 |   | FAQ | Question | |
41 |
 | Advanced Settings |
| |
12 |
|  |
1 |
 | Comparison |
| |
43 |
|  |
63 |
 | Curtain Client |
| |
5 |
|  |
17 |
 | Curtain LogTrace |
| |
20 |
|  |
16 |
 | Curtain Server Plug-in |
| |
15 |
|  |
3 |
 | Data Recovery |
| |
5 |
|  |
6 |
 | Encryption |
| |
 |  | 00028 | Can Curtain encrypted data be decrypted by another company (which is also using Curtain e-locker)? |  |
| | 00019 | Can users steal information by attaching local hard-disk to another PC? |  |
 |  | 00048 | Does Curtain e-locker affect performance of workstations? |  |
| | 00016 | How does Curtain e-locker work with backup software? |  |
 |  | 00018 | What is the encryption algorism used? |  |
| | 00017 | Where does Curtain e-locker do encryption? |  |
10 |
|  |
6 |
 | Feature - Basic |
| |
3 |
|  |
5 |
 | Feature - Copy Out |
| |
2 |
|  |
3 |
 | Feature - Housekeeping |
| |
2 |
  | Feature - Online Offline Protection |
|  |
2 |
 | Feature - Others |
| |
2 |
  | Feature - Personal Local PD |
|  |
2 |
 | Feature - Print to PDF |
| |
2 |
  | Feature - Protect First Draft |
|  |