U.are.U
Kensington
Selectamark
Computer
Alarms
Computer Locks
Security Software Solutions
Services
Contacts
LH-Group
briefly
Gravis
©LH-Group Oy
|
|
|
|
|
|
Product Finder:
|
As
the Internet continues its phenomenal growth, so hackers and professional fraud
operations are developing ways of intercepting information that is vital to the individual
and company alike. Attachments to e-mail messages containing your business plans,
financial details, private correspondence and credit card numbers are all vulnerable. They
can "spoof" messages to or from your business colleagues and customers. If they
are really malicious they can put you out of business. Even without the threat of hackers,
your e-mails are vulnerable. All it takes is a slightly incorrect address to cause
embarrassment, or at worst, serious damage.
The purpose of ENCRYPTION is to prevent sensitive information from being read and
understood by anyone who could use it to your disadvantage. Modern electronic encryption
uses an ENCRYPTION ALGORITHM, often called a CIPHER. An Encryption Algorithm is a set of
mathematical steps which converts PLAIN TEXT (information in a form that can easily be
read) into CIPHER TEXT. Cipher text is unintelligible to anyone who does not have access
to the secret SESSION KEY used in the encryption process. Without knowledge of the Session
Key, the only way to "break" the cipher is to try all possible key combinations.
The number of combinations is the STRENGTH of the Encryption Algorithm.
Convoy 120 solves your information security problems at a stroke. Every message you send
starts with a new session key and is one of
1,000,000,000,000,000,000,000,000,000,000,000,000
000,000,000,000,000,000,000,000,000,000,000,000 combinations
It is impossible to break the Session Key of Convoy 120 by trial and error.
Convoy 120 is extremely simple to use. It takes only a few minutes to establish a link
with another user. Thereafter the whole process is easy, very fast, automatic and totally
secure.
|
|
|
|
|
|