17:53:43 Jetico BestCrypt 8.20 | |
The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion. Once written to a BestCrypt file (container), data is never stored in an
‘open’ condition. Yet BestCrypt’s smooth operation and complete transparency
allow any authorized user to get instant access to the data. BestCrypt creates and supports encrypted virtual disks, which are visible as
regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e.
with any drive letter that is not used by another system device). The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt. Any free drive letter in the system may be used to mount and to open an encrypted file-container for access. As well, with BestCrypt v.8 you can mount file-container as a subfolder on NTFS disk. When the virtual disk is opened, you can read and write data as if it were a conventional removable disk. BestCrypt version 8 provides users with a higher security level as well as
with a set of new functions. Besides, there are several ways of encrypting data
in version 8: BestCrypt allows encrypting data with many encryption algorithms. Every
algorithm is implemented with the largest possible key size defined in the
algorithm's specification: Note: that BestCrypt v.8 supports also the following algorithms to provide compatibility with earlier versions of the software: Blowfish (256-bit key), Blowfish (128-bit key), DES (56-bit key). Size : 15.7 MB Download :Sharingmatrix | |
|
| |
| Total comments: 0 | |
