The application begins with deploying a virtual machine on the user's computer (a PC or Mac), then loads the iBOX operating system and browser. iBOX uses VirtualBox technology to create a separate computer instance on the host machine. These buffers allow the user to access their vulnerable information within a more secure environment. iBOX does not keep any of the user's data, but operates as a layer of security between its user and the Internet.
Universal iBOX has two modes: banking and browsing. Banking mode provides access to banking and financial institutions websites only. The proxy server is configured such that the user is unable to reach any other websites. Browsing mode allows the user to access any website without restrictions from the proxy server. The user can simply switch between two modes without any risk of jeopardizing the security of the application.
The Windows version of iBOX is built with a portable loader, so that the application may be loaded from a USB device without installation.
Like it? Share with your friends!
Other Windows Software of Developer «iBOX CyberSecurity»:
O&O SafeErase (64-bit) O&O SafeErase 4 is THE solution for the secure deletion of sensitive data and internet tracks like your browser history or your stored cookies from your hard disk and offers you the ultimate protection of your private sphere. With just one click of the mou
Iron Password for Windows 8 IronPassword is a password generation tool to create high quality random passwords, even in bulk, securely and at any length. It features strong passwords, side-channel safety, bulk generation, and visible or invisible generation.
Shadow Professional Shadow Professional enables you to activate private computer sessions that will not leave any tracks on your computer, and do not require you to delete all your Internet and PC history. Once you activate a session, the program will keep track of all your a
Soft191 Cleaner Maintain privacy and keep your system running smoother by deleting your computer activity. Remove Internet history (IE, Opera and Firefox), recent file lists (including Office), empty out temporary folders to regain disk space. Such files may include those
Text Guard lite This program helps you convert any text you want to send to others with complete confidentiality into a sophisticated numeric code that can only be translated back to text using Text Guard lite with the same MINOR version number.
There will be numerous
Freefloat Link One Freefloat Link*One is the tool that will help you cut costs and maintain information security. With Link*One you can easily remove bottlenecks and create order in the information overflow of modern logistics.You can use it with barcode readers, 2D code rea
Keylogger Killer Keylogger Killer is designed to combat various types of key-logging and activity-monitoring programs. It is based on artificial intelligence algorithms, and does not reply on signature matching, enabling it to detect many new or unknown types of key-loggin
Proxy Switcher Standard Proxy Switcher Standard provides proxy settings management solution and anonymous surfing capabilities. This includes flexible proxy server list management, proxy server tester and anonymous proxy server list down-loader.Features includes try proxy manager
Password Partner With Password Partner, you can save your usernames and passwords and retrieve when you needed. Whenever you create new username and password, enter it into Password Partner. You can take back up your password data, and/or print it out to paper for safe-kee
SureClean Professional SureClean provides the ultimate in privacy based cleaning. Equipped with the Panicware's SureClean technology, this product will make sure that your sensitive information is erased permanently.Feature include:
Erase Internet surfing information - Clean U
Supported Operating Systems:
Windows 7 |
Windows Vista |
Windows XP |
Comments on iBOX:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10