Archive

Posts Tagged ‘database leak prevention’

Data file leak prevention with Show Hidden Files utility

March 4th, 2010

Have you ever suffered losses because of data file leak? Well, this may sound like a Hollywood story to you, but the reality is – every day companies lose money because of file leakage. Important financial or fiscal information can be a serious weapon in the hands of your competitors. Can you imagine situation in which your competitors do the same things you were going to do. Exact same things! Exact same strategy! What should that mean? There is an obvious explanation – information leakage.

How can you prevent this? Create a new Gestapo in your office? Make your employees report to you every day. Hire one watchman for every employee? Everything is much simpler. As a rule, cheating employees protect forbidden files with passwords. Thus, the only thing you need to do is to find ALL password protected files, documents, pgp discs and archives.

If you have Show Hidden Files utility from AKS-LABS you will have no need in manual checking of all computers. A system administrator can enjoy comfort of his office and look for hidden files in all network computers. Maybe your employees are 100% honest! Well, be it so. But if you are armed with Show Hidden Files you will be 100% confident in them.

Data file leak prevention is a serious task for any system administrator

Data file leak prevention is a serious task for any system administrator

Purchase reliable software for data file leak prevention

Purchase reliable software for data file leak prevention

Show Hidden Files is not a complex program with numerous buttons, tabs, options and menus. You do what you see there. All functions are easy to understand. All names of the tabs speak for themselves. So, even beginners can successfully operate the program.

It is possible to select several directories or hard drives to be scanned, as well as it is possible to scan sub-folders. The search itself does not take much time. Of course, this depends on size of your hard drive.

Show Hidden Files has also two important search criteria. These are search by date and size. Of course, you can make an effective use of these search criteria if you possess relevant information, i.e. if you are aware of the files size and date. For example, you may look for files of particular size. Search by date implies looking for files which were created, accessed or modified during certain period of time. If you perform check up once every month you may choose to check files created during recent month.

Once you are done with the search you can copy all found files and archives to a folder to further work with them. It is also possible to create a list of found files.

find_password Articles , , , , , ,

Customer data leak prevention is a MUST for any business

March 4th, 2010

In the modern age of technology information security is all important. Most businesses use IT support. Moreover, businesses cannot function normally without proper IT support. The Internet is used to share information, and keeping some information confidential is a MUST. If you lose data or private/sensitive information, you will suffer serious losses. Well, this may be not loss of money. Information leakage may harm your business image which is sometimes more important than money.

System administrators in big companies have to control information flows in and outside a company network. When the network consists of 300+ computers this is not an easy task. How can you know if some employees hide something in their computers? It is physically impossible to check every PC. But check this out! If you find a password protected file in a PC, what is the first thought in your head? Right! You will think: “Why would he protect a Word file?”

So, the basic idea is – you scan computers of your employees to find all password protected files. Then you work with the files trying to break passwords. For these purposes we recommend using Find Hidden Files solution from AKS-LABS. The program is specifically designed to find all password protected files, archives and pgp discs.

Customer data leak prevention is a very serious challenge

Customer data leak prevention is a very serious challenge

Use top software for customer data leak prevention

Use top software for customer data leak prevention

Show Hidden Files can be used as a tool against cheating employees who make public personal customer information. Customer data leak prevention is a very serious task, since your customers may even sue you if they learn that their personal information is handed over to third parties.

With Show Hidden Files utility you will have an opportunity to scan network computers, so you can perform the entire procedure remotely. It is possible to select numerous locations, for instance folders from different computers.

Having additional information about files you want to find, you can use special search features as search by date and size. Search by date implies eliminating files that do not fit into search criteria. For instance, you can look for files smaller than 5 MB or larger than 60KB. Search by date is useful if you know when the files were created, modified or accessed. You can look for files created between a certain time period or in the recent days/weeks.

You can create a list of found files in txt extension, as well as copy found files to a selected directory.

find_password Articles , , , , , , ,

Database leak prevention is easy with Show Hidden Files

March 4th, 2010

Imagine that you are running a successful business, and all of a sudden you face serious problems. You competitors are acting as if they know what you were going to do, and so they are doing the same. There can be only one explanation: information leakage. But you stored all confidential information in your computers network. Perhaps, one of your employees accessed forbidden files and shared them with competitors. Well, you are in a trouble.

You contact system administrator and describe the problem. He listens and understands that existing database leak prevention system does not work. It is necessary to scan computers to find who shared sensitive information. But, what files are the most interesting to you? Well, if you run into a password protected file you will tell yourself: “Well, this guy conceals something here”. The next thing you would think of is: “Hey, it would be good to find all password protected files and crack them.”

Such a wish is a reality in AKS-LABS. Developers from this company released a program that looks for password protected files only. Show Hidden Files is a perfect tool for database leak prevention. The program will make it possible to spot all hidden files. After search process you can copy files to one location and then try to break passwords.

Show Hidden Files is a very easy to use program. All menus, tabs and functions are easy to understand, so you are unlikely to face any problems. However, if this happens you can use Help menu or contact AKS-LABS support service.

Use a reliable tool for database leak prevention

Use a reliable tool for database leak prevention

Database leak prevention is a very serious task

Database leak prevention is a very serious task

Having chosen directories and hard drives (there can be several locations) you may proceed to search. The program will spot all files protected with passwords, as well as archives and pgp discs. Hidden files will appear in the search result list. Bu the way you can apply standard right button mouse menu to these files to delete or cut them. It is also possible to copy all files to a previously selected directory.

As to the file types, Show Hidden Files can look for particular extensions. These are MS Word and Excel documents, Access databases, zip and rar archives and pgp disks. As you can see, these are the most popular office extensions.

In case you have additional information on the files you are looking for, then search by date and size tabs are the best option for you. In such a way you may eliminate undesirable files in the search result list.

find_password Articles , , , , , , ,