Main > Security & Privacy > Encrypting >

Cryptic Disk 2.7.0



 

Cryptic Disk 2.7.0

Sponsored Links

Cryptic Disk 2.7.0 Ranking & Summary

RankingClick at the star to rank
Ranking Level
Buy now
User Review: 10 (1 times)
File size: 2.55 MB
Platform: WinXP,Windows2000,Windows2003,Windows Vista S
License: Shareware
Price: $49.95
Downloads: 205
Date added: 2009-04-13
Publisher: EXLADE, Inc.

Cryptic Disk 2.7.0 description

Cryptic Disk 2.7.0 offers you a professional program that provides a simple and affordable way to protect disks and disk partitions by encrypting them. The encrypted data cannot be accessed without entering the password, even if a hacker gets access to a PC or the hard drive is stolen. The program uses the AES 256-bit encryption algorithm, the same type of encryption that NASA, the FBI and the Department of Defense use to protect their data. Encrypting and decrypting takes one click and does not require a PhD in mathematics or computer science.

Cryptic Disk 2.7 can be used either at home or in the office. The program supports multiple users with different degrees of access privileges, as set by the system administrator. Each user will then have access to the encrypted data that he or she has the access rights to, but not to the data of others.

Naturally, Cryptic Disk 2.7 has been designed to work with hard drives, but the program can be used with removable storage media, such as USB Flash drives. Once the data is encrypted, the files cannot be accessed by any person who does not know the password. After decryption, all files become accessible and the hard drive works normally.

Cryptic Disk 2.7 can be downloaded and tried absolutely free of charge. The trial version does not have any functional limitations, but only allows the word "demo" as the password.

The program suggests a configurable multi-user access system for the user with administrator’s rights to set individual access rights for different users of the system, create passwords for them and establish various degrees of access privileges, including when it comes to accessing the system from the local network. These settings can also be saved and restored for further local network connections.

The program uses a strong and currently most reliable AES (Advanced Encryption Standard) 256 cryptographic algorithm approved by the US government and applied by NASA and the FBI to secure their data, suggesting it will ensure a truly reliable file security.

In case a user looses or forgets the password, the program provides for an optional export of the encryption key to a separate file. Do remember, however, that this key can be as well used by violators!

Major Features:

  1. Supports 64-bit versions and Microsoft® Windows® Vista®.
  2. Multi-language interface.
  3. Disk encryption.
    A possibility to encrypt any kind of storage devices (hard drives, USB-disks, Flash drives, etc.
  4. Disk partition encryption.
    A possibility to encrypt partitions (logical volumes) on hard drives.
  5. Easy conversion to a regular disk.
    Encrypted disks and disk partitions can always be converted back to regular ones.
  6. Automatic and user-transparent data encryption (“on-the-fly” disk encryption).
    Strong and reliable cryptographic data encryption algorithms.
    AES with the key length of 256 bit and the CBC operation mode.
  7. User-friendly interface.
    The program’s interface is designed taking into consideration all the usability requirements and is highly understandable and convenient even for an inexperienced PC user.
    No installation required to run the program.
  8. Quick connection.
    Cryptic Disk allows mounting encrypted disks and changing their properties immediately after their creation without any operating system restart or device reconnection needed.
  9. Safe and correct disconnection.
    Upon the system shutdown, the Cryptic Disk process is the last to end, which enables other applications to finish work with files on encrypted disks correctly.
  10. A reliable key generation system.
    The encryption key is generated subject to several dozens of constantly changing internal IDs of the operating system, MS Windows CryptoAPI, keystrokes on the keyboard and mouse movements. Also, in key generation reliable algorithms for pool transformation after every new value added. The pool is updated two times per second.
  11. Plug-in system.
    The system of plug-in options for enhancing the basic functionalities of the program (for example, a plug-in option for running any scenarios on the encrypted disk after its connection or before disconnecting it).
  12. Emergency disconnection.
    Upon entering the hot keys combination (for example, “Ctrl+Alt+D”) all the connected encrypted disks will be disconnected.
  13. Multi-access system.
    Multi-user access mode with restriction of access rights for encrypted disks.
  14. Local network access to the encrypted disks.
    Access rights are set in the operating system only once to be saved for further connections.
  15. Local network access settings saved.
    Upon the program restart this function ensures saving and restoring the list of shared resources of the encrypted disks.
  16. Password protected Cryptic Disk launch.
    Password protection of launching the program itself.
  17. Hot Key system.
    To ensure quick access to such functions as “disk mounting”, “disconnection of disks”, etc., hot keys can be set.
  18. Automatic disk connection.
    A user can enter the access key to the encrypted disk and the program will make independent attempts to mount each disk to the system. This feature increases convenience of working with the program.
  19. Automatic disk disconnection.
    Multi-function customized system of automatic disk disconnection in various user-unattended cases.
  20. Command line.
    A possibility to use all the program functions in the command line, which enables automation of any features of the program.
  21. Saving the encryption key to a file.
    In case a user looses the password, the program provides for an optional export of the encryption key to a separate file.

Enhancements: The encryption driver of Cryptic Disk now has a digital signature, which enables creating encrypted disks in all the 64-bit operating systems (Windows Vista, 2008 Server and Windows 7).

Requirements:

  • System with Intel® Pentium™ III or comparable Processor
  • Minimum 128 MB RAM (depending on operating system)
  • 10 MB free hard disk space
  • VGA Graphics Card with minimum 800x600 and 256 colors
  • Keyboard and mouse
  • Windows™ 2000, XP, 2003, Vista® and 2008

WareSeeker Editor

Cryptic Disk 2.7.0 Screenshot

Cryptic Disk 2.7.0 Keywords

Bookmark Cryptic Disk 2.7.0

Hyperlink code:
Link for forum:

Cryptic Disk 2.7.0 Copyright

WareSeeker.com do not provide cracks, serial numbers etc for Cryptic Disk 2.7.0. Any sharing links from rapidshare.com, yousendit.com or megaupload.com are also prohibited.

Allok Video Splitter 2.2.0 Review:

Name (Required)
Email(Required)
Captcha
Featured Software

Want to place your software product here?
Please contact us for consideration.

Contact WareSeeker.com
Related Software
Protect private and sensitive data from potential unauthorized access Free Download
A transparent(on-the-fly) disk/cd encryption system, which combin with AES 256-bit encryption. DiskEncryptor can make a disk partition encrypted on the windows system or create some new virtual disks Free Download
A small utility with which you can fast access your favorite URLs. Simply start it and you can launch your favorites withone click access from system tray (your default browser will start automaticall Free Download
System Locker restricts access and protects your PC. Free Download
Tray DB is a data access program which sits in your system tray and allows you access your data in Microsoft Access Free Download
QuickNav will let you have quick access to folders from a systray icon Free Download
An Access-based ISP billing system that provides automatic billing and an easy-to-use user interface Free Download
With Easy Vista Manager you can take complete control of your Windows system with access to hundreds of powerful tweaks and hidden Registry settings. Free Download