|Folder Protector (Auto deletion of confidential data)
Most data theft occured when sensitive information such as documents, photos, videos are left exposed in the owner's computer with little or no protection against anyone from accessing. Often companies and users risk having their confidential data stolen from them without knowing, when the equipments are sent for repairs or accessible by other fellow colleagues.
Folder Protector provides an effective protection mechanism for owners to 'lock' any private photos, videos, documents and other types of files in the computer against any access by unauthorized users. The easy to use application makes sure all of your personal files and folders will be protected by password and stored in a place that only you will know.
How it works?
The stealth program enables the owner to create or make use of existing folders in any locations to hide any type of files within the computer to make them inaccessible from viewing or modifications.
Hidden Software Icon
Do not appear in home screen nor program screen.
Password setting for each folder
Password protection to ensure no unauthorized access to the folder.
Any attempts to access the folders with incorrect password, will result in having both the folder and its content to be automatically deleted from the computer.
Any existing or new folders set by the owner will be shown as empty without any content.
Deleted files will not be retrievable from the Recycled Bin.
Owners have full control of their privacy as Folder Protector is accessible only by them with the correct password.
Auto Start Up
Software autoruns every time the computer is powered up.
Attempts before folder self-destruct
Low Memory Resource
Folder Protector will automatically shut down once SIM card is authorized.
Works on all Windows OS powered laptops & desktops. (Includs Windows 7)
FAQ: I need to log into the Window/Mac Operating System first before I can access the laptop. Otherwise the anti-theft software will not be triggered without internet connection. How do I work around it?
If you are using Windows/Mac authentication for login, you can setup a dummy account (with administrative privileges). Do not put any password in that account.
Install Phoenix and configure the settings in that account. This will allow the thief to login to the system without any windows based authentication. Once the thief is logged into the dummy account, Phoenix will be triggered.