SecurStar | Real-Time Hard Disk Encryption and Computer Security Software

SecurStar | Real-Time Hard Disk Encryption and Computer Security Software

SecurStar is the leader for real-time hard disk encryption software and computer Security. With over 4.5 million users, SecurStar security products DriveCrypt, DriveCrypt PlusPack, Surfsolo and PhoneCrypt are the most used on the market.

DRIVECRYPT

DriveCrypt is the most powerful, flexible and fast cryptographic program available on the market today, bringing 1344 Bit Military Strength Encryption to your computer and protecting your data transparently and in a quick, reliable way. DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this product. As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught “on the fly” as it transfers back and forth between the hard disk and memory. Consequently, users don’t need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC. In addition, only individual files are decrypted at any one time, not the whole hard disk. Encrypts data with 1344 Bit Military Strength disk encryption using the best and most proven cryptographic algorithms such as AES, 3AES, Blowfish, Tea 16, Tea 32, Des and Triple Des. DRIVECRYPT requires minimal administration and user training. DRIVECRYPT protects your data with very fast and a true “on the fly” encryption process. Using special so called “Steganographic” functionalities, DRIVECRYPT allows you to hide all your sensitive information into music files. DRIVECRYPT allows both, the encryption of an entire Hard Disk partition, as well as the creation of a virtual container file that will store all the encrypted information. DRIVECRYPT integrates special functionalities that prevent passwords from being sniffed by Hackers or Trojan horses such as Back Orifice, SubSeven DRIVECRYPT makes Dictionary or Brute Force attacks against encrypted volumes much harder than any of the actual competitor products.

DriveCrypt | SecurStar GmbH

DriveCrypt is the most powerful, flexible and fast cryptographic program available on the market today, bringing 1344 Bit Military Strength Encryption to your computer and protecting your data transparently and in a quick, reliable way. DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this product. As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught “on the fly” as it transfers back and forth between the hard disk and memory. Consequently, users don’t need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC. In addition, only individual files are decrypted at any one time, not the whole hard disk. Encrypts data with 1344 Bit Military Strength disk encryption using the best and most proven cryptographic algorithms such as AES, 3AES, Blowfish, Tea 16, Tea 32, Des and Triple Des. DRIVECRYPT requires minimal administration and user training. DRIVECRYPT protects your data with very fast and a true “on the fly” encryption process. Using special so called “Steganographic” functionalities, DRIVECRYPT allows you to hide all your sensitive information into music files. DRIVECRYPT allows both, the encryption of an entire Hard Disk partition, as well as the creation of a virtual container file that will store all the encrypted information. DRIVECRYPT integrates special functionalities that prevent passwords from being sniffed by Hackers or Trojan horses such as Back Orifice, SubSeven DRIVECRYPT makes Dictionary or Brute Force attacks against encrypted volumes much harder than any of the actual competitor products.

DriveCrypt Plus Pack (DCPP)

DriveCrypt Plus Pack – encrypts the whole operating system Providing ultimate security and military strong real-time 256-Bit full disk encryption. It has the ability to encrypt the whole operating system, and offers pre-boot authentication

DriveCrypt Plus Pack (DCPP) | SecurStar GmbH

DriveCrypt Plus Pack – encrypts the whole operating system Providing ultimate security and military strong real-time 256-Bit full disk encryption. It has the ability to encrypt the whole operating system, and offers pre-boot authentication

DriveCrypt Plus Pack Enterprise (DCE)

Full Disk Encryption/Advanced Encryption Standard (AES-256 Bit) DCPP Enterprise uses AES 256 Bit encryption as the default standard for whole disk or full disk encryption (FDE). It provides fast and reliable performance ensuring data security and integrity. AES is the approved NIST standard adopted by the U.S. government and is FIPS 197 certified providing military grade protection. Pre-boot Authentication (PBA) Pre-boot authentication provides unparalleled security and helps mitigate threats from sophisticated attacks which may take advantage or have dependencies on Microsoft Windows services. PBA requires a user successfully authenticates before Microsoft Windows is permitted to start. In addition no other services are available such as the network or usb connections until a user has successfully authenticated at the Pre-boot login. 3 failed attempts results in the machine halting and a hard reset is required. PBA provides strong protection against attacks targeting the file system, and operating system. Strong 256 bit AES encryption DriveCrypt Plus Pack Enterprise Edition increases the protection of your data by a strong and tested encryption algorithm (AES 256 bit). Only authorized users have access to your computer. AES 256 bit is an approved symmetric encryption algorithm that is used by U.S. Government organizations (and others) to protect sensitive data. Strong Authentication Policy DriveCrypt Plus Pack Enterprise allows administrators to enforce strong authentication via custom-defined password policies, admin defined password restrictions and supports smartcards (PKCS #11) for two-factor authentication

DriveCrypt Plus Pack Enterprise (DCE) | SecurStar GmbH

Full Disk Encryption/Advanced Encryption Standard (AES-256 Bit) DCPP Enterprise uses AES 256 Bit encryption as the default standard for whole disk or full disk encryption (FDE). It provides fast and reliable performance ensuring data security and integrity. AES is the approved NIST standard adopted by the U.S. government and is FIPS 197 certified providing military grade protection. Pre-boot Authentication (PBA) Pre-boot authentication provides unparalleled security and helps mitigate threats from sophisticated attacks which may take advantage or have dependencies on Microsoft Windows services. PBA requires a user successfully authenticates before Microsoft Windows is permitted to start. In addition no other services are available such as the network or usb connections until a user has successfully authenticated at the Pre-boot login. 3 failed attempts results in the machine halting and a hard reset is required. PBA provides strong protection against attacks targeting the file system, and operating system. Strong 256 bit AES encryption DriveCrypt Plus Pack Enterprise Edition increases the protection of your data by a strong and tested encryption algorithm (AES 256 bit). Only authorized users have access to your computer. AES 256 bit is an approved symmetric encryption algorithm that is used by U.S. Government organizations (and others) to protect sensitive data. Strong Authentication Policy DriveCrypt Plus Pack Enterprise allows administrators to enforce strong authentication via custom-defined password policies, admin defined password restrictions and supports smartcards (PKCS #11) for two-factor authentication

SecurStar License Reset Service

If you are not able to destroy your old license (for example because your system crashed or computer is broken), SecurStar can reset the old license for you manually in SecurStar system

SecurStar License Reset Service | SecurStar GmbH

If you are not able to destroy your old license (for example because your system crashed or computer is broken), SecurStar can reset the old license for you manually in SecurStar system

PhoneCrypt Mobile

PhoneCrypt is an innovative solution based in military grade encryption (RSA 4096 bits and AES 256 bits), the same technology used by FBI and CIA, which effectively protects your landline, mobile and PBX phones from access of intruders. PhoneCrypt is easy to use and the secure calls placed from the software – through your carrier’s data package – are gratuitous, which helps to reduce the costs with conventional bonds, such as with long distance and international ones.. PhoneCrypt works in real time, without interfering in the function of the mobile phone, with an excellent voice quality, allowing a secure communication from mobiles to landline phones, and vice-versa. PhoneCrypt also protects against attacks from virus or Trojan horse

PhoneCrypt Mobile | SecurStar GmbH

PhoneCrypt is an innovative solution based in military grade encryption (RSA 4096 bits and AES 256 bits), the same technology used by FBI and CIA, which effectively protects your landline, mobile and PBX phones from access of intruders. PhoneCrypt is easy to use and the secure calls placed from the software – through your carrier’s data package – are gratuitous, which helps to reduce the costs with conventional bonds, such as with long distance and international ones.. PhoneCrypt works in real time, without interfering in the function of the mobile phone, with an excellent voice quality, allowing a secure communication from mobiles to landline phones, and vice-versa. PhoneCrypt also protects against attacks from virus or Trojan horse

PhoneCrypt Universal

PhoneCrypt Universal is an innovative business video-phone, that allows communication in a secure, encrypted way. PhoneCrypt Universal encrypts telephone calls effectively and grants that your business and private communication stay completely secure. PhoneCrypt offers excellent, crystal clear voice communication without any delay; you can even call people that do not use any encryption on their end, still ensuring that your connection cannot be intercepted or traced by any third party. PhoneCrypt Universal does not require any telephone-line connection; instead, it is connected to the internet by a network cable or Wifi. Attackers will not even know that you are on the phone or with whom you are talking. PhoneCrypt Universal is mobile; you can use it worldwide when traveling, or even use it from your hotel: Just connect the device to the Internet/WiFi and place your phone-call as usual. Through your anonymous telephone number you can always be reached regardless of where you are in the world and without the caller knowing that you are traveling. There are no roaming fees. PhoneCrypt Universal helps you also reduce your phone bills significantly. Ensure your right to privacy! Don’t provide any opportunities to hackers, spies, competitors, detectives or authorities !

PhoneCrypt Universal | SecurStar GmbH

PhoneCrypt Universal is an innovative business video-phone, that allows communication in a secure, encrypted way. PhoneCrypt Universal encrypts telephone calls effectively and grants that your business and private communication stay completely secure. PhoneCrypt offers excellent, crystal clear voice communication without any delay; you can even call people that do not use any encryption on their end, still ensuring that your connection cannot be intercepted or traced by any third party. PhoneCrypt Universal does not require any telephone-line connection; instead, it is connected to the internet by a network cable or Wifi. Attackers will not even know that you are on the phone or with whom you are talking. PhoneCrypt Universal is mobile; you can use it worldwide when traveling, or even use it from your hotel: Just connect the device to the Internet/WiFi and place your phone-call as usual. Through your anonymous telephone number you can always be reached regardless of where you are in the world and without the caller knowing that you are traveling. There are no roaming fees. PhoneCrypt Universal helps you also reduce your phone bills significantly. Ensure your right to privacy! Don’t provide any opportunities to hackers, spies, competitors, detectives or authorities !

PhoneCrypt Voice

The Problem Almost every phone conversation can be intercepted with minimal efforts from competitors, hackers or public institutions. It is well known that companies, politicians, institutions and regular businesspeople are increasingly victimized by illegal phone tapping. An effective solution available on the market is digital encryption (hardware or software based). These solutions may be very secure, but require a data/internet connection (3G, Wifi, CSD, GPRS, etc.) to complete the call. Often, a data connection is however not available or very weak. In this case, the entire digital solution becomes useless. The Solution Unlike most voice encryption solutions, PhoneCrypt VoiCe is a unique, innovative technology able to provide the highest security voice encryption to mobile phones using the normal voice channel rather than requiring a data/internet channel. PhoneCrypt VoiCe encrypts the voice digitally and then transports the encrypted information over the analog voice channel of the phone. PhoneCrypt VoiCe can be used anywhere in the world, even where all other digital solutions fail. Even more, PhoneCrypt VoiCe works with any mobile phone on the market (even the lowest-end models) regardless of the brand or model, as long as they have Bluetooth functionality

PhoneCrypt Voice | SecurStar GmbH

The Problem Almost every phone conversation can be intercepted with minimal efforts from competitors, hackers or public institutions. It is well known that companies, politicians, institutions and regular businesspeople are increasingly victimized by illegal phone tapping. An effective solution available on the market is digital encryption (hardware or software based). These solutions may be very secure, but require a data/internet connection (3G, Wifi, CSD, GPRS, etc.) to complete the call. Often, a data connection is however not available or very weak. In this case, the entire digital solution becomes useless. The Solution Unlike most voice encryption solutions, PhoneCrypt VoiCe is a unique, innovative technology able to provide the highest security voice encryption to mobile phones using the normal voice channel rather than requiring a data/internet channel. PhoneCrypt VoiCe encrypts the voice digitally and then transports the encrypted information over the analog voice channel of the phone. PhoneCrypt VoiCe can be used anywhere in the world, even where all other digital solutions fail. Even more, PhoneCrypt VoiCe works with any mobile phone on the market (even the lowest-end models) regardless of the brand or model, as long as they have Bluetooth functionality

ShareCrypt

How ShareCrypt works: Storing files in cloud sync or backup services can leave data vulnerable to being accessed by unauthorized people. Data may be subject to rogue staff, court orders, or law enforcement requests. Common services such as Dropbox, Google Drive and Microsoft SkyDrive do not provide data security from these issues; data may be encrypted in transit or at rest, but using cryptographic keys in possession of the service. With ShareCrypt you have full control of your sensitive data ensuring that only you can access your data and locking out any unauthorized party (including the hosting company). ShareCrypt enables you to separate data and restrict access; Finance dept can prevent IT dept from accessing their files, HR can prevent Finance from accessing employee data, yet IT can ensure data is backed up and verified. Even with these precautions, specific users may be granted access to some or all areas. ShareCrypt is easy to use, it provides a virtual disk drive, under which all areas to which the user has access are visible. Files are encrypted individually with AES 256 bit keys, which are hashed with the user’s password using SHA 256. New user requests are encrypted with 2048 bit RSA public-private keys. ShareCrypt is entirely peer-to-peer. A client user generates a new area (with its own AES 256bit encryption key) and invites or grants users access to the area. Where access to the area has been granted, the area key is shared with the new user and hashed with the new users password. Read, Write and Admin permissions can be set on a per user, per area basis. Every user granted access to an area can use the files in the normal manner for a shared folder. The only thing an administrator has to do is to make an empty shared disk/folder available for read/write access over the network (could be local network or internet drive). System administrators may handle the encrypted files and manage data backup in the normal fashion, without access to file content. ShareCrypt does not require any software installation on the fileserver. This way, all CIFS/SMB server systems like MS Windows, Novell Netware 6 and UNIX with Samba are supported. ShareCrypt is fully scalable and allows the creation and management of an unlimited amount of encrypted disks/folders. (The size of encrypted disks is also unlimited)

ShareCrypt | SecurStar GmbH

How ShareCrypt works: Storing files in cloud sync or backup services can leave data vulnerable to being accessed by unauthorized people. Data may be subject to rogue staff, court orders, or law enforcement requests. Common services such as Dropbox, Google Drive and Microsoft SkyDrive do not provide data security from these issues; data may be encrypted in transit or at rest, but using cryptographic keys in possession of the service. With ShareCrypt you have full control of your sensitive data ensuring that only you can access your data and locking out any unauthorized party (including the hosting company). ShareCrypt enables you to separate data and restrict access; Finance dept can prevent IT dept from accessing their files, HR can prevent Finance from accessing employee data, yet IT can ensure data is backed up and verified. Even with these precautions, specific users may be granted access to some or all areas. ShareCrypt is easy to use, it provides a virtual disk drive, under which all areas to which the user has access are visible. Files are encrypted individually with AES 256 bit keys, which are hashed with the user’s password using SHA 256. New user requests are encrypted with 2048 bit RSA public-private keys. ShareCrypt is entirely peer-to-peer. A client user generates a new area (with its own AES 256bit encryption key) and invites or grants users access to the area. Where access to the area has been granted, the area key is shared with the new user and hashed with the new users password. Read, Write and Admin permissions can be set on a per user, per area basis. Every user granted access to an area can use the files in the normal manner for a shared folder. The only thing an administrator has to do is to make an empty shared disk/folder available for read/write access over the network (could be local network or internet drive). System administrators may handle the encrypted files and manage data backup in the normal fashion, without access to file content. ShareCrypt does not require any software installation on the fileserver. This way, all CIFS/SMB server systems like MS Windows, Novell Netware 6 and UNIX with Samba are supported. ShareCrypt is fully scalable and allows the creation and management of an unlimited amount of encrypted disks/folders. (The size of encrypted disks is also unlimited).

SecurStar Software upgrade for ShareCrypt

How ShareCrypt works: Storing files in cloud sync or backup services can leave data vulnerable to being accessed by unauthorized people. Data may be subject to rogue staff, court orders, or law enforcement requests. Common services such as Dropbox, Google Drive and Microsoft SkyDrive do not provide data security from these issues; data may be encrypted in transit or at rest, but using cryptographic keys in possession of the service. With ShareCrypt you have full control of your sensitive data ensuring that only you can access your data and locking out any unauthorized party (including the hosting company). ShareCrypt enables you to separate data and restrict access; Finance dept can prevent IT dept from accessing their files, HR can prevent Finance from accessing employee data, yet IT can ensure data is backed up and verified. Even with these precautions, specific users may be granted access to some or all areas. ShareCrypt is easy to use, it provides a virtual disk drive, under which all areas to which the user has access are visible. Files are encrypted individually with AES 256 bit keys, which are hashed with the user’s password using SHA 256. New user requests are encrypted with 2048 bit RSA public-private keys. ShareCrypt is entirely peer-to-peer. A client user generates a new area (with its own AES 256bit encryption key) and invites or grants users access to the area. Where access to the area has been granted, the area key is shared with the new user and hashed with the new users password. Read, Write and Admin permissions can be set on a per user, per area basis. Every user granted access to an area can use the files in the normal manner for a shared folder. The only thing an administrator has to do is to make an empty shared disk/folder available for read/write access over the network (could be local network or internet drive). System administrators may handle the encrypted files and manage data backup in the normal fashion, without access to file content. ShareCrypt does not require any software installation on the fileserver. This way, all CIFS/SMB server systems like MS Windows, Novell Netware 6 and UNIX with Samba are supported. ShareCrypt is fully scalable and allows the creation and management of an unlimited amount of encrypted disks/folders. (The size of encrypted disks is also unlimited)

SecurStar Software upgrade for ShareCrypt | SecurStar GmbH 

How ShareCrypt works: Storing files in cloud sync or backup services can leave data vulnerable to being accessed by unauthorized people. Data may be subject to rogue staff, court orders, or law enforcement requests. Common services such as Dropbox, Google Drive and Microsoft SkyDrive do not provide data security from these issues; data may be encrypted in transit or at rest, but using cryptographic keys in possession of the service. With ShareCrypt you have full control of your sensitive data ensuring that only you can access your data and locking out any unauthorized party (including the hosting company). ShareCrypt enables you to separate data and restrict access; Finance dept can prevent IT dept from accessing their files, HR can prevent Finance from accessing employee data, yet IT can ensure data is backed up and verified. Even with these precautions, specific users may be granted access to some or all areas. ShareCrypt is easy to use, it provides a virtual disk drive, under which all areas to which the user has access are visible. Files are encrypted individually with AES 256 bit keys, which are hashed with the user’s password using SHA 256. New user requests are encrypted with 2048 bit RSA public-private keys. ShareCrypt is entirely peer-to-peer. A client user generates a new area (with its own AES 256bit encryption key) and invites or grants users access to the area. Where access to the area has been granted, the area key is shared with the new user and hashed with the new users password. Read, Write and Admin permissions can be set on a per user, per area basis. Every user granted access to an area can use the files in the normal manner for a shared folder. The only thing an administrator has to do is to make an empty shared disk/folder available for read/write access over the network (could be local network or internet drive). System administrators may handle the encrypted files and manage data backup in the normal fashion, without access to file content. ShareCrypt does not require any software installation on the fileserver. This way, all CIFS/SMB server systems like MS Windows, Novell Netware 6 and UNIX with Samba are supported. ShareCrypt is fully scalable and allows the creation and management of an unlimited amount of encrypted disks/folders. (The size of encrypted disks is also unlimited)

SecurStar Support & Upgrade – DriveCrypt

DriveCrypt is the most powerful, flexible and fast cryptographic program available on the market today, bringing 1344 Bit Military Strength Encryption to your computer and protecting your data transparently and in a quick, reliable way

SecurStar Support & Upgrade – DriveCrypt | SecurStar GmbH

DriveCrypt is the most powerful, flexible and fast cryptographic program available on the market today, bringing 1344 Bit Military Strength Encryption to your computer and protecting your data transparently and in a quick, reliable way

SecurStar Support & Upgrade – DriveCrypt PlusPack

DriveCrypt Plus Pack – encrypts the whole operating system Providing ultimate security and military strong real-time 256-Bit full disk encryption. It has the ability to encrypt the whole operating system, and offers pre-boot authentication

SecurStar Support & Upgrade – DriveCrypt PlusPack | SecurStar GmbH

DriveCrypt Plus Pack – encrypts the whole operating system Providing ultimate security and military strong real-time 256-Bit full disk encryption. It has the ability to encrypt the whole operating system, and offers pre-boot authentication

SecurStar Support and Upgrade for DCE

Full Disk Encryption/Advanced Encryption Standard (AES-256 Bit) DCPP Enterprise uses AES 256 Bit encryption as the default standard for whole disk or full disk encryption (FDE). It provides fast and reliable performance ensuring data security and integrity. AES is the approved NIST standard adopted by the U.S. government and is FIPS 197 certified providing military grade protection. Pre-boot Authentication (PBA) Pre-boot authentication provides unparalleled security and helps mitigate threats from sophisticated attacks which may take advantage or have dependencies on Microsoft Windows services. PBA requires a user successfully authenticates before Microsoft Windows is permitted to start. In addition no other services are available such as the network or usb connections until a user has successfully authenticated at the Pre-boot login. 3 failed attempts results in the machine halting and a hard reset is required. PBA provides strong protection against attacks targeting the file system, and operating system. Strong 256 bit AES encryption DriveCrypt Plus Pack Enterprise Edition increases the protection of your data by a strong and tested encryption algorithm (AES 256 bit). Only authorized users have access to your computer. AES 256 bit is an approved symmetric encryption algorithm that is used by U.S. Government organizations (and others) to protect sensitive data. Strong Authentication Policy DriveCrypt Plus Pack Enterprise allows administrators to enforce strong authentication via custom-defined password policies, admin defined password restrictions and supports smartcards (PKCS #11) for two-factor authentication

SecurStar Support and Upgrade for DCE | SecurStar GmbH

Full Disk Encryption/Advanced Encryption Standard (AES-256 Bit) DCPP Enterprise uses AES 256 Bit encryption as the default standard for whole disk or full disk encryption (FDE). It provides fast and reliable performance ensuring data security and integrity. AES is the approved NIST standard adopted by the U.S. government and is FIPS 197 certified providing military grade protection. Pre-boot Authentication (PBA) Pre-boot authentication provides unparalleled security and helps mitigate threats from sophisticated attacks which may take advantage or have dependencies on Microsoft Windows services. PBA requires a user successfully authenticates before Microsoft Windows is permitted to start. In addition no other services are available such as the network or usb connections until a user has successfully authenticated at the Pre-boot login. 3 failed attempts results in the machine halting and a hard reset is required. PBA provides strong protection against attacks targeting the file system, and operating system. Strong 256 bit AES encryption DriveCrypt Plus Pack Enterprise Edition increases the protection of your data by a strong and tested encryption algorithm (AES 256 bit). Only authorized users have access to your computer. AES 256 bit is an approved symmetric encryption algorithm that is used by U.S. Government organizations (and others) to protect sensitive data. Strong Authentication Policy DriveCrypt Plus Pack Enterprise allows administrators to enforce strong authentication via custom-defined password policies, admin defined password restrictions and supports smartcards (PKCS #11) for two-factor authentication

SurfSolo High-Speed -DE-

SurfSolo creates an encrypted virtual tunnel between your computer and one of our high bandwidth security proxy servers. This tunnel shields you from the most sophisticated methods of online spying and snooping, ensuring you of completely anonymous web surfing. SurfSolo is like the secure VPNs (Virtual Private Networks) that corporations use, but designed for personal use. SurfSolo anonymous web browsing is simple to set up and use, and works silently in the background. The internet connection is only slowed down minimally (depending on your internet connection and number of nodes between your computer and our servers). After you configure your Internet applications to send their traffic through the tunnel, your Internet activity is protected. Every packet of data is encrypted using the Advanced Encryption Standard (AES) encryption algorithm. When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy – not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity. Note: The AES algorithm was selected by the National Institute of Standards and Technology from among almost two dozen other candidates in October 2000, after years of analysis and testing, to replace the worldwide encryption protocols that banks and other industries use to protect their data. Its code has been analyzed by the world’s cryptographers for holes and exploits before it was approved. The Service is valid for 12 months from the purchase, after that period should be extended a new license to use, it is recommended that the renewal is made 30 days before the validity. Why Do I Need SurfSolo? When you connect normally to the Internet, your transactions are relayed through several servers before reaching their final destination. These servers have the ability to collect information as your requests are routed through them. The most common example of a server that can collect information about your Internet activity is your Internet Service Provider (ISP). Since your requests are not encrypted, any server between you and your final destination can “see” what you are doing. Who is your ISP ? No one knows more about your surfing and downloading habits that your ISP. Your Internet Service Providers can see every site you visit, every page you view, and every file you download. What´s worse, they know exactly who you are and often keep logs for substantial periods of time. How does SurfSolo Work? You can use your SurfSolo account to encrypt the Internet activity between your computer and our servers. This prevents any server between you and us, such as your ISP, from monitoring your activities. Our Privacy-Tunneling accounts allow you to encrypt your incoming and outgoing email, surfing and news posts through a method known as port forwarding. This service can be used independently of or transparently in conjunction with SQUID-Proxies. Features of SurfSolo: • SurfSolo allows anonymous surfing by obscuring the location of your computer as well as your Internet IP address • SurfSolo, is a secure Tunneling SSH2 Service: This powerful encryption technology runs silently and effortlessly in the background whenever you´re online, encrypting all transmissions to and from your computer • Powerful AES-256 encryption makes your entire internet traffic your private issue Secure & Private Email Account: Lets you send and receive messages safely, privately and anonymously. By using the secure e-mail address your will receive, your IP-address WILL NOT BE VISIBLE, you will just appear as ‘localhost’ plus the privacy server’s IP • Secure & Private Newsgroup Access: Allows safe and private newsgroup posting and reading • Secure & Private Instant Messaging & Chat: Automatically protect your chat activity and existing IM accounts • P2P capable • Nobody will have a clue who and where you are • No activity logs kept • Ultra high bandwidth

SurfSolo High-Speed -DE- | SecurStar GmbH

SurfSolo creates an encrypted virtual tunnel between your computer and one of our high bandwidth security proxy servers. This tunnel shields you from the most sophisticated methods of online spying and snooping, ensuring you of completely anonymous web surfing. SurfSolo is like the secure VPNs (Virtual Private Networks) that corporations use, but designed for personal use. SurfSolo anonymous web browsing is simple to set up and use, and works silently in the background. The internet connection is only slowed down minimally (depending on your internet connection and number of nodes between your computer and our servers). After you configure your Internet applications to send their traffic through the tunnel, your Internet activity is protected. Every packet of data is encrypted using the Advanced Encryption Standard (AES) encryption algorithm. When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy – not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity. Note: The AES algorithm was selected by the National Institute of Standards and Technology from among almost two dozen other candidates in October 2000, after years of analysis and testing, to replace the worldwide encryption protocols that banks and other industries use to protect their data. Its code has been analyzed by the world’s cryptographers for holes and exploits before it was approved. The Service is valid for 12 months from the purchase, after that period should be extended a new license to use, it is recommended that the renewal is made 30 days before the validity. Why Do I Need SurfSolo? When you connect normally to the Internet, your transactions are relayed through several servers before reaching their final destination. These servers have the ability to collect information as your requests are routed through them. The most common example of a server that can collect information about your Internet activity is your Internet Service Provider (ISP). Since your requests are not encrypted, any server between you and your final destination can “see” what you are doing. Who is your ISP ? No one knows more about your surfing and downloading habits that your ISP. Your Internet Service Providers can see every site you visit, every page you view, and every file you download. What´s worse, they know exactly who you are and often keep logs for substantial periods of time. How does SurfSolo Work? You can use your SurfSolo account to encrypt the Internet activity between your computer and our servers. This prevents any server between you and us, such as your ISP, from monitoring your activities. Our Privacy-Tunneling accounts allow you to encrypt your incoming and outgoing email, surfing and news posts through a method known as port forwarding. This service can be used independently of or transparently in conjunction with SQUID-Proxies. Features of SurfSolo: • SurfSolo allows anonymous surfing by obscuring the location of your computer as well as your Internet IP address • SurfSolo, is a secure Tunneling SSH2 Service: This powerful encryption technology runs silently and effortlessly in the background whenever you´re online, encrypting all transmissions to and from your computer • Powerful AES-256 encryption makes your entire internet traffic your private issue Secure & Private Email Account: Lets you send and receive messages safely, privately and anonymously. By using the secure e-mail address your will receive, your IP-address WILL NOT BE VISIBLE, you will just appear as ‘localhost’ plus the privacy server’s IP • Secure & Private Newsgroup Access: Allows safe and private newsgroup posting and reading • Secure & Private Instant Messaging & Chat: Automatically protect your chat activity and existing IM accounts • P2P capable • Nobody will have a clue who and where you are • No activity logs kept • Ultra high bandwidth

SurfSolo USA

SurfSolo creates an encrypted virtual tunnel between your computer and one of our high bandwidth security proxy servers. This tunnel shields you from the most sophisticated methods of online spying and snooping, ensuring you of completely anonymous web surfing. SurfSolo is like the secure VPNs (Virtual Private Networks) that corporations use, but designed for personal use. SurfSolo anonymous web browsing is simple to set up and use, and works silently in the background. The internet connection is only slowed down minimally (depending on your internet connection and number of nodes between your computer and our servers). After you configure your Internet applications to send their traffic through the tunnel, your Internet activity is protected. Every packet of data is encrypted using the Advanced Encryption Standard (AES) encryption algorithm. When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy – not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity. Note: The AES algorithm was selected by the National Institute of Standards and Technology from among almost two dozen other candidates in October 2000, after years of analysis and testing, to replace the worldwide encryption protocols that banks and other industries use to protect their data. Its code has been analyzed by the world’s cryptographers for holes and exploits before it was approved. The Service is valid for 12 months from the purchase, after that period should be extended a new license to use, it is recommended that the renewal is made 30 days before the validity. Why Do I Need SurfSolo? When you connect normally to the Internet, your transactions are relayed through several servers before reaching their final destination. These servers have the ability to collect information as your requests are routed through them. The most common example of a server that can collect information about your Internet activity is your Internet Service Provider (ISP). Since your requests are not encrypted, any server between you and your final destination can “see” what you are doing. Who is your ISP ? No one knows more about your surfing and downloading habits that your ISP. Your Internet Service Providers can see every site you visit, every page you view, and every file you download. What´s worse, they know exactly who you are and often keep logs for substantial periods of time. How does SurfSolo Work? You can use your SurfSolo account to encrypt the Internet activity between your computer and our servers. This prevents any server between you and us, such as your ISP, from monitoring your activities. Our Privacy-Tunneling accounts allow you to encrypt your incoming and outgoing email, surfing and news posts through a method known as port forwarding. This service can be used independently of or transparently in conjunction with SQUID-Proxies. Features of SurfSolo: • SurfSolo allows anonymous surfing by obscuring the location of your computer as well as your Internet IP address • SurfSolo, is a secure Tunneling SSH2 Service: This powerful encryption technology runs silently and effortlessly in the background whenever you´re online, encrypting all transmissions to and from your computer • Powerful AES-256 encryption makes your entire internet traffic your private issue Secure & Private Email Account: Lets you send and receive messages safely, privately and anonymously. By using the secure e-mail address your will receive, your IP-address WILL NOT BE VISIBLE, you will just appear as ‘localhost’ plus the privacy server’s IP • Secure & Private Newsgroup Access: Allows safe and private newsgroup posting and reading • Secure & Private Instant Messaging & Chat: Automatically protect your chat activity and existing IM accounts • P2P capable • Nobody will have a clue who and where you are • No activity logs kept • Ultra high bandwidth

SurfSolo USA | SecurStar GmbH

SurfSolo creates an encrypted virtual tunnel between your computer and one of our high bandwidth security proxy servers. This tunnel shields you from the most sophisticated methods of online spying and snooping, ensuring you of completely anonymous web surfing. SurfSolo is like the secure VPNs (Virtual Private Networks) that corporations use, but designed for personal use. SurfSolo anonymous web browsing is simple to set up and use, and works silently in the background. The internet connection is only slowed down minimally (depending on your internet connection and number of nodes between your computer and our servers). After you configure your Internet applications to send their traffic through the tunnel, your Internet activity is protected. Every packet of data is encrypted using the Advanced Encryption Standard (AES) encryption algorithm. When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy – not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity. Note: The AES algorithm was selected by the National Institute of Standards and Technology from among almost two dozen other candidates in October 2000, after years of analysis and testing, to replace the worldwide encryption protocols that banks and other industries use to protect their data. Its code has been analyzed by the world’s cryptographers for holes and exploits before it was approved. The Service is valid for 12 months from the purchase, after that period should be extended a new license to use, it is recommended that the renewal is made 30 days before the validity. Why Do I Need SurfSolo? When you connect normally to the Internet, your transactions are relayed through several servers before reaching their final destination. These servers have the ability to collect information as your requests are routed through them. The most common example of a server that can collect information about your Internet activity is your Internet Service Provider (ISP). Since your requests are not encrypted, any server between you and your final destination can “see” what you are doing. Who is your ISP ? No one knows more about your surfing and downloading habits that your ISP. Your Internet Service Providers can see every site you visit, every page you view, and every file you download. What´s worse, they know exactly who you are and often keep logs for substantial periods of time. How does SurfSolo Work? You can use your SurfSolo account to encrypt the Internet activity between your computer and our servers. This prevents any server between you and us, such as your ISP, from monitoring your activities. Our Privacy-Tunneling accounts allow you to encrypt your incoming and outgoing email, surfing and news posts through a method known as port forwarding. This service can be used independently of or transparently in conjunction with SQUID-Proxies. Features of SurfSolo: • SurfSolo allows anonymous surfing by obscuring the location of your computer as well as your Internet IP address • SurfSolo, is a secure Tunneling SSH2 Service: This powerful encryption technology runs silently and effortlessly in the background whenever you´re online, encrypting all transmissions to and from your computer • Powerful AES-256 encryption makes your entire internet traffic your private issue Secure & Private Email Account: Lets you send and receive messages safely, privately and anonymously. By using the secure e-mail address your will receive, your IP-address WILL NOT BE VISIBLE, you will just appear as ‘localhost’ plus the privacy server’s IP • Secure & Private Newsgroup Access: Allows safe and private newsgroup posting and reading • Secure & Private Instant Messaging & Chat: Automatically protect your chat activity and existing IM accounts • P2P capable • Nobody will have a clue who and where you are • No activity logs kept • Ultra high bandwidth

SurfSolo VPN (12 months)

After SurfSolo is activated, your Internet activity is protected and every data package encrypted When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy – not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity

SurfSolo VPN (12 months) | SecurStar GmbH

After SurfSolo is activated, your Internet activity is protected and every data package encrypted When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy – not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity

SurfSolo VPN (30 days)

After SurfSolo is activated, your Internet activity is protected and every data package encrypted When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy – not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity

SurfSolo VPN (30 days) | SecurStar GmbH

After SurfSolo is activated, your Internet activity is protected and every data package encrypted When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy – not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity

SurfSolo VPN (6 months)

After SurfSolo is activated, your Internet activity is protected and every data package encrypted When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy – not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity

SurfSolo VPN (6 months) | SecurStar GmbH

After SurfSolo is activated, your Internet activity is protected and every data package encrypted When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy – not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity.