Bitcoin Forum
May 22, 2024, 03:59:58 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 [59] 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 »
  Print  
Author Topic: [ANN][ICO] IDM Protect  (Read 14740 times)
takeshicrypt_jp
Newbie
*
Offline Offline

Activity: 62
Merit: 0


View Profile
June 10, 2018, 02:43:14 PM
 #1161

Many users don’t think about the safety of their computer at all. Others have an anti-virus program installed and feel that’s enough. More concerned users might be changing passwords regularly and encrypting as much data as they possibly can.

Personally, I agree that we are often to blame for the loss of our data.

But at the same time, if the private user is just unpleasant, then a large company can incur large losses due to hacking of their data.

Often, company data can be well protected by various algorithms, but data leakage is the fault of employees.

Our service allows you to eliminate the importance of the human factor in the storage and transfer of information.

Now that sounds promising.
Miicheleon
Newbie
*
Offline Offline

Activity: 45
Merit: 0


View Profile
June 10, 2018, 02:51:47 PM
 #1162

Please tell us briefly, what are the current methods of information protection?
E46nutbag
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
June 10, 2018, 03:01:35 PM
 #1163

It looks of this idea will be preferably in the offing
IDM Protect (OP)
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
June 10, 2018, 03:04:59 PM
 #1164

Please tell us briefly, what are the current methods of information protection?

There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.
Emmanuel1986
Newbie
*
Offline Offline

Activity: 20
Merit: 0


View Profile
June 10, 2018, 03:08:52 PM
 #1165

The project is very good and if you truly succeed in realizing your visions, then I think it will be nice!
buhketis
Jr. Member
*
Offline Offline

Activity: 43
Merit: 1


View Profile
June 10, 2018, 03:17:40 PM
 #1166

Please tell us briefly, what are the current methods of information protection?

There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.

And with all the wealth of choice, nothing works 100%?
1983Danielle
Newbie
*
Offline Offline

Activity: 23
Merit: 0


View Profile
June 10, 2018, 03:21:20 PM
 #1167

The plan is very nice and if you really prosper in realizing your plans, then I think it will be interesting!
Vito_del_Marso
Newbie
*
Offline Offline

Activity: 50
Merit: 0


View Profile
June 10, 2018, 03:31:24 PM
 #1168

Please tell us briefly, what are the current methods of information protection?

There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.

And with all the wealth of choice, nothing works 100%?

Unfortunately, this is all true. So far, nothing is absolutely effective yet.
Cash_Alex
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
June 10, 2018, 03:43:28 PM
 #1169

Looking forward for more updates. Good luck fellows.
buhketis
Jr. Member
*
Offline Offline

Activity: 43
Merit: 1


View Profile
June 10, 2018, 03:45:42 PM
 #1170

Please tell us briefly, what are the current methods of information protection?

There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.

And with all the wealth of choice, nothing works 100%?

Unfortunately, this is all true. So far, nothing is absolutely effective yet.

Well here, as I understand it, this Size algorithm is something really revolutionary.
Vito_del_Marso
Newbie
*
Offline Offline

Activity: 50
Merit: 0


View Profile
June 10, 2018, 03:55:13 PM
 #1171

Please tell us briefly, what are the current methods of information protection?

There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.

And with all the wealth of choice, nothing works 100%?

Unfortunately, this is all true. So far, nothing is absolutely effective yet.

Well here, as I understand it, this Size algorithm is something really revolutionary.

The only thing I read about this algorithm and do not really understand where the system will take so much free memory to store user information on it.
Cipchondplotpa
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
June 10, 2018, 04:03:34 PM
 #1172

Good morning, fellows. I wish the project success
BrodyAndre
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
June 10, 2018, 04:04:07 PM
 #1173

I've sent a demand in telegram, waiting for your return!
IDM Protect (OP)
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
June 10, 2018, 04:06:10 PM
 #1174

Please tell us briefly, what are the current methods of information protection?

There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.

And with all the wealth of choice, nothing works 100%?

Unfortunately, this is all true. So far, nothing is absolutely effective yet.

Well here, as I understand it, this Size algorithm is something really revolutionary.

The only thing I read about this algorithm and do not really understand where the system will take so much free memory to store user information on it.

The service will buy free memory from various devices from the so-called miners.
Vito_del_Marso
Newbie
*
Offline Offline

Activity: 50
Merit: 0


View Profile
June 10, 2018, 04:19:42 PM
 #1175

Please tell us briefly, what are the current methods of information protection?

There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.

And with all the wealth of choice, nothing works 100%?

Unfortunately, this is all true. So far, nothing is absolutely effective yet.

Well here, as I understand it, this Size algorithm is something really revolutionary.

The only thing I read about this algorithm and do not really understand where the system will take so much free memory to store user information on it.

The service will buy free memory from various devices from the so-called miners.

That is, people will receive money for it? Interesting idea.
Vito_del_Marso
Newbie
*
Offline Offline

Activity: 50
Merit: 0


View Profile
June 10, 2018, 04:28:35 PM
 #1176

Please, what advantages have miners in your service?
IDM Protect (OP)
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
June 10, 2018, 04:39:38 PM
 #1177

Please, what advantages have miners in your service?

Sure. With our service miners can choose how much memory they want to lease out on their devices. They can earn IDMCoin tokens for renting out this space. What makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.
Vito_del_Marso
Newbie
*
Offline Offline

Activity: 50
Merit: 0


View Profile
June 10, 2018, 04:52:02 PM
 #1178

Please, what advantages have miners in your service?

Sure. With our service miners can choose how much memory they want to lease out on their devices. They can earn IDMCoin tokens for renting out this space. What makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.

I see. It really sounds unusual.
Vito_del_Marso
Newbie
*
Offline Offline

Activity: 50
Merit: 0


View Profile
June 10, 2018, 05:02:44 PM
 #1179

Are there any restrictions on the amount of memory that miners should provide?
IDM Protect (OP)
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
June 10, 2018, 05:15:21 PM
 #1180

Are there any restrictions on the amount of memory that miners should provide?

Again, what makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.
Pages: « 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 [59] 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!