Be wary of using the email-based password-recovery system. Rather than the
XVXDOWLPHOLPLWHGUHFRYHU\OLQN7UHQG0LFURMXVWEOXUWVRXW\RXUDFWXDO
password in plain text. If you must use email-based recovery, change your
password after doing so. Note, too, that for some reason you can use only letters
and numbers in the password, no special characters.
(QVXULQJPD[LPXPVHFXULW\IRU\RXU¿OHVLVDWZRVWHSSURFHVV)LUVW\RXFRS\
WKH¿OHWRWKHFOLSERDUGDQGSDVWHLWLQWRWKH9DXOW'RQ¶WGUDJWKH¿OHLQDV
doing so simply deletes the original. Second, you use Secure Erase to eliminate
the original. Otherwise, a snoop (or a government agency) might be able to
UHFRYHUWKHXQHQFU\SWHG¿OH
Here comes the best part. If your laptop gets lost or stolen, you can log into
7UHQG0LFURRQOLQHDQGVHDOWKH9DXOWVRWKDWHYHQWKHSDVVZRUGZRQ¶WRSHQLW
That laptop thief can try guessing passwords until the sun goes nova; it won’t
work. If you’re fortunate enough to recover the laptop, you can log back into
Trend Micro and unseal the vault.
LIMITED PASSWORD MANAGER
Keep your eyes open while installing this suite. On the License Agreement page
is a subtle checkbox that tells the installer to also add Trend Micro Password
Manager. You can install it later, but the easiest way to get it is while installing
the suite.