Today, almost all companies recognize that they must take adequate security to prevent data leakage. Technological advances in increasing speed are accompanied by attack methodologies in constantly evolving, used by hackers, who are becoming increasingly sophisticated. With data stored on greater volumes than ever before, it's It is essential that your data is protected.
Crypto is a program designed to protect and monitor data on a PC computer with Windows 7 or higher.
With GCrypto it is possible to protect any type of data that is stored on your computer, whether in text or binary format.
The data encryption algorithm does not follow any standard already used, which
makes GCrypto a unique tool, with layered protection, of impossible
decoding.
Each encrypted file needs the password, which must be between 5 and 30 characters, and a numeric key between 1 and 999,999,999 (1 in 1 billion).
File encryption will have over 3.2 quintillion different combinations if a password of only 5 characters is used, but this number grows exponentially if the password is longer, with a limit of up to 30 characters.
It is a fact that, even on secure connections, it is common for someone to intercept and decode emails by conventional methods.
Even if it is not a hacking job, anyone can open an unauthorized email.
For this reason or even to save protected texts, GCrypto has a tool to encrypt
texts of up to 4000 characters, with up to 1 billion combinations.
With this feature you can send confidential texts to other people or companies that also have
GCrypto.
To do so, just inform the recipients of the key (1 to 999,999,999) in advance.
This way, only those who have the key can decrypt and read your text.
GCrypto monitors your computer and can send you an email if your IP changes.
Our system will be updated whenever there is an IP change. Therefore, you may receive messages informing you about these changes and the new IP's. In this way, you can track and locate exactly where your computer is. It's like you get a message from your computer saying "Hey I'm here, come get me".
Everything that runs on your computer will be reported to GCrypto. Whenever a program is run or closed, as well as every website visited. will be recorded in a time-stamped report, which you can query and export as an XML spreadsheet to be opened in Excel. In this way, you can analyze all the data and verify that it was you or someone else who ran it.
If you don't want other people to access programs from your computer, or prohibit certain websites from being visited, you can block them within the monitoring area with a simple click.
If you allow an editor such as Word to be used, but you don't want a certain document to be opened, you can also prohibit it by just including the name of the document in the prohibited list.
Enter words you don't want on websites visited by children, and they will be automatically closed.
If you lose your password or program data, you will need a set of
words to rescue your data. This makes the user have a
extra security, personal and non-transferable.
It is very common to steal computers or notebooks, in which the individual turns on the
device and has access to all data (important documents, passwords for
emails, websites, banks, etc.). This is a very common situation that occurs with
frequently, resulting in losses. A common situation is
unauthorized persons who can open documents, videos or photos that are not
can be viewed, copied or shared from your computer.
Currently, many people invest in cryptocurrencies, which are used to
guarantee that the investor has the right to make his money return without paying
abusive bank fees. The demand for cryptocurrencies is increasing
quite a bit, which also draws the attention of hackers, as investors keep
your passwords on your computer, and the thousands of scripts running over the internet can
exposing your data and stealing wallet passwords. These wallets are
completely emptied, and the investor has irrecoverable losses. So it is
extremely important to keep your data safe. GCrypto dispenses with the use of
expensive "hard wallets", also known as "coldwallets".
. License for 1 computer: U$ 39
. License for 3 computers: U$ 93
(20% discount, U$ 31.00 per license)
. License for 5 computers: U$ 136
(30% discount, U$ 27.20 per license)
. License for 10 computers: U$ 195
(50% discount, U$ 19.50 per license)