protected computer using a floppy disk will not see a secured hard disk on the desktop or be allowed to access it any other way. Once past the sign-in window, AME becomes totally transparent to the user, waiting in the background watching for any unauthorized activity.
AME provides for applications, folders, disks, and files to be password protected or disk key protected, denying access to any unauthorized user. Passwords can be set for accessing the computer, opening applications, folders, disks, or files. They can also be set to require a specific number of letters, be changed at periodic intervals, be case sensitive, and other requirements depending on how secure the computer needs to be. Key disks require the insertion of a key disk to open a protected application or file.
-- part contents for background part 10
----- text -----
Files can also be saved encrypted in two forms, AME’s quick encryption method or DES (Data Encryption Standard). AME’s fast encryption is up to 35 times faster than DES but not as secure. DES offers greater security but is much slower to implement. File deletion can also be secure and AME offers three choices. The simplest erases the file from the volume index only. The Finder as well as many applications use this method exclusively. The next deletes the file from the volume index, but also clears the sections of the hard disk where the file resided. This is better, but some recovery programs can also retrieve information from these wiped disk sections. The best is up to Dept. of Defense standards and wipes the file