Софт → Jetico BestCrypt v8.20.2
Скачать бесплатно Jetico BestCrypt v8.20.2
BestCrypt - это пакет программ для создания на жестком диске компьютера виртуального зашифрованного диска. С зашифрованным контейнером можно работать как с обычным жестким диском - размещать на нем файлы и производить с ними любые операции, инсталлировать программы и т.д. и т.п. Шифрование/расшифровка идет в фоновом режиме, так что пользователь не замечает разницы в работе с обычным и зашифрованным диском, который, кстати, при необходимости одним кликом может превратиться в обычный, но не читаемый файл. Есть у этой программы и такая опция, как создание *скрытого* контейнера, который нельзя определить (увидеть) никакими средствами. Кроме этого, в BestCript входит утилита для шифрования своп-файла (в свопе хранятся временные данные, в том числе документы и пароли, так что его шифрование является совсем нелишней опцией для защиты информации), а также BCWipe - утилита, позволяющая удалять файлы без возможности их восстановления.
The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.
The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.
Once written to a BestCrypt file (container), data is never stored in an ‘open’ condition. Yet BestCrypt’s smooth operation and complete transparency allow any authorized user to get instant access to the data.
BestCrypt's advanced data encryption and authorization technology provides a new level of security with standard, proven and published cryptographic algorithms, safe password input, and transparent encryption.
BestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. with any drive letter that is not used by another system device).
BestCrypt allows encrypting data with many encryption algorithms (AES, Blowfish, Twofish, CAST and others). Every algorithm is implemented with the largest possible key size defined in the algorithm's specification. BestCrypt v.8 can utilize LRW Encryption Mode, which is specially designed for applications working on disk sector level and more secure than other popular modes used earlier (like Cipher Block Chaining (CBC) mode).
The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt.
Any free drive letter in the system may be used to mount and to open an encrypted file-container for access. As well, with BestCrypt v.8 you can mount file-container as a subfolder on NTFS disk. When the virtual disk is opened, you can read and write data as if it were a conventional removable disk.
BestCrypt version 8 provides users with a higher security level as well as with a set of new functions. Besides, there are several ways of encrypting data in version 8:
- Storing encrypted data in containers and accessing the data through virtual drives (as earlier versions of the software do);
- Encrypting set of files into a single compressed and, if needed, self-extracting archive (read more information in BCArchive article);
- Encrypting and accessing transparently whole Windows partitions/volumes (read more information in BestCrypt Volume Encryption article).
BestCrypt allows encrypting data with many encryption algorithms. Every algorithm is implemented with the largest possible key size defined in the algorithm's specification:
- AES (Rijndael) - 256-bit key.
- Blowfish - 448-bit key.
- CAST - 128-bit key.
- GOST 28147-89 - 256-bit key.
- RC6 - 256-bit key.
- Serpent - 256-bit key.
- Triple-Des - 168-bit key.
- Twofish - 256-bit key.
Note: that BestCrypt v.8 supports also the following algorithms to provide compatibility with earlier versions of the software: Blowfish (256-bit key), Blowfish (128-bit key), DES (56-bit key).
BestCrypt is compatible for 32/64-bit Windows Vista/XP/2003 Server/2000/NT/ME/9x
11 декабря 2009 Добавил:
Hengmen Просмотров: 542 Комментарии: 0
BestCrypt - это пакет программ для создания на жестком диске компьютера виртуального зашифрованного диска. С зашифрованным контейнером можно работать как с обычным жестким диском - размещать на нем файлы и производить с ними любые операции, инсталлировать программы и т.д. и т.п. Шифрование/расшифровка идет в фоновом режиме, так что пользователь не замечает разницы в работе с обычным и зашифрованным диском, который, кстати, при необходимости одним кликом может превратиться в обычный, но не читаемый файл. Есть у этой программы и такая опция, как создание *скрытого* контейнера, который нельзя определить (увидеть) никакими средствами. Кроме этого, в BestCript входит утилита для шифрования своп-файла (в свопе хранятся временные данные, в том числе документы и пароли, так что его шифрование является совсем нелишней опцией для защиты информации), а также BCWipe - утилита, позволяющая удалять файлы без возможности их восстановления.
The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.
The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.
Once written to a BestCrypt file (container), data is never stored in an ‘open’ condition. Yet BestCrypt’s smooth operation and complete transparency allow any authorized user to get instant access to the data.
BestCrypt's advanced data encryption and authorization technology provides a new level of security with standard, proven and published cryptographic algorithms, safe password input, and transparent encryption.
BestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. with any drive letter that is not used by another system device).
BestCrypt allows encrypting data with many encryption algorithms (AES, Blowfish, Twofish, CAST and others). Every algorithm is implemented with the largest possible key size defined in the algorithm's specification. BestCrypt v.8 can utilize LRW Encryption Mode, which is specially designed for applications working on disk sector level and more secure than other popular modes used earlier (like Cipher Block Chaining (CBC) mode).
The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt.
Any free drive letter in the system may be used to mount and to open an encrypted file-container for access. As well, with BestCrypt v.8 you can mount file-container as a subfolder on NTFS disk. When the virtual disk is opened, you can read and write data as if it were a conventional removable disk.
BestCrypt version 8 provides users with a higher security level as well as with a set of new functions. Besides, there are several ways of encrypting data in version 8:
- Storing encrypted data in containers and accessing the data through virtual drives (as earlier versions of the software do);
- Encrypting set of files into a single compressed and, if needed, self-extracting archive (read more information in BCArchive article);
- Encrypting and accessing transparently whole Windows partitions/volumes (read more information in BestCrypt Volume Encryption article).
BestCrypt allows encrypting data with many encryption algorithms. Every algorithm is implemented with the largest possible key size defined in the algorithm's specification:
- AES (Rijndael) - 256-bit key.
- Blowfish - 448-bit key.
- CAST - 128-bit key.
- GOST 28147-89 - 256-bit key.
- RC6 - 256-bit key.
- Serpent - 256-bit key.
- Triple-Des - 168-bit key.
- Twofish - 256-bit key.
Note: that BestCrypt v.8 supports also the following algorithms to provide compatibility with earlier versions of the software: Blowfish (256-bit key), Blowfish (128-bit key), DES (56-bit key).
BestCrypt is compatible for 32/64-bit Windows Vista/XP/2003 Server/2000/NT/ME/9x
Уважаемый посетитель вы вошли на сайт как незарегистрированный пользователь. Мы рекомендуем вам зарегистрироваться либо войти на сайт под своим именем.
Похожие новости
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации. |
Календарь ↓
« Ноябрь 2024 » | ||||||
---|---|---|---|---|---|---|
Пн | Вт | Ср | Чт | Пт | Сб | Вс |
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 |
Архив сайта ↓
Февраль 2024 (4)
Сентябрь 2023 (1)
Сентябрь 2021 (9)
Май 2021 (3)
Апрель 2021 (1)
Март 2021 (3)
Друзья ↓
» Порно видео онлайн
» Ведьмак смотреть онлайн
» Сокол и Зимний Солдат смотреть
» Фильмы и сериалы онлайн
»
»
» Скачать Warcraft 3
»
Обмен ссылками закрыт!