Protect and manage your valuable passwords and other sensitive information.
Allows implementing sets of granular password-usage rules.
Shows the actual password hidden behind the asterisk.