|
More tags: encryption, encrypting, disk encryption, partition encryption, data encryption, transparent encryption, on-the-fly encryption, aes, protect disk, protect partition,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
WinXP, Windows2000, Windows2003, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Ultimate, Windows Vista Home Basic x64, Windows Vista Home Premium x64, Windows Vista Business x64, Windows Vista Enterprise x64, Windows Vista Ultimate x64 |
|
|
Price : |
USD 49.95 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
N/A |
|
|
Date : |
2009-11-25 |
|
|
Size : |
2.57 MB |
|
|
Software In :
Utilities
Security
encryption, encrypting, disk encryption, partition encryption, data encryption, transparent encryption, on-the-fly encryption, aes, protect disk, protect partition,
|
Cryptic Disk 2.8 provides a simple and affordable way to protect disks and disk partitions by encrypting them. The encrypted data cannot be accessed without entering the password, even if a hacker gets access to a PC or the hard drive is stolen. The program uses the AES 256-bit encryption algorithm, the same type of encryption that NASA, the FBI and the Department of Defense use to protect their data. Encrypting and decrypting takes one click and does not require a PhD in mathematics or computer science. Cryptic Disk 2.8 can be used either at home or in the office. The program supports multiple users with different degrees of access privileges, as set by the system administrator. Each user will then have access to the encrypted data that he or she has the access rights to, but not to the data of others. Naturally, Cryptic Disk 2.8 has been designed to work with hard drives, but the program can be used with removable storage media, such as USB Flash drives. Once the data is encrypted, the files cannot be accessed by any person who does not know the password. After decryption, all files become accessible and the hard drive works normally. Cryptic Disk 2.8 can be downloaded and tried absolutely free of charge. The trial version does not have any functional limitations, but only allows the word "demo" as the password.
Infinity Blade IIIOpen Snaps워킹맘 고민 상담소Small Tattoo IdeasPebble Emoji SupportTV from North KoreaKENPRODIÄT - 1 Tag essen, 1 Tag Diät
|
|
Also See
1)
Exe Wrapper
( www.533soft.com ) Exe Wrapper allows you to protect any Exe-file with its own password from non- authorized execution. And it can modify the main icon of the .exe file. If you mean to keep people ou...
License:Shareware USD 19.95
Size:0.75 MB
2)
Public Kiosk Software
Simple and easy to setup and manage, this program is ideal for Internet cafe and public places, it allows you to secure your PC, so you can turn it into public access workstation. Protect all features...
License:Shareware USD 69
Size:9.19 MB
3)
Antivir Personal WINX
La tecnologia AntiVir, le protege contra virus, gusanos, caballos troyanos, Ad/Spyware, dialers y contra muchas otras amenazas digitales. Gratis para uso personal....
License:Freeware
Size:9.6 MB
spyware, software espia, espias, amenaza, antidialer, antispam, antispyware, antivirus, backdoors, bugs, correo electronico, estado virico internacional, firewall, gusanos, er, internautas, internet segura, navegacion segura, privacidad en la red,
4)
CookieCooker
CookieCooker is a tool that enables you to protect your behavior and your interests from being spied on on the internet. Also Cookiecooker potects your email and postal mail account against spam by us...
License:Shareware USD 15
Size:1.40 MB
5)
1st Network Admin
1st Network Admin offers a comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to almost every corner of Windows for all PC workstat...
License:Shareware USD 59
Size:2.69 MB
6)
Free Internet Eraser
Free Internet Eraser is an Internet privacy software that protects your Internet privacy by permanently erase internet history and past computer activities. Even though, many of the tasks can be perfo...
License:Freeware USD 0
Size:0.88 MB
7)
Active System Locker
System Locker is a handy utility that allows you to protect your personal computer from unauthorized access by locking keyboard and mouse. You can use System Locker to restrict access to your PC. It i...
License:Shareware USD 29.95
Size:0.71 MB
8)
RemoveAny
RemoveAny finds and removes spyware, adware, Trojan horses, key-loggers, rootkits, backdoors on your computer. RemoveAny product recognizes malicious software by watching for suspicious behavior, not ...
License:Freeware USD 0
Size:0.3 MB
9)
System Purifier
Jitbit System Purifier is an all-in-one file shredder, privacy eraser, disk cleaner, free space wiper/eraser and startup programs manager. ... "FILE SHREDDER" - "file eraser" securely deletes files fr...
License:Shareware USD 26.85
Size:0.99 MB
10)
No Spam Today for Servers
NoSpamToday is a powerful SMTP/POP3 spam filtering solution with a number of useful security features that will help you do away with spam messages and will keep you safe from viral threats and suspic...
License:Shareware USD 199
Size:15.15 MB
|
1)
DirCmp
DirCmp is a command-line tool that allows you to compare two directories and possibly their subdirectories. The program reports files missing in either directory and whether some files are different o...
License:Freeware
Size:0.05 MB
2)
CD Eject Tool
CD Eject Tool is a utility that manages your CD Drive doors. It allows you to eject and close the CD Drive door by using a hotkey, desktop shortcut, or via an icon in your system tray. It will automat...
License:Shareware USD 14.95
Size:0.67 MB
3)
MakeVM
With MakeVM you can: * Clone your Real OS to VMWare, VirtualPC or Parallels Workstation; * Clone your Virtual OS between virtualization software of different Vendors; * Convert/clone/compact virtual d...
License:Shareware USD 19.95
Size:0.67 MB
edit virtual machine vmware player,
4)
Purge (Confidential Files Eraser)
Purge is a program that allows you to delete files from your computer the way, it won't be possible to recover them using any file recovering software or even by giving your harddrive to the professio...
License:Shareware USD 39
Size:0.19 MB
5)
APDF Text Extractor
A-PDF Text Extractor is an utility designed to extract text from Adobe PDF files for use in other applications. The program is a standalone application. No Adobe Acrobat needed. To extract text from a...
License:Freeware USD 0
Size:0.91 MB
6)
Mamutu
Mamutu monitors in realtime all active programs for dangerous behavior and blocks malicious activities. It recognizes new and unknown Trojans, Backdoors, Keyloggers, Worms, Viruses, Spyware, Adware an...
License:Shareware USD 27
Size:3.53 MB
7)
TotalMounter
KernSafe TotalMounter is an advanced and powerful virtual CD/DVD-ROM/RW/RAM emulator, and it is full-featured free software for windows. TotalMounter is also a free full-featured iSCSI initiator, virt...
License:Freeware
Size:0.57 MB
8)
Remove Old Files
The program for deleting, moving, archiving, clearing folders of old files. Transfers data to archive folders based on file creation, modification or last access date. Easily remove files over N-days ...
License:Shareware USD 29.95
Size:1.17 MB
9)
RonyaSoft Poster Printer (ProPoster)
RonyaSoft Poster Printer is software for large format poster and banner printing, big sign and mural creation. Software is compatible with standard printers and does not require special plotters. Any ...
License:Shareware USD 19.95
Size:3.77 MB
10)
SOCKShell
The Windows Explorer's File menu and context menu (the menu displayed when you right click on an item in the Explorer window) display the options that operate on the selected object. These operations ...
License:Shareware USD 14.95
Size:0.83 MB
|
|
More tags: encryption, encrypting, disk encryption, partition encryption, data encryption, transparent encryption, on-the-fly encryption, aes, protect disk, protect partition,
|
|