Kamatoz.Computing announces PassMonster 2.25.
PassMonster allows simplifying and securing passwords management by providing convenient way of storing any number of passwords for any number of computer users. Passwords can be securely stored in a single database or multiple databases each having its own master key. PassMonster supports encrypted and un-encrypted passwords databases as well as import\export\migration to and from plain text, comma separated values format and XML. All encryption operations handled with blazing fast speed and absolutely transparent to the user, while extra security measures (file wiping, memory monitoring and optional actions logging for high-security environments) are supported.
"There are several passwords keeping and management solutions available on the market today,"--said Greg Arkadiev, Kamatoz.Computing CEO. "However, the major issue with virtually any of those solutions is that they usually have only one strong point per application: either good encryption or easy-to-use interface or scalability. When developing PassMonster, we focused on bringing the latest technologies out there to create passwords management suite that has all it takes to be absolutely secure, flexible, convenient and good looking!"
According to Alexey Navrasov, Kamatoz.Computing security expert, "Unlike common security solutions available today that implement one of the publicly available open key encryption algorithms PassMonster uses coupled 128 bit and 256 bit data encryption making it almost impossible to use so called 'smart hacks' involving math formulae to break into encrypted data. PassMonster allows reliable protection both from 'brute force attacks' and 'smart hacks' keeping surprisingly high speed of operation!".
About Kamatoz.Computing Kamatoz.Computing was founded in 1996 as a custom software solutions development group. In 1999 Kamatoz.Computing moved into end-user products market. As of now, Kamatoz.Computing offers several commercial products as well as custom software solutions and developers services for shareware vendors worldwide. The development team is involved in researching security technologies, biometrics, Artificial Intelligence (AI) and neural networks.
|Printer friendly Cite/link Email Feedback|
|Publication:||EDP Weekly's IT Monitor|
|Date:||Aug 29, 2005|
|Previous Article:||CyberScrub releases KeyChain password manager/auto form filler.|
|Next Article:||Spyware Defense[TM] introduces next generation Spyware protection.|
|Final rule--amendment to Regulation A. (Legal Developments).|
|FFC scrap and trash grapple buckets.|