![]() Double-clicking any record brings it up for full viewing or editing. You can also choose to filter the display by category. It also includes several "smart types" that list most-used and recently-used items.Īs you type in the search box, the list narrows to only show items containing what you've typed so far. Panel view, the most flexible, lets you select a type from the left column, choose an item of that type from the middle column, and view details at right. List view offers a tabular display of the entire database. Tree view displays all data types with the option to expand each and view its records. In all three, a summary of the selected record appears at right. There are three main views for your data: tree, list, and panel. ![]() If the predefined types don't cover all your needs you can modify them or create your own types. As you add your own data, you can delete these. To help the new user understand the product, it comes pre-loaded with a collection of sample data in various types. Key Safe comes with almost 20 predefined types, from Birthdays to Voice Mail, from Clothes Size to Web Logins. Each record's type defines how those data fields are named, and each record also has a category field for sorting and filtering. Each record has ten data fields, one of which is reserved for the last-modified date. Once you get past the encryption, the Key Safe's software is basically a simple flat-file database. You'll frequently find yourself using the clipboard to copy/paste data to or from the device, so there's an option to clear the clipboard on exit or after a fixed time. That way you won't lose privacy if you forget to pull the key out of the USB port before leaving your desk. If desired, you can configure the device to automatically lock after a period of inactivity. You can add a password hint and optionally protect the hint behind a security question challenge.įrom now on you'll have to enter that password to get into the data stored on the Key Safe. This is one password that should be extra-strong and hard to break, so the password-entry dialog will rate the strength of your password choice. You'll also set up a master encryption password to protect all your data. When you first plug a new Key Safe into your PC, it steps through a welcome wizard that offers a high-level view of how the product works. Best Hosted Endpoint Protection and Security Software.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |