![]() As applied to the computer security topics the activity analysis and authentication is performed when it is impossible to get documents’ copies, which user worked on, for example, stored either on ciphered or dismounted disk containers. The activity analysis and authentication or how it is called in brief “statistics”, as the method of information (intelligence data) collection is applied either for the preliminary exploring or when the access to information (posted message, telephone talk) is impossible or unwanted. AAAnalyzer is the powerful security software, which has been primarily destined to comprehensive search, analysis, the user activity traces left after work. Activity and Authentication Analyzer is a solution to this problem. Any of the Web Pages, Movies, Pictures, Sounds, E-mail and Everything Else you have ever viewed could easily be recovered - even after many years passed! This is a serious threat to the legitimate user's privacy. Your PC keeps records of both your online and off-line activity.
0 Comments
Leave a Reply. |