Cookie Consent by Privacy Policies website
 
Language selection:   Deutsch   Deutsch   |   English   English

abylonsoft - Dr. Thomas Klabunde (Filter: Shareware)

The following programmes are presented to you by:

E-mail:sw1 [at] abylonsoft [dot] de
Phone:06724-602759-0
Facsimile:06724-602759-1
Website:www.abylonsoft.de

Filter: Freeware | Full version | Demo | Evaluation | Cardware | Adware | Open Source - Delete filter

abylon CRYPTDRIVE

Protect your data against illegal access with the abylon CRYPTDRIVE. The encrypted drives can be open with passwords, chip cards, removable media (e.g. memory stick), CD or X.509-certificate. Only with correct authentication the CRYPTDRIVE is displayed in the File Explorer as drive and the access to the encrypted data is possible. If you lose your notebook, the closed drives are invisible and secure like a safe through AES or Blowfish encryption. More…

abylon ENTERPRISE

The protection of the computer and stored files against undesirable access is more and more important. This Security-Suite offers innovative and professional security and encryption modules for private and business use. Beside the password- or certificate-based encryption you can protect the computer against illegal access or ultimate delete files. More…
 

abylon LOGON

abylon LOGON protects your computer against illegal access in a comfortable kind. You need only to train a smart card, a USB stick or a CD with your login data. In future you need only this physical key for the login authentication. If you leave the computer you need only to pull the smart card or the USB stick and your computer automatically lock or logoff. Thus protect your computer against snoopier views and data theft without large training. More…

abylon SHREDDER

The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives. More…