What is most important in the information age, of course, the privacy! everyone has the desire of peeping privacy, especially in an era of rapid development of the network. Respect for and protection of privacy has become everyone's always in the mouth of another word. Recently, the Internet sector's two giants, Tencent and 360 major strikes because privacy, to make a lot of heated discussions. This is not, today their disputes and upgrade. Tencent big Tiger Mountain, a mountain brook no second Tiger, the domestic users of the computer as the main battlefield of fighting with the 360, the beat is a bee. Computer-to-end of war is the exception, on the cell phone hot privacy protection is urgently needed. Mobile phone as the modern people are used to communicate one of the essential tools, in which the content is in need of protection and inviolability. Many people like to look at other people's cell phones, especially among friends jokingly what time this is the most. Most people are dying, not good not to each other, often this time was the most embarrassing.
ET privacy lock is a powerful software private application encryption tools, through the encrypted to protect the software, whether it's your business card holder, the communication records, messages, photos, music, multimedia information, file management, program management, Notepad, memoranda, etc. with the program or install third party software and games, and so on can not be run directly and fully achieve the things I pipe, fully encrypted. Regardless of whether in any case, apart from you, other people do not have a password, in the face of the phone when completely retaining outside, effectively prevent malicious against others.
ET privacy lock
First, the function sets the
Lock function ET private interface is very simple, feature item only one program locks option. Open the program lock option, enter the following into the unlocked program and locked program, the program's interface is not locked by key or the OK key to confirm the multiple program marks the selected one at a time, you want to lock. If the installation program more, are available through digital 0 keys to quickly search. Decryption is also used to confirm the key or the delete button, the operation is very simple.
Program status view interface
2. encryption approach
ET privacy lock software offers three types of encryption are handled. The first is regular ask password, this approach is the need to pass the password to open the software. The second is to close the program, this function I personally prefer to think it is more practical, lock program clicks will flash briefly, so that both will not prompt the need password embarrassing or offensive. The third prompt function, this function is only a hint to the role, a little anti gentleman guard dog. And prompt content cannot be customized, no practical.
Encryption approach
3. software settings
Software settings are some of the General program options, such as power-on self starting, program lock function in open and select the encryption approach, such as personal preferences to set.
Program settings
Password settings too, initial passwords are relatively simple. Very vulnerable to cracking, we recommend that if your phone is often someone flips, installed after the initial password to modify it. However, the modified password must be borne in mind that you will use up a lot of trouble.
Password settings
IV. Summary
ET privacy lock attracts me most is that it's directly off this approach, it seems to me very
No comments:
Post a Comment