bookmark this page - make qweas your homepage  
Help Center - What's New - Newsletter - Press  
Get Buttons - Link to Us - Feedback - Contact Us  
Home | Download | Store | New Releases | Most Popular | Editor Picks | Special Prices | Rate | News | FAQ
Advanced Search ...
All Downloads     Qweas Downloads
Audio & MP3
Video & DVD
Graphics Tools
Security & Anti-Virus
Anti-Spam Tools
Anti-Virus Tools
Anti-Spy Tools
Internet Tracks Cleanup
Password Managers
Password Recovery
PC Remote Control
PC Activity Monitoring
Personal Firewalls
Internet Utilities
System Tools
File Converters
Makers & Designers
Business Finance
Home & Education
Web Authoring
Game Downloads
Screensavers
Pocket Devices



Web qweas.com


Security Toolkit 0.6 - User Guide and FAQ

Screenshots - More Details

Frequently Asked Questions - Security Toolkit

  1. I have a question regarding Boot & Nuke (Hard Drive Wiping Utility).
    While we package Boot & Nuke into the Security Toolkit, we do not actually develop Boot & Nuke.

  2. I can't securely delete Index.dat - Why?
    If you're having problems deleting "index.dat" we would like you to contact our support team so we can assist you.

  3. What is the Index.dat file?
    The Index.dat file is built by Microsoft Internet Explorer to track your internet browsing history. Even when you clear your history and cookies using Internet Explorer this file remains unaffected. The Security Toolkit is one of only a few products with the ability to thoroughly clean Index.dat, without requiring a restart or whole drive wiping.

  4. Does the history wipe securely delete my files, or just delete them normally?
    Unlike some history erasing tools, the Security Toolkit's Wipe History feature locates history files, then securely erases the files. This ensures that the data inside the file is completely unrecoverable. After this operation has completed, the file is deleted.

  5. What encryption does the Security Toolkit use?
    The Security Toolkit uses AES (Rijndael 256 bit), Blowfish 448 bit, Twofish 128 bit, Triple DES 192 bit and Serpent 256 bit as well as RIPE-160, MD5, HAVAL-256 and SHA-512 for hashing.

  6. Do you use Military Strength / Military Grade Encryption?
    Anybody who tells you that their software supports "Military Strength Encryption" is lying to you, and we suggest avoiding their software.

  7. What is the most secure encryption algorithm?
    Unfortunately, this question is impossible to answer. Just because one encryption algorithm uses a larger bit length than another, this doesn't necessarily mean that it is more secure. To learn more about the encryption algorithms used by the Security Toolkit, refer to the Algorithm Specifications section.

  8. Can you crack the encryption in the Security Toolkit?
    Given enough time, no encryption, no matter what marketing hype you've heard, is unbreakable. However, the time that it would take to crack a strong password would be literally millions of years, even assuming computers doubled their speed every 18 months, as suggested by Moore's law.


Screenshots - More Details

Search - Download - Store - Directory - Service - Developer Center
© 2006 Qweas Home - Privacy Policy - Terms of Use - Site Map - About Qweas