Size 1.212 MB 0 seeders Added 2011-07-01 00:46:29
If your computer were ever to be stolen, are you certain that your personal information cannot be discovered? Jetico’s BestCryptTM software automatically encrypts your files so that nobody can read the data unless they have the right password or keys. "My evaluation of this product has centered on functionality, usability, support for algorithms I like and trust, and of course, overall polish. I think BestCrypt succeeds on all those counts, and based on the consistently high quality of Jetico's software in those areas, I'm willing to believe that their cryptographic implementations are equally meticulous and well executed. In conclusion, BestCrypt is an impressive product. If stability, comprehensive and modular support for a variety of popular encryption algorithms, and overall tightness are anything to go by, it seems to be highly secure as well. I enthusiastically recommend considering BestCrypt for your filesystem encryption needs, especially if you use both Linux and Windows. It's helped restore some of my hope for a more crypto-enabled populace and has been fun to play with, too." - Mick Bauer, Linux Journal BestCrypt supports several encryption algorithms and security standards and offers multiple ways to work transparently with encrypted data: Store encrypted data in containers and access the data through virtual drives. Encrypt sets of files into a single compressed and self-extracting archive (Read more about BCArchive - included in BestCrypt). See BestCrypt Volume Encryption to encrypt and transparently access whole Windows partitions/volumes - 25% discount when purchased together with BestCrypt. BestCrypt automatically encrypts data before saving or storing a file. Sensitive information is scrambled using an algorithm, making the data unreadable. BestCrypt will transparently decrypt the file once the file has been opened by providing the correct password or key. BestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. with any drive letter that is not used by another system device).
|Torrent downloaded from Limetorrents.com.txt||16 B|