Categories
|
Audio & Multimedia
Audio Encoders/Decoders, Audio File Players, Audio File Recorders, CD Burners, CD Players, Multimedia Creation Tools, Music Composers, Other, Presentation Tools, Rippers & Converters, Speech, Video Tools Business
Accounting & Finance, Calculators & Converters, Databases & Tools, Helpdesk & Remote PC, Inventory & Barcoding, Investment Tools, Math & Scientific Tools, Office Suites & Tools, Other, PIMS & Calendars, Project Management, Vertical Market Apps Communications
Chat & Instant Messaging, Dial Up & Connection Tools, E-Mail Clients, E-Mail List Management, Fax Tools, Newsgroup Clients, Other Comms Tools, Other E-Mail Tools, Pager Tools, Telephony, Web/Video Cams Desktop
Clocks & Alarms, Cursors & Fonts, Icons, Other, Screen Savers: Art, Screen Savers: Cartoons, Screen Savers: Nature, Screen Savers: Other, Screen Savers: People, Screen Savers: Science, Screen Savers: Seasonal, Screen Savers: Vehicles, Themes & Wallpaper Development
Active X, Basic, VB, VB DotNet, C / C++ / C#, Compilers & Interpreters, Components & Libraries, Debugging, Delphi, Help Tools, Install & Setup, Management & Distribution, Other, Source Editors Education
Computer, Dictionaries, Geography, Kids, Languages, Mathematics, Other, Reference Tools, Science, Teaching & Training Tools Games & Entertainment
Action, Adventure & Roleplay, Arcade, Board, Card, Casino & Gambling, Kids, Online Gaming, Other, Puzzle & Word Games, Simulation, Sports, Strategy & War Games, Tools & Editors Graphic Apps
Animation Tools, CAD, Converters & Optimizers, Editors, Font Tools, Gallery & Cataloging Tools, Icon Tools, Other, Screen Capture, Viewers Home & Hobby
Astrology/Biorhythms/Mystic, Astronomy, Cataloging, Food & Drink, Genealogy, Health & Nutrition, Other, Personal Finance, Personal Interest, Recreation, Religion Network & Internet
Ad Blockers, Browser Tools, Browsers, Download Managers, File Sharing/Peer to Peer, FTP Clients, Network Monitoring, Other, Remote Computing, Search/Lookup Tools, Terminal & Telnet Clients, Timers & Time Synch, Trace & Ping Tools Security & Privacy
Access Control, Anti-Spam & Anti-Spy Tools, Anti-Virus Tools, Covert Surveillance, Encryption Tools, Other, Password Managers Servers
Firewall & Proxy Servers, FTP Servers, Mail Servers, News Servers, Other Server Applications, Telnet Servers, Web Servers System Utilities
Automation Tools, Backup & Restore, Benchmarking, Clipboard Tools, File & Disk Management, File Compression, Launchers & Task Managers, Other, Printer, Registry Tools, Shell Tools, System Maintenance, Text/Document Editors Web Development
ASP & PHP, E-Commerce, Flash Tools, HTML Tools, Java & JavaScript, Log Analysers, Other, Site Administration, Wizards & Components, XML/CSS Tools |
|
Cryptic Disk Professional Edition 3.2.51.710
|
Disk Encryption Software
|
Released: | 2014-01-21 All programs by this author |
|
Downloads: | 309 |
License Type: | Shareware |
Platform: | WinXP,WinVista,WinVista x64,Win7 x32,Win7 x64,Windows2003,WinServer,Windows Vista Ultimate,Windows Vista Ultimate x64,Windows Vista Starter,Windows Vista Home Basic,Windows Vista Home Premium,Windows |
Product homepage: | http://www.exlade.com/cryptic-disk |
Price: | $94.95 US |
| [Download] (13660 K) |
|
Description:Protecting your information can cost money - but not protecting it can cost even more. Cryptic Disk creates virtual encrypted disks and also encrypts hard disks, USB drives and memory cards. This lets you keep your secrets safe both on your home computer and at your workstation. Data encryption uses the best algorithms available (AES (Rijndael), Serpent, Twofish, Blowfish and CAST6 can all be chosen), takes place in real time, and does not affect computer performance. All data are saved to the protected disk in encrypted form, and decrypted when read.
Encrypted virtual and physical disks are mounted as separate disks attached to a drive letter of your choice, or an ordinary folder on NTFS disks. They do not have any special markers which give away that they are, in fact, an encrypted disk. Addition protection can be provided using steganography, by creating hidden encrypted disks inside of other ones.
Encryption is performed in XTS mode, developed specially for encrypting disk data. The program boasts strong protection from brute force password attacks in accordance with PKCS #5 v2, as well as a virtual keyboard which protects user-entered passwords from keyloggers.
The only way to access encrypted data is using key files or the password which only you know.
And even if the protected disk is lost or stolen, when it is attached to another computer, the disk's data will be hidden from access. The only way to gain access is Cryptic Disk together with the key files and password entered by the user when creating the encrypted disk.
The professional version of the program has configurable automatic actions upon mounting or dismounting an encrypted disk: play WAV files or execute programs or scripts in the CMD Shell, Windows Script and PowerShell languages.
Cryptic Disk can also work in portable mode, which does not require that it first be installed on a computer before use. Download Cryptic Disk today for the peace of mind that comes with complete security!
|
|
Disk Encryption Software, Cryptic Disk, Exlade |
|
|