data-host-file-16.com
Open in
urlscan Pro
185.251.88.123
Public Scan
URL:
http://data-host-file-16.com/
Submission: On June 22 via automatic, source urlhaus — Scanned from DE
Submission: On June 22 via automatic, source urlhaus — Scanned from DE
Form analysis
3 forms found in the DOM#
<form action="#" class="subscribe">
<input type="text" class="subscribe__input" placeholder="Enter your Email">
<button type="button" class="subscribe__btn"><i class="fa fa-paper-plane-o"></i></button>
</form>
<form class="form form--modal" id="log">
<input type="text" class="form__input" id="log-user" name="user" placeholder="Username">
<input type="password" class="form__input" id="log-passw" name="passw" placeholder="Password">
<button class="form__btn" type="button" onclick="make_request('log');">Sign In</button>
</form>
<form class="form form--modal" id="reg">
<input type="text" class="form__input" id="reg-user" name="user" placeholder="Username. Min 5 letters" required="">
<input type="password" class="form__input" id="reg-passw" name="passw" placeholder="Password. Min 6 letters" required="">
<input type="password" class="form__input" id="reg-rpassw" name="rpassw" placeholder="Repeat password" required="">
<button class="form__btn" type="button" onclick="make_request('reg');">Sign Up</button>
</form>
Text Content
Privacy Tools Guarding * About Us * Specification * The main thing * Blog * Get It Sign In PRIVACY TOOLS Secure & Easy Way To File Protect Trial Use Buy Full ABOUT PRIVACY TOOLS Every person or company has its own secrets. Your personal photos, videos and documents. Everyone thought about the privacy. But they could not always find a solution. But we did it, simply and securely for you. The world of modern technology does not stand still and we are moving along with it. Thanks to the use of modern secure and crypto-resistant algorithms, each person can easily protect his personal life from prying eyes. Just take a few minutes to this page and you will find the ideal program for protecting personal data. HOW TO USE 3 Easy Step 01 DOWNLOAD Go to download section, download and install Privacy Tools software on you PC. 02 SELECT TARGET Select mode: encrypt (this option to protect you file) or decrypt (this option back file to un-protected mode) and select file. 03 ENTER PASSWORD After mode choise, just enter the password for work with file. SPECIFICATION Excellent for your business & personal usage IT`S FREE You can use Privacy Tools for trial. No limits on count & size of files. CROSS-PLATFORM Current we support only Windows. But our developers works wiht Mac OS and Linux versions of Privacy Tools. FACE OF OTHERS Such an expression will be in people trying to open the files that you encrypt. AUTO-UPDATES Don't worry about version actuality, our have auto-updates. LATEST LIBRARIES We use the latest libraries with fixed vulnerabilities VERY FAST AES-256 CBC - lightweight and strong algorithm for encrypt small and big files. THE MAIN THING SECURITY The used AES-256 algorithm quickly and reliably makes the file "inviolable" for third parties. REPUTED In our use, an acknowledged algorithm that has earned the respect of many professionals. RESULT 98% positive feedback from our new customers gives an incentive to work our team. THE NEED FOR EVERYONE #staysecure Once you have reached this paragraph, then we think the security of personal data matters to you. In the world of the digital age - who owns information, he owns the world. Do not let your own information, do not let yourself take over! Take only 3 steps to run our security software and store your files without risk various viruses, hacker actions and third parties. After selecting the encryption mode, the data in the file will be defaced before decryption and no one will be able to read personal information. Crypto-resistant algorithms care to make sure that in case of loss / theft / upload to the public repository you are not nervous about your data. Without your password - no one can read the contents. purchase now 2 mln files protected 400000 downloads 35 countries 10000 reviews INFO More about product ENCRYPT FILE First mode - is encrypt. You can easy encrypt you file. DECRYPT Second mode is - decrypt. Also simple interface. ANTI There is a file check. It does not damage a random file. GET IN TOUCH Feel the power of our software in a few clicks. Choose the right installer and start using it right now. * "VCV", LTD 35 Daleham Dr, Uxbridge, UB8 3HP, UK * Mon - Fri 09:00 - 18:30 * support@privacytools.site Download For Windows Download For Mac OS Download .deb (Ubuntu, Debian) SUBSCRIBE FOR OUR NEWSLETTER Privacy Policy | Terms © 2018 Privacy Tools SIGN IN Sign In Sign Up SIGN UP Sign Up Sign In