Exlade Cryptic Disk 2.7.0.0
[Resimleri görebilmek için üye olun veya giriş yapın.]Exlade Cryptic Disk 2.7.0.0 | RS | HF | x7.to
Fazla zahmet gerektirmeden sabit disklerinizi ve parçalarını şifrelemek için ideal bir yazılım.Şifrelenen bölüm hard disk çalınsa ya da bir hackerın eline düşse bile şifresiz açılamaz.Programın FBI NASA ve Savunma Bakanlığıyla aynı seviyede yani 256 bit AES şifreleme algoritması kullandığı söyleniyor.
Cryptic Disk is a professional solution for password protection of confidential and sensitive data stored on disks and disk partitions. The program uses on-the-fly disk encryption technology which is implemented in a way so as to ensure easy encryption process for the user. It restricts unauthorized access to the computer data by encrypting partitions of a hard drive or removable media and requesting a user to enter a password. Any files stored or saved onto the encrypted disk are automatically encrypted, whereas the encrypted disk or disk partition is invisible and inaccessible in the system unless the user supplies a password in the Cryptic Disk program.
Cryptic Disk provides a simple and affordable way to protect disks and disk partitions by encrypting them. The encrypted data cannot be accessed without entering the password, even if a hacker gets access to a PC or the hard drive is stolen. The program uses the AES 256-bitencryption algorithm, the same type of encryption that NASA, the FBI and the Department of Defense use to protect their data. Encrypting and decrypting takes one click and does not require a PhD in mathematics orcomputer science. Cryptic Disk can be used either at home or in the office. The program supports multiple users with different degrees of access privileges, as set by the system administrator. Each user will then have access to theencrypted data that he or she has the access rights to, but not to the data of others.
Features:
• Emergency disconnection.
Upon entering the hot keys combination (for example, “Ctrl+Alt+D”) all the connected encrypted disks will be disconnected.
• Multi-access system.
Multi-user access mode with restriction of access rights for encrypted disks.
• Local network access to the encrypted disks.
Access rights are set in the operating system only once to be saved for further connections.
• Local network access settings saved.
Upon the program restart this function ensures saving and restoring the list of shared resources of the encrypted disks.
• Password protected Cryptic Disk launch.
Password protection of launching the program itself.
• Hot Key system.
To ensure quick access to such functions as “disk mounting”, “disconnection of disks”, etc., hot keys can be set.
• Automatic disk connection.
A user can enter the access key to the encrypted disk and the program will make independent attempts to mount each disk to the system. This feature increases convenience of working with the program.
• Automatic disk disconnection.
Multi-function customized system of automatic disk disconnection in various user-unattended cases.
• Command line.
A possibility to use all the program functions in the command line, which enables automation of any features of the program.
• Saving the encryption key to a file.
In case a user looses the password, the program provides for an optional export of the encryption key to a separate file.
Cryptic Disk provides a simple and affordable way to protect disks and disk partitions by encrypting them. The encrypted data cannot be accessed without entering the password, even if a hacker gets access to a PC or the hard drive is stolen. The program uses the AES 256-bit encryption algorithm, the same type of encryption that NASA, the FBI and the Department of Defense use to protect their data. Encrypting and decrypting takes one click and does not require a PhD in mathematics or computer science.
Cryptic Disk can be used either at home or in the office. The program supports multiple users with different degrees of access privileges, as set by the system administrator. Each user will then have access to the encrypted data that he or she has the access rights to, but not to the data of others.
Naturally, Cryptic Disk has been designed to work with hard drives, but the program can be used with removable storage media, such as USB Flash drives. Once the data is encrypted, the files cannot be accessed by any person who does not know the password. After decryption, all files become accessible and the hard drive works normally.
Main features:
• Creating encrypted disks and partitions
You can select regular disks or partitions and convert then into encrypted ones.
• Erasing encrypted disks and partitions
You can always erase encrypted disks and partitions and convert them into regular ones.
• Mounting and unmounting encrypted disks
You can mount an encrypted disk/partition onto the system and work with it just as with a regular disk/partition.
• Multi-user access
Each user of an encrypted disk can have an individual password and access rights.
• Protecting the program with a password
This feature will allow you to limit access to the program by other users of the computer.
System requirements:
• Windows 2000/XP/2003/Vista
• About 5 MB of free space on the hard disk for program files
The unregistered version of the program has one limitation:
• You can use only the password “demo” in the program. As such, it is not recommended that you use an unregistered copy of the program to protect confidential information.
All the limitations will be removed after you register the program.
Copyright (c) 2004-2009 Exlade, Inc.
[Linkleri görebilmek için üye olun veya giriş yapın.]installation
unrar it using winrar
run .exe file
intall it
close all application before patch
run patch click on patch before cryptic file select it open
patched sucessfull
enjoy
DOWNLOAD
[Linkleri görebilmek için üye olun veya giriş yapın.]