Cryptic Disk provides a simple and affordable way to protect disks and disk partitions by encrypting them. The encrypted data cannot be accessed without entering the password, even if a hacker gets access to a PC or the hard drive is stolen. The program uses the AES 256-bit encryption algorithm, the same type of encryption that NASA, the FBI and the Department of Defense use to protect their data. Encrypting and decrypting takes one click and does not require a PhD in mathematics or computer science. Cryptic Disk can be used either at home or in the office. The program supports multiple users with different degrees of access privileges, as set by the system administrator. Each user will then have access to the encrypted data that he or she has the access rights to, but not to the data of others. Features: • Emergency disconnection. Upon entering the hot keys combination (for example, “Ctrl+Alt+D”) all the connected encrypted disks will be disconnected. • Multi-access system. Multi-user access mode with restriction of access rights for encrypted disks. • Local network access to the encrypted disks. Access rights are set in the operating system only once to be saved for further connections. • Local network access settings saved. Upon the program restart this function ensures saving and restoring the list of shared resources of the encrypted disks. • Password protected Cryptic Disk launch. Password protection of launching the program itself. • Hot Key system. To ensure quick access to such functions as “disk mounting”, “disconnection of disks”, etc., hot keys can be set. • Automatic disk connection. A user can enter the access key to the encrypted disk and the program will make independent attempts to mount each disk to the system. This feature increases convenience of working with the program. • Automatic disk disconnection. Multi-function customized system of automatic disk disconnection in various user-unattended cases. • Command line. A possibility to use all the program functions in the command line, which enables automation of any features of the program. • Saving the encryption key to a file. In case a user looses the password, the program provides for an optional export of the encryption key to a separate file. Homepage - www.exlade.com Size: 2,6 MB
|