Download | Prices | Buy | Help | Be an Affiliate and Earn          

WHY PROTECT YOUR DATA

Today, almost all companies recognize that they must take adequate security to prevent data leakage. Technological advances in increasing speed are accompanied by attack methodologies in constantly evolving, used by hackers, who are becoming increasingly sophisticated. With data stored on greater volumes than ever before, it's It is essential that your data is protected.


Crypto is a program designed to protect and monitor data on a PC computer with Windows 7 or higher.

WHY GCRYPTO

With GCrypto it is possible to protect any type of data that is stored on your computer, whether in text or binary format.

The data encryption algorithm does not follow any standard already used, which makes GCrypto a unique tool, with layered protection, of impossible decoding.

Each encrypted file needs the password, which must be between 5 and 30 characters, and a numeric key between 1 and 999,999,999 (1 in 1 billion).


File encryption will have over 3.2 quintillion different combinations if a password of only 5 characters is used, but this number grows exponentially if the password is longer, with a limit of up to 30 characters.


ENCRYPTED DATA TRANSMISSION

It is a fact that, even on secure connections, it is common for someone to intercept and decode emails by conventional methods.
Even if it is not a hacking job, anyone can open an unauthorized email.

For this reason or even to save protected texts, GCrypto has a tool to encrypt texts of up to 4000 characters, with up to 1 billion combinations.

With this feature you can send confidential texts to other people or companies that also have GCrypto.
To do so, just inform the recipients of the key (1 to 999,999,999) in advance.
This way, only those who have the key can decrypt and read your text.


BE INFORMED IF YOUR COMPUTER IS STOLEN

GCrypto monitors your computer and can send you an email if your IP changes.

Our system will be updated whenever there is an IP change. Therefore, you may receive messages informing you about these changes and the new IP's. In this way, you can track and locate exactly where your computer is. It's like you get a message from your computer saying "Hey I'm here, come get me".

KNOW EVERYTHING THAT HAPPENS ON YOUR COMPUTER

Everything that runs on your computer will be reported to GCrypto. Whenever a program is run or closed, as well as every website visited. will be recorded in a time-stamped report, which you can query and export as an XML spreadsheet to be opened in Excel. In this way, you can analyze all the data and verify that it was you or someone else who ran it.


BAN WHAT YOU DON'T WANT TO BE DONE

If you don't want other people to access programs from your computer, or prohibit certain websites from being visited, you can block them within the monitoring area with a simple click.

If you allow an editor such as Word to be used, but you don't want a certain document to be opened, you can also prohibit it by just including the name of the document in the prohibited list.

Enter words you don't want on websites visited by children, and they will be automatically closed.

Why encrypt data


Currently the only options available to prevent someone from accessing your data are:

1. Use your own Windows password.
This option is only valid for immediate protection against conventional access through Windows itself, however, if the computer is accessed by booting with other operating system on pendrive, CD or DVD, without any tools specific, or even, removing the HD, it will be possible to open and copy any file without difficulties.

2. Use the computer's BIOS password.

This option easily allows the password to be reset by hardware (jumpers) on the computer itself, or by removing the HD, which can be opened in another machine, revealing and making available, in the same way, all files.

The above methods only make it difficult to access the computer but not the HD, where the data is stored.

EXTRA PROTECTION

If you lose your password or program data, you will need a set of words to rescue your data. This makes the user have a extra security, personal and non-transferable.

It is very common to steal computers or notebooks, in which the individual turns on the device and has access to all data (important documents, passwords for emails, websites, banks, etc.). This is a very common situation that occurs with frequently, resulting in losses. A common situation is unauthorized persons who can open documents, videos or photos that are not can be viewed, copied or shared from your computer.

Currently, many people invest in cryptocurrencies, which are used to guarantee that the investor has the right to make his money return without paying abusive bank fees. The demand for cryptocurrencies is increasing quite a bit, which also draws the attention of hackers, as investors keep your passwords on your computer, and the thousands of scripts running over the internet can exposing your data and stealing wallet passwords. These wallets are completely emptied, and the investor has irrecoverable losses. So it is extremely important to keep your data safe. GCrypto dispenses with the use of expensive "hard wallets", also known as "coldwallets".
 


PRICES

. License for 1 computer: U$ 39
. License for 3 computers: U$ 93
    (20% discount, U$ 31.00 per license)
. License for 5 computers: U$ 136
    (30% discount, U$ 27.20 per license)
. License for 10 computers: U$ 195
    (50% discount, U$ 19.50 per license)



    Try a 30 day free trial

Download | Prices | Buy | Help | Be an Affiliate and Earn