Security features
Enjoy peace of mind using software that delivers all-around security.
Imagine the enormous financial and business setback you would suffer if your music were to fall into the wrong hands before the official release date.
Turn to iPool and avoid unnecessary risks.
As an iPool customer you have nothing to worry about. iPool’s remarkable multilevel security concept ensures exceptionally effective protection against all types of hacker attacks and other forms of unauthorized intrusions:
Watermark Protection
The illegal distribution of music has reached shocking proportions in this age of illegal, free MP3 websites. iPool can give each downloaded MP3 file a unique watermark that is inaudible to the human ear. Now you can find out right away who is behind any unauthorized distribution of your tracks.
Encrypted Data Transmission
iPool supports encrypted data transmission using HTTPS. This enables all data to be transmitted between your iPool and you and all your recipients in a manner that is secure against interception and monitoring.
Protected Member Area
All of your releases, media files and information are available to your media and business partners only within a protected area, and each recipient is provided with unique login credentials.
Brute Force Attacks
A brute force attack is a malicious attempt by someone using a computer program to gain access to your system by trying thousands of different user names and passwords. iPool recognizes these attacks and immediately and automatically blocks the attacker’s IP address.
Protection against Malicious Bots
iPool identifies and successfully blocks computer programs running automated requests (bots). iPool checks each such query or contact to determine if it is originating from an actual human being. To do this it uses CAPTCHAs as well as proprietary procedures that we have developed.
Denial-of-Service Attacks
A denial-of-service (DoS) attack is a targeted attack on a system designed to make it unavailable to users and thus out of service by flooding it with traffic or requests. iPool identifies these kinds of attacks on its own and immediately implements appropriate countermeasures.
Restricting Download Attempts
In iPool you can restrict the number of download attempts for each track and recipient. This means that a recipient cannot download a track an unlimited number of times, but instead only as often as you designate. You can activate additional download attempts for a user as needed. iPool identifies when a user’s downloads are being made from different locations or potentially by different people, and provides you with a warning.
Session Hijacking
Session hijacking can become a serious problem particularly for people who use web applications in publicly accessible Wi-Fi hotspots. iPool automatically recognizes and blocks hijacked sessions.
SQL Injection and Cross-Site Scripting
From the very beginning we designed iPool to successfully thwart any attempted SQL injection and cross-site scripting (XSS) attacks.