StealthRay checks every window opened by your browser, immediately scans it, and if the window is not allowed by your pre-set preferences, Stealth-Ray automatically closes it. |
|
As StealthRay kills pop-ups, it maintains a list which the user may examine and use to assemble a permitted window list. The user may also, knowing that they wish a pop-up to appear, override StealthRay simply by holding down the CTRL key. Otherwise, Stealth Ray requires no interaction with the user, permitting a browsing session free of distractions. |
|
Stealth Ray pop-up blocker is a completely independent program and does not act as spyware or adversely affect your browser configuration in any way. |
|
Online Session Cleaning |
Get Stealth-Ray |
A user beginning a StealthRay Online Session at 2PM and ending
it at 4 PM will be left with a browser restored to its 2 PM state (history, cache, cookies, etc). |
|
During a Stealth-Ray Online Session, cookies, caches, and history
items are allowed to accumulate as they ordinarily would to permit proper browsing
behavior. However, by ending an Online Session, the StealthRay user signals that they
desire to remove all the traces of activity from the time of the start of that session.
To the casual observer, the browser will not appear to have been used at all during this time. |
|
File Shredding |
Get Stealth Ray |
To fully destroy a file one must literally overwrite its contents.
Minimally, most file shredding utilities pass over the file's original data three times.
The National Security Agency requires at least seven passes to treat files within its organization.
Stealth-Ray will permit up to 35 passes. |
|
You may liken this process to writing a word in pencil and erasing it.
With casual effort, one will be able to see what was written.
However if one then writes over that word, erases it, and repeats several times,
it becomes increasingly difficult to discern the original word.
StealthRay accomplishes this by overwriting the file's original data with random gibberish.
Even sophisticated hardware designed to ferret out the minute magnetic traces of overwritten data
will reliably fail after sufficient passes. |
|
File Encryption/Decryption |
Get StealthRay |
StealthRay employs the state-of-art encryption technology mandated for
all government use by the U.S. National Institute of Standards and Technology (NIST).
The Rijndael algorithm is virtually unbreakable and possesses no back door.
StealthRay users lock their files via the use of a key: either their Stealth Ray system password,
or a custom password specifically targeted to a given file or set of files. Nobody can
recover these keys. Barring a massive revolution in computational power
or decryption technology, nothing short of a titanic effort in both time and money will break Rijndael. |