with any drive letter that is not used by another system device). BestCrypt will transparently decrypt the file once the file has been opened by providing the correct password or key.īestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. Sensitive information is scrambled using an algorithm, making the data unreadable. * See BestCrypt Volume Encryption to encrypt and transparently access whole Windows partitions/volumes - 25% discount when purchased together with BestCrypt.īestCrypt automatically encrypts data before saving or storing a file. * Encrypt sets of files into a single compressed and self-extracting archive (Read more about BCArchive - included in BestCrypt). * Store encrypted data in containers and access the data through virtual drives. If your computer were ever to be stolen, are you certain that your personal information cannot be discovered? Jetico’s BestCrypt software automatically encrypts your files so that nobody can read the data unless they have the right password or keys.īestCrypt supports several encryption algorithms and security standards and offers multiple ways to work transparently with encrypted data: Restoring volumes from Apple Software Restore (ASR) images īurning disk images to CD or DVD in HFS+ format Ĭhecking the S.M.A.R.T status of a hard disk.ĭisk Utility functions may also be accessed from the Mac OS X command line with the diskutil and hdiutil commands. Secure deletion of free space or disk using a "zero out" data, a 7-pass DOD 5220-22 M standard, or a 35-pass Gutmann algorithmĪdding or changing partition table between Apple Partition Table, GUID Partition Table, and master boot record (MBR) Ĭreating, destroying, merging, and repairing RAID sets Verifying a disk's integrity, and repairing it if the disk is damaged (this will work for both Mac compatible format partitions, and FAT32 partitions with Microsoft Windows installed) ĭisk erasing, formatting, partitioning and cloning Mounting, unmounting, and ejecting disks (including both hard disks, removable media and disk images) The creation, conversion, compression and encryption of disk images from a wide range of formats read by Disk Utility to. It is not considered Open Source as defined by the Open Source Initiative or free software as defined by the Free Software Foundation and no major GNU/Linux distribution (Arch, Debian, Ubuntu, Fedora, openSUSE, Gentoo) has accepted it because of license restrictions that are incompatible with being free/libre and open source.ĭisk Utility is the name of a utility created by Apple for performing disk-related tasks in Mac OS X. While TrueCrypt is source-public, it is a misconception that it is open source or free software. Hidden volume (steganography) and hidden operating system.įor the portable mode you need admin rights, see Provides plausible deniability, in case an adversary forces you to reveal the password: Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.Įncryption can be hardware-accelerated on modern processors. Though it has not been audited yet, it has many features and is one of the most popular encryption solutions:Įncrypts an entire partition or storage device such as USB flash drive or hard drive.Įncrypts a partition or drive where Windows is installed (pre-boot authentication).Įncryption is automatic, real-time (on-the-fly) and transparent. Disk encryption software for Windows Vista/XP, Mac OS X, and Linux.Ĭreates a virtual encrypted disk within a file and mounts it as a real disk.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |