IS Protector

FREEWARE CATEGORY
 
5 stars award

IT Works Corporation's for IS Protector description

IS Protector is INFORMATION Security and Data Protection software - specially developed to securely protect confidential data from being accessed by a stranger. IS Protector uses Strong File Encryption EFS and Military Grade Unrecoverable Termination Algorithms to protect your confidential files and folders FROM UNWANTED DATA RECOVERY and unauthorized access to your important business or private information. Encrypted files can't be used on another computer or by another user except YOU. If you lost control over your computer (your PC was lost or stolen) or unwanted scrutiny tries to audit it, IS Protector will help you to remotely permanently erase files with private information having YOUR INFORMATION SECURE. Protect your business information: clients, employees or partners list, sales reports, pricing, research, source codes. Protect your personal information: private emails and address book; bank and credit cards information; medical history and family photos; chat and browser history; passwords and licenses with IS Protector

Alternative names : IS rotector, IS Potector, IS Prtector, IS Proector, IS Protctor, IS Protetor, IS Protecor, IS Protectr, IS Protecto

Added Wipe locked System Disk option
Optimized Data termination speed

Current version:2.8.1
Software OS:Windows 98/MeWindows 2000Windows XP/2003/2008Windows VistaWindows 764-bit
License:Freeware
Freeware size:5336 kBytes
Updated:January 24, 2012
Popularity:21%
  • Currently 0.00/5
  • 1
  • 2
  • 3
  • 4
  • 5
Enlarge the image of IS Protector Download IT Works Corporation IS Protector

User's freeware reviews for IS Protector

No freeware review yet.

IS Protector - copyright notice

IS Protector® License Agreement
IT Works Corporation http://www.itworkscorporation.com
END-USER LICENSE AGREEMENT FOR IT Works Corporation SOFTWARE PRODUCT(S)

IMPORTANT-READ CAREFULLY: This IT Works Corporation End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single entity) and IT Works Corporation for the IT Works Corporation software product(s) identified above as SOFTWARE. By installing, copying, or otherwise using the SOFTWARE, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, do not install or use the SOFTWARE.


1. OPERATING LICENSE:

Once you pay for the licensed version of the SOFTWARE, you will receive a Fully functional registered copy via email. This copy may not be copied or lend. You have the non-exclusive right to use registered version of the software only by a single person, on a single computer at a time.

YOU MAY NOT DISTRIBUTE REGISTERED VERSION OF SOFTWARE. IT WILL BE VIOLATION OF INTERNATIONAL COPYRIGHT LAWS.

You may physically transfer the software from one computer to another, provided that the software is used only by a single person, on a single computer at a time.


2. BACK-UP AND TRANSFER:

You may make one copy of the software solely for "back-up" purposes, as prescribed by international copyright laws. You must reproduce and include the copyright notice on the back-up copy.

3.OTHER RESTRICTION:

You may not decompile, reverse
engineer, disassemble, or otherwise reduce the Software to a human-perceivable form. You may not rent, lease or sublicense the Software. You may not modify the Software or create derivative works based upon the Software.


4. TERMINATION:

Without prejudice to any other rights, IT Works Corporation may terminate this EULA if you fail to comply with the terms and conditions of this EULA. In such event, you must destroy all copies of the SOFTWARE.


6. NO WARRANTIES:

IT Works Corporation expressly disclaims any warranty for the SOFTWARE. THE SOFTWARE AND ANY RELATED DOCUMENTATION IS PROVIDED "AS IS" WITHOUT WARRANT OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES
OR MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. THE ENTIRE RISK ARISING OUT OF USE OR PERFORMANCE OF THE SOFTWARE PRODUCT REMAINS WITH YOU.


7. LIMITATION OF LIABILITY.

To the maximum extent permitted by applicable law, in no event shall IT Works Corporation or its suppliers be liable for any special, incidental, indirect, or consequential damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or any other pecuniary loss) arising out of the use of or inability to use the SOFTWARE or the provision of or failure to provide Support Services, even if IT Works Corporation has been advised of the possibility of such damages.

This EULA is governed by the laws of Canada.

Should you have any questions concerning this EULA, or if you desire to contact SourceTec for any reason, please contact us at Email info@itworkscorporation.com

END

UPDATED FREEWARE IN ENCRYPTION TOOLS
Software protection and licensing services for software developers
Encrypt and decrypt any text or emails with a secure password.
With CyberGhost you can change your IP, secure your data and bypass censorship.
Free application locker software to lock any EXE program.
Secures all your text messages using Steganography encryption.