible to spot all hidden files. After search process you can copy files to one location and then try to break passwords.

Show Hidden Files is a very easy to use program. All menus, tabs and functions are easy to understand, so you are unlikely to face any problems. However, if this happens you can use Help menu or contact AKS-LABS support service.

Use a reliable tool for database leak prevention

Use a reliable tool for database leak prevention

Database leak prevention is a very serious task

Database leak prevention is a very serious task

Having chosen directories and hard drives (there can be several locations) you may proceed to search. The program will spot all files protected with passwords, as well as archives and pgp discs. Hidden files will appear in the search result list. Bu the way you can apply standard right button mouse menu to these files to delete or cut them. It is also possible to copy all files to a previously selected directory.

As to the file types, Show Hidden Files can look for particular extensions. These are MS Word and Excel documents, Access databases, zip and rar archives and pgp disks. As you can see, these are the most popular office extensions.

In case you have additional information on the files you are looking for, then search by date and size tabs are the best option for you. In such a way you may eliminate undesirable files in the search result list.

find_password Articles , , , , , , ,

File leak prevention is a challenging task for system administrators

March 4th, 2010

With a rapid development of the Internet sharing of information has turned from a miracle into reality. It is possible to transfer files and huge archives via the Internet. There is no problem in uploading a 5GB file for your friends or partners to download it.

But at the same time modern technologies made it possible to steal information and use it with criminal purposes. Thus, computers need to be protected from intruders. However, it sometimes happens that employees of large companies cheat on the management by accessing and sharing sensitive information with third parties or criminals. Such actions may result in serious monetary losses or problems with competitors or even tax government authorities. As a rule, cheating employees protect forbidden files with passwords, so that no one can access them.

Progressive network security administrators use special automated system to find password protected files, as such files and archives are among the most suspicious. Show Hidden Files utility from AKS-LABS is a program that helps you find password protected files, create a list of them and copy them to one folder.

With Show Hidden Files is a perfect tool for file leak prevention. If an employee decided to protect file or archive with password, then he has something conceal. The program will scan folders and hard drives to compile a list of files and archives that are protected with passwords.

Show Hidden Files is an effective tool for file leak prevention

Show Hidden Files is an effective tool for file leak prevention

File leak prevention is a challenging task

File leak prevention is a challenging task

Show Hidden Files is widely used in police when officers confiscate computers to find crime evidence there. There is a 99,9% probability that password protected files contain important information.

Show Hidden Files can be used in the network of computers. Thus, if you are s system administrator whose goal is file leak prevention, Show Hidden Files is a very helpful solution. This search system works fast and it does not require user’s special knowledge. The program is easy and understood for users with different levels of computer literacy.

It is possible to select several folders/directories or hard drives where Show Hidden Files will search for password protected files. Once the search is complete the program can compile a list of found files, or copy the files to a selected folder.

If you possess additional information on the files, you can use search by size and date options. This will make it possible to narrow search results. For example you might be interested only in the files older than January 2, 2009.

find_password Articles , , , , , , ,

Find pgp disc with Show Hidden Files solution from AKS-LABS

March 4th, 2010

Nowadays, people have different means of encrypting and protecting information. The new age of technology brought new challenges and risks. Information is very valuable these days. If you lose sensitive information you may suffer serious losses or spoil your business image.

But sometimes it happens that if your employees have protected some files with password they have some illegal intentions. Cheating employees can hand the information over to your competitors or sell it to scammers. There are many frauds on the Internet, so you need to be very careful there. So, if you need to check computers of your employees, the first files and documents you have to pay attention to, are password protected files. Such files and archives are the most suspicious.

As said above, these days, computers contain very valuable information. Some of this information may be crime evidence, especially when it concerns financial online scams. So, police often confiscates computers and laptops. What files are the most interesting to them? Of course, these are password protected files and archives as well as pgp discs.

Using Show Hidden Files you will easily spot password protected files, no matter where they might be located. Moreover, you can scan network computers to check if their users store some password protected files.

You do not need any special IT knowledge to use Show Hidden Files. The program is really simple and effective. All you need to know is the possible location of password protected files. However, even if you do not have such information, you can scan the entire computer, although this will take more time.

Use Show Hidden Files to find find pgp disk

Use Show Hidden Files to find find pgp disk

Find pgp disc with Show Hidden Files utility

Find pgp disc with Show Hidden Files utility

People often use pgp discs which are systems that make it possible to create a virtual encrypted disk within a file. In My computer menu it will look like a virtual disc which you can mount and unmount.  PGP discs contain encrypted information, and thus they may look suspicious to system administrators or police.

In you are interested in pgp discs only (for instance you have information that pgp discs contain valuable information that was going to be sold) you may check the relevant box in Search for tab. There, you can also choose certain file types which you pay a special attention to. These are MS Word and Excel documents, zip and rar archives, Access databases. All these filet ypes may contain sensitive information.

Show Hidden Files is a perfect tool to find important files protected with passwords. Besides, the program even suggests you tools to recover or break passwords.

find_password Articles , , , ,

Find password protected files to keep information safe

March 2nd, 2010

With the rapid development of the Internet and software technologies our computers became very vulnerable to different cyber threats and attacks. The Internet is full of threats. If you do not use any tools to protect your computer and information, you are risking to lose it. However, sometimes it happens that own employees put your business in jeopardy. Some of them may access confidential files and sell them to competitors.

As a rule cheating employees try to protect such files with passwords. Thus, password protected files are among the most suspicious files. Why would anyone want to protect a file? Right! He or she has something to conceal, which is not good in terms of corporate culture.

With the help of Show Hidden Files utility from AKS-LABS you will be able to find ALL files, documents and archives protected with passwords. This program is very easy to use for people with various levels of computer literacy. In fact, there is nothing there that an ordinary PC user cannot understand. All menus and features are clear and their names speak for themselves. To make it easier for users to get desirable search results.

Use an effective tool to find password protected files

Use an effective tool to find password protected files

Find password protected files to prevent information leakage

Find password protected files to prevent information leakage

So, imagine you are a police officer who has just confiscated a computer that might contain valuable information and crime evidence. Or imagine you are a system administrator who needs to check computers in the network to find out if employees are cheating on the company. The first thing you need to do is to run Show Hidden Files. Then follow these steps:

  1. Specify directory/hard drive disk in which you want to look for password protected files. Keep in mind that if you have access to remote computers, it is possible to search in the network hard drives. You can choose several locations at a time and scan sub-folders.
  2. Search by size. If you suspect that password protected files are particularly large or small, then search by date option is a perfect choice for you. It is possible to set limits and narrow search results (for example, files larger than 2 MB or smaller than 5 MB). However, if you want to have a full picture, look for all files irrespectively of the size.
  3. Search by date. If you perform a regular check up, you are not interested in the files found 2 weeks ago. So, you may adjust the program which will search for files which have been recently created, modified or even accessed.

find_password Articles , , , , , , ,

Wipe files deleted in your computer to prevent data leakage

March 2nd, 2010

Using computer can be dangerous. Well, if your PC is not connected to the Internet and you are the only one who uses your personal computer, then you have nothing to be afraid of. But it is really difficult to find a computer that has never been connected to the Internet. In the modern age of technologies cyber attacks became too frequent. Of course, users and system administrators tend to protect computers, but hackers become shrewder and more aggressive.

One of the ways to attack computer is not restore files previously deleted in computer. If you think that you deleted a files and it can be never restored, you are mistaken. If you think that if you have deleted a file from the trash bin, this file cannot be restored, you are mistaken again. This data can be easily recovered with the help of numerous tools available on the Internet.

Data protection is very important if you computer contains some sensitive information that can be useful for your business competitors or scammers. If your company network consists of 200 and more computers it is very difficult to make sure that all files are properly deleted and they cannot be recovered by criminals.

AKS-LABS has designed a special program which protects data from being recovered. Shred Agent is the software that replaced space of the deleted files with random data. Thus, deleted files are completely wiped and cannot be recovered at all. It is possible to install Shred Agent on a server, so it is capable of working via network.

You may say that it is possible to use encryption software. But in many cases such programs are useless if hackers can recover original plaintext files. Shred Agent works on the hardware level. So, it physically replaced space, where deleted files were located, with random data. With Shred Agent you can feel sure that if you deleted the file you have deleted it forever, and no software can help ill-wishers to restore it.

Shred Agent has many advantages over similar programs, as wiping options can be adjusted, so you can decide which files need to be wiped and in what particular instances. So, let’s make a review of the program for potential users to fully understand benefits of Shred Agent.

Shred Agent will wipe deleted files

Shred Agent will wipe deleted files

Once you install Shed Agent you will see an icon in the system tray. It needs saying that Shed Agent has two modes: active and passive. In active mode it detects all the files that were deleted. Consequently, in passive mode the program has no effect. You can also hide the icon in the system tray. To activate passive mode, select Stop driver.

There is another very interesting menu – Options. This is what makes Shed Agent different from other similar utilities. By adjusting options, you can set files extensions in which you have no interest, or vice versa in which you have a particular interest. Let’s see what you can do.

Filter menu has two sub-menus: Include and Exclude. Logically, Exclude options sets file extensions which must not be wiped by the program. It may happen that all Word files used in your company contain no sensitive information, while Excel files are extremely informative and vulnerable to threats.

Protect your computer with Shred Agent

Protect your computer with Shred Agent

Include option sets masks (extensions) of files in which you have a particular interest. For instance, as said above, Excel spreadsheets as a rule contain financial information. Thus, by setting *.xls mask you order Shed Agent to completely wipe all deleted Excel files. Basically, you can do that for any file type. Masks can be added, edited and deleted.

Shred agent can locate temporary MS Office files. As known, when we create a document in any of MS Office programs a temporary file is also being created. When the doc is closed and save the temp file disappears. However, it is deleted in the way all files are deleted. Thus, if can be recovered. Shred Agent can also wipe temporary files, so nobody will be able to spot any tracks of your documents.

Thus, you may decide which files are important to you, and which ones contain no sensitive information. Shred Agent will take your preferences into account. So, having once adjusted the program you may forget that it even exists.

Shred Agent can also wipe free space in your hard drive, i.e. previously deleted files. Thus, you can feel sure that no one will access files deleted before you installed Shed Agent.

It is possible to view logs which contain information on deletion time, full path to deleted files, total size of deleted files, number of wiped files, their total size etc. In such a way you will have full information on what Shed Agent has done.

Who will make the most effective use of Shed Agent? As said above, the program protects information and files so that no one can ever recover them after being deleted. Sure, this is a must have tools for all PC users whose computers may be exposed to cyber threat. Of course, if your PC does not contain any sensitive or compromising info, you have nothing to hide. But what if information on your business may give advantage to you competitors?

Shed Agent is helpful for system and network administrator. By installing Shed Agent on a server or all PCs in the network, such an administrator makes sure that no one will have access to files that have been deleted.

This is also a good tool for security departments of banks, major corporations, financial institutions, police etc. Shed Agent makes you invulnerable to hackers wishing to restore deleted files. Loss or leakage of data can cost you much money or your reputation. With Shred Agent you can feel 100% confident.

It goes without saying that by purchasing software products from AKS-LABS you are entitled to get a high quality tech support. Thus, if you have any questions or offers as to improvement of this software, feel free to contact AKS-LABS support.

Shred Agent wipes files after being deleted

Shred Agent wipes files after being deleted

Shred Agent is a must for every system administrator

Shred Agent is a must for every system administrator

find_password Articles , , ,