Home



Overview and
Screenshots




Security Features



Downloads



Purchase
a License




Support

 

Security Features               

Introduction

This program is designed to fullfill the highest standards of data security. It stores safely even highly sensitive personal data, in a way that should satisfy the needs of even the most demanding users.

Permanent Encryption

All information is permanently stored in encrypted form on the hard disk. There is no need to decrypt a complete database file before opening it.

Only one piece of information at a time is made readable, but without saving any part of it in readable form on the disk. The information needed appears only on the screen.

Single Record Encryption

Every single piece of information (record) is encrypted with one out of tenthousands of passwords (see next paragraph). When reading a specific record (e.g. an address), it is copied to the volatile memory (RAM) where it is decrypted before being displayed on the screen. On the harddisk it remains stored in encrypted form. The plain (decrypted) information is NEVER EVER stored on the harddisk, not even partially. If the record is modified, it passes the encryption filter before being written back to the harddisk. Nobody will ever be able to hack or to decipher any info by analyzing the harddisk, not even with the most sophisticated methods available.

Thousands of Encryption Keys (Passwords)

While the database is opened with one main passphrase (the Master Passphrase), internally, tens of thousands encryption keys (composed of random characters) are created with a special algorithm and used to encrypt every piece of information individually. The likelihood of the same key being used more than once in 50000 records is almost nil. In other words, in an average sized database, all records are encrypted with different, individual keys.

Highly secure Encryption Algorithms

The 128 – 256 bit encryption algorithms are similar to those used by the military and are among the most secure. It has been calculated that the 128 bit encryption algorithms are so strong that it would take a network of supercomputers significantly longer than the age of the universe to crack the code (millions of years), not to speak of 192 and 256 bit encryption, used extensively in the program, too. Since every record is encrypted with an individual password, in the utopical event of someone succeeding to break the code, only the information contained in 1 single record would be uncovered.

Featuring:

Auto-Shutoff

If you activate this function, the program will be closed automatically after a customizable period of 1-15 minutes of inactivity. This prevents you from inadvertently forgetting to close your database when leaving your workstation.

Hide Private Records

This function provides an additional level of security: records flagged as private can be hidden when someone else (e.g. your secretary) is allowed to use the application.

Optional PIN (secondary passphrase) to access applications

When used by more than one person, the administrator/owner of the database file can protect single sections (like the budget or the diary section) additionally by defining a PIN code or, conversely, give another person (e.g. the secretary) exclusive access to a specific section. In combination with the “Hide Private Records”-function, the PIN enables for instance the secretary to use the budget and the address/contact section, without being able to see the private records. No other person trying to gain information will manage to open any of the PIN-protected sections.

Passphrase Entry

Minimum passphrase length: 8 characters. The more characters, the lower the risk of cracking the passphrase (8 characters reflecting the available keys of the keyboard would theoretically require a mean of 92^92/2 attempts to open the database; therefore, it is important to use a relatively difficult to guess passphrase, the longer the better, preferably containing non-alfanumeric keys)

Forced delay between passphrase inputs: 2 seconds (this makes it virtually impossible for automatized brute-force attacks to open the database)

Maximum number of retries: after 3 wrong passphrase inputs, the application is closed. Reopening the program takes some time, which is an additional protection against brute-force attacks.