forpressrelease Mail to a Friend
forpressrelease Rate forpressrelease forpressrelease forpressrelease forpressrelease forpressrelease 

Panic Button is a new powerful solution for emergency data erasure



2024-10-29 08:54:36 Computer

1028


CyberYozh security group announces the release of Panic Button - the first solution for emergency erasure of digital data on Windows computers. Any unauthorized attempt to penetrate a user's computer (be that a colleague who has secretly gained access to it, or law enforcement officers using data extraction tools) will trigger immediate and permanent data erasure.

Panic Button is designed for anyone who wishes to protect their confidential information from unauthorized access or forensic analysis. This includes journalists, businessmen, officials and politicians, as well as common users who wish to protect themselves against cybercriminals.

The data erasure application can be activated either by user (by clicking on a shortcut or pressing a user-defined key combination) or automatically, as a logic bomb. During the program's setup the user specifies a certain action that must be performed to prevent data erasure. Failing to perform this action will trigger the logic bomb and permanently erase the confidential information. The logic bomb will therefore go off at the attempt of stealthy penetration or forced data access.

Panic Button erases user activity data in the system: the information about recently viewed documents or images and recently launched programs. It also erases internet activity logs: web browser's history, cookies, cache, bookmarks, and saved passwords. Panic Button supports all popular browsers: Chrome, Mozilla, Opera, and Edge.

Moreover, Panic Button permanently deletes any files a user specifies in their program's settings. The user can also set up email notifications about activation of Panic Button (an optional feature).

Panic Button at a glance:

- Permanently deletes all information about user activity in the system and on the Internet;
- Erases all files chosen in the program's settings;
- Automatically goes off at the attempt of unauthorized access
- Activates at the attempt of stealthy penetration

FOR EDITORS:

Activated programm keys on full version are available on request.

Contact information
Nikolay
admin@cyberyozh.com

https://cyberyozh.com/







Company :-CyberYozh

User :- Julia Wunder

Email :-pr@softpressrelease.com

Phone :---

Mobile:- -

Url :- https://cyberyozh.com/






Related Post

Advertisement