JELAlogo

Home
Software
About OnlyYou
Screenshots
FAQs
Support
Consulting
AboutUs

Security Software and Technology Consulting     

Understanding OnlyYou

In the following pages, we explain how OnlyYou allows you to exploit the strengths of passwords while not being undermined by their weaknesses.

We use the strengths of computers in computational complexity coupled with familiar user interactions that are practical in everyday use.

We build on our natural behaviors. We do not rely on you being forced to act awkwardly  in order to be secure.

See the topics below for more details.

Theoretical strengths of passwords

Practical weaknesses of passwords

The power of OnlyYou

OnlyYou is encryption and more

[Home] [Software] [Support] [Consulting] [AboutUs]

JELA CO INC

Computers & Communications since 1982

Please contact our Webmaster with questions or comments.
© Copyright 1999-2010  Jela Company, Inc.  All rights reserved.

sitemap