Info
Content
- Application
- Read a password
- Encrypted messages
- Encrypted files
- Record new password
- Settings
- Custom alphabet
- Archiving files (Zip/ UnZip)
- Enc/Decryption communication messages
- Enc/Decryption communication file
- Record a partner
- Decrypted communication message
- Encrypted communication message
Application
PEM Companion (Password & Encryption Manager)
Version: 2.0
www.elsonet.ro; support@elsonet.ro
New in version 2.0:
- Random passwords can be generated faster without the need to open the app (via the introduction of the Master Password)
- In order to modify and record new passwords a key must be purchased from inside the PEM app (mobile version)
- Installing process of "Unlimited Strength Jurisdiction Policy" is made easier
Problem solved:
- Solves the problem with passwords management, securing data and information, as well as communications.
Main Features:
- Password management: generates, stores, deletes, modifies and retains all previous versions of the passwords
- Securing the information: encrypts own messages and files
- Securing the communications: encrypts messages and files when communicating with partners
- Permanent deletion of certain files on disk
- Self−destruction of ALL DATA (of this application) in case of hacker attempts to guess your master password.
Other Functions
Passwords management:
- Able to create passwords in your desired language by setting its own alphabet, created by the user.
- Creates strong and unique non−guessable passwords.
- Password length can be between 4 and 32 characters.
- Passwords can contain, at your choice, digits, lowercase and uppercase letters, symbols
- User−friendliness: easily creates new passwords and facilitates their replacement on a site by "keeping" the previous password.
- Protects personal passwords WITHOUT STORING THEM (never saved anywhere) in the software, on a device or in the cloud, so if your device is stolen, the information remains protected.
- Offers the possibility of eliminate some symbols from the password.
Securing the informations:
- Each message or file can be encrypted with its own unique key, which can be set as normal or very important.
- The procedure for encryption / decryption is very simple.
- Safely protects personal information such as account numbers or other secret messages by encryption with very strong passwords, which otherwise could not be memorized.
- Uniquely associated between a record from the database and encrypted message or file.
Securing the communications:
- Communications are secured "end−to−end", so the transmission can be made on the insecure channels.
- Each message or file for communication is encrypted with a unique key and signed to ensure confidentiality and authenticity.
- The encryption key is unique to each partner and for each transmission in part.
More:
- Auto−close to protect the app from prying eyes.
- Backup, restore and sync to keep data safe in case your device is stolen.
- Extra security (by confirmation password) for certain passwords, messages and files encrypted.
- Right−to−Left Language Support
- Internet connection is not required. This application can also be used in areas without network coverage.
- Information can be easily and quickly found in the database by organizing it according to the user's requirements.
- Mobile version works from Android 2.3 (Gingerbread) until Android 5.1 (Lollipop)
- Desktop version work on Windows (XP, 7, 8, 10) and Linux.
- Desktop version does not require installation. Works on USB flash drive or hard disk.
- Optimized view for handset, tablet and monitor
- Android− Windows−Linux compatibility for database, messages and files encrypted, messages and files encrypted for communication.
- The application is highly customizable, users can set: password length, learning mode, closing and reset time, validity period of the password, font size for certain fields, etc.
- Intuitive interface so the application is easy to use.
- Rapid creation of a new version facilitates periodical change of the password.
- Almost all the answers can be found in the well structured help.
Pricacy
- This application doesn't collect any type of data from your device.
Copyright© 2015 − Cezar Rata
This application, or any part of it, can not be redistributed without the express consent of Cezar Rata.
Read a password
- Creates passwords according to the data from the database;
- Generates random passwords with different lengths using certain character sets;
- Creates old versions of password for easy replacement of passwords whenever you want;
- User can reset selected password, confirmation password, clipboard, the encryption key and communication parameters
- Selected password, confirmation password and clipboard it will automatically reset after a period of 30 to 120 seconds (settable by the user);
- Possibility of fast search for the favorite records or all records from the database;
- Possibility to copy the password to the Clipboard;
- The application is correctly closed only by using the Exit button (for security reasons).
Encrypted messages
- Sensitive information can be stored in encrypted messages;
- Messages can be created, read, modified or deleted in a simple and fast way;
- Message encryption key can be changed anytime;
- Uniquely associated between a record from the database and encrypted message;
- Deleted messages cannot be recovered in any way;
- You can store however many encrypted messages of maximum 4000 characters;
- In the site file−name you can write maximum 50 characters. The file name must be written with no extension;
- The encryption can be done using only one encryption key for all the messages, an encryption key for a group of messages or every message with it's own encryption key. What's more, every encryption key (selected password) can be set as high importance;
Encrypted files
- Files are encrypted individually. If you want to encrypt a folder, first it must be zipped;
- Uniquely associated between a record from the database and encrypted file;
- Permanently deleted files cannot be recovered in any way.
Record new passwords
- A record from the database consists of the following components:
- Site: it is where is the login procedure takes place (website, the bank that issued the card, computer, application software, etc.)
- Username:
- Nickname:
- An image associated with the record
- The character set used in the password
- The importance of password
- The alphabet used (default or custom)
- Symbols removed from the set of symbols (the red symbols are removed). Some sites do not accept any symbol
- The password length
- The validity of the password (it is just a warning that the password must be changed)
- Passwords are organized in groups for easier management
- The date when a password was created or modified
- Password version
- Own key pair associated with record (public and private) required for communication
- A partner's public keys required for communication
- The pair Site+Username must be unique but each of these can repeat separately, such as: {site1, username1}, {site2, username1}, {site1, username2}, {site2, username2};
- In the site and username fields you can type maximum 50 characters, in the nickname field 25 characters and in the group password site a maximum of 30 characters. Our recommendation is that you write as many characters as can be easily read;
- The date displayed is the time when the password is created or the date of the last modification. The passwords that should be changed appear in red on a yellow background;
- The mumber of passwords retained depends on capacity of the your device, but they are more than you need
Settings
- Here you make the basic settings of the application, you can reset the application (the database, the messages, the files, the existing settings and the alphabet will be erased so that the application becomes "new". We recommend that you make a BackUp copy of the data.
- You need to be careful when setting the number of master password attempts. Exceeding this number will lead to the complete reset of the application. We recommend that the number be higher in the beginning and be gradually reduced afterwards.
- All the backup files must be kept on a CD (all the important data should always be kept on a physical medium outside the system).
- Direction of text is automatically read from device or can be manually set.
Custom alphabet
- Here the user can set its own alphabet for creating passwords with some characters
Archiving files (Zip/ UnZip)
- In orderto be sent via Bluetooth or to encrypt folders, these must be archived;
- Archiving is done without compression.
- Please note! Avoid using symbols in the name of folders and files. Windows has restrictions on these names.
Enc/decryption of communication messages
- Here you can see if the record has its own key pair set, if the public key partner is set;
- You can see and check the public keys verification codes.
Enc/Decryption communication file
- Encrypted files can be decrypted ONLY by the communication partner
- Each file sent is encrypted with a different key;
- Permanently deleted files cannot be recovered in any way;
- Deleting files of communication remains the responsibility of the user.
Record a partner
- Each record can be associated with a of communication partner;
- Partner must send his public key;
- Here it generates its own key pair, public and private.
Decrypted communication messages
- Encrypted messages can be decrypted ONLY by the communication partner;
- Text can be copied, pasted or written
Encrypted communication messages
- Text can be copied, pasted;
- Each message sent is encrypted with a different key;
- Changing a text character leads to the erroneous encryption.