takeshicrypt_jp
Newbie
Offline
Activity: 62
Merit: 0
|
|
June 10, 2018, 02:43:14 PM |
|
Many users don’t think about the safety of their computer at all. Others have an anti-virus program installed and feel that’s enough. More concerned users might be changing passwords regularly and encrypting as much data as they possibly can.
Personally, I agree that we are often to blame for the loss of our data. But at the same time, if the private user is just unpleasant, then a large company can incur large losses due to hacking of their data. Often, company data can be well protected by various algorithms, but data leakage is the fault of employees. Our service allows you to eliminate the importance of the human factor in the storage and transfer of information. Now that sounds promising.
|
|
|
|
Miicheleon
Newbie
Offline
Activity: 45
Merit: 0
|
|
June 10, 2018, 02:51:47 PM |
|
Please tell us briefly, what are the current methods of information protection?
|
|
|
|
E46nutbag
Newbie
Offline
Activity: 29
Merit: 0
|
|
June 10, 2018, 03:01:35 PM |
|
It looks of this idea will be preferably in the offing
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
June 10, 2018, 03:04:59 PM |
|
Please tell us briefly, what are the current methods of information protection?
There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.
|
|
|
|
Emmanuel1986
Newbie
Offline
Activity: 20
Merit: 0
|
|
June 10, 2018, 03:08:52 PM |
|
The project is very good and if you truly succeed in realizing your visions, then I think it will be nice!
|
|
|
|
buhketis
Jr. Member
Offline
Activity: 43
Merit: 1
|
|
June 10, 2018, 03:17:40 PM |
|
Please tell us briefly, what are the current methods of information protection?
There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online. And with all the wealth of choice, nothing works 100%?
|
|
|
|
1983Danielle
Newbie
Offline
Activity: 23
Merit: 0
|
|
June 10, 2018, 03:21:20 PM |
|
The plan is very nice and if you really prosper in realizing your plans, then I think it will be interesting!
|
|
|
|
Vito_del_Marso
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 10, 2018, 03:31:24 PM |
|
Please tell us briefly, what are the current methods of information protection?
There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online. And with all the wealth of choice, nothing works 100%? Unfortunately, this is all true. So far, nothing is absolutely effective yet.
|
|
|
|
Cash_Alex
Newbie
Offline
Activity: 9
Merit: 0
|
|
June 10, 2018, 03:43:28 PM |
|
Looking forward for more updates. Good luck fellows.
|
|
|
|
buhketis
Jr. Member
Offline
Activity: 43
Merit: 1
|
|
June 10, 2018, 03:45:42 PM |
|
Please tell us briefly, what are the current methods of information protection?
There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online. And with all the wealth of choice, nothing works 100%? Unfortunately, this is all true. So far, nothing is absolutely effective yet. Well here, as I understand it, this Size algorithm is something really revolutionary.
|
|
|
|
Vito_del_Marso
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 10, 2018, 03:55:13 PM |
|
Please tell us briefly, what are the current methods of information protection?
There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online. And with all the wealth of choice, nothing works 100%? Unfortunately, this is all true. So far, nothing is absolutely effective yet. Well here, as I understand it, this Size algorithm is something really revolutionary. The only thing I read about this algorithm and do not really understand where the system will take so much free memory to store user information on it.
|
|
|
|
Cipchondplotpa
Newbie
Offline
Activity: 8
Merit: 0
|
|
June 10, 2018, 04:03:34 PM |
|
Good morning, fellows. I wish the project success
|
|
|
|
BrodyAndre
Newbie
Offline
Activity: 28
Merit: 0
|
|
June 10, 2018, 04:04:07 PM |
|
I've sent a demand in telegram, waiting for your return!
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
June 10, 2018, 04:06:10 PM |
|
Please tell us briefly, what are the current methods of information protection?
There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online. And with all the wealth of choice, nothing works 100%? Unfortunately, this is all true. So far, nothing is absolutely effective yet. Well here, as I understand it, this Size algorithm is something really revolutionary. The only thing I read about this algorithm and do not really understand where the system will take so much free memory to store user information on it. The service will buy free memory from various devices from the so-called miners.
|
|
|
|
Vito_del_Marso
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 10, 2018, 04:19:42 PM |
|
Please tell us briefly, what are the current methods of information protection?
There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online. And with all the wealth of choice, nothing works 100%? Unfortunately, this is all true. So far, nothing is absolutely effective yet. Well here, as I understand it, this Size algorithm is something really revolutionary. The only thing I read about this algorithm and do not really understand where the system will take so much free memory to store user information on it. The service will buy free memory from various devices from the so-called miners. That is, people will receive money for it? Interesting idea.
|
|
|
|
Vito_del_Marso
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 10, 2018, 04:28:35 PM |
|
Please, what advantages have miners in your service?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
June 10, 2018, 04:39:38 PM |
|
Please, what advantages have miners in your service?
Sure. With our service miners can choose how much memory they want to lease out on their devices. They can earn IDMCoin tokens for renting out this space. What makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.
|
|
|
|
Vito_del_Marso
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 10, 2018, 04:52:02 PM |
|
Please, what advantages have miners in your service?
Sure. With our service miners can choose how much memory they want to lease out on their devices. They can earn IDMCoin tokens for renting out this space. What makes IDM unique is that miners can rent out as much space as they want and still bring in revenue. I see. It really sounds unusual.
|
|
|
|
Vito_del_Marso
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 10, 2018, 05:02:44 PM |
|
Are there any restrictions on the amount of memory that miners should provide?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
June 10, 2018, 05:15:21 PM |
|
Are there any restrictions on the amount of memory that miners should provide?
Again, what makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.
|
|
|
|
|