1st Verify Device Interface 2nd Verify User Interface 3rd Encrypt Interface
HOW TO USE ENCRYPTION TOOL?


NO ENCRYPTION CODE?
PROXY ACTIVATION
NO ENCRYPTION CODE? Start encryption




Devices Lock
USER Lock
Sources Lock