The BestCrypt Data Encryption system gives probably the most complete and easy-to-use safe information storage and entry management amenities accessible.
BestCrypt’s information encryption technique makes use of encryption algorithms recognized world-wide. And gives unparalleled safety in opposition to unauthorized information entry. BestCrypt is straightforward to put in, simple to make use of and completely clear for utility applications.
Your information is BestCrypt’s solely concern, and it enhances your fundamental proper to maintain paperwork, business proprietary data, and personal data, in a confidential vogue.
Once written to a BestCrypt file (container), information isn’t saved in an ‘open’ situation. Yet BestCrypt’s clean operation and full transparency permit any approved consumer to get immediate entry to the info.
The superior information encryption and authorization know-how gives a brand new stage of safety. With customary, confirmed and printed cryptographic algorithms, protected password enter, and clear encryption. This program creates and helps encrypted digital disks, that are seen as common disks with corresponding drive letters. For instance, D:, Ok:, Z:, i.e. with any drive letter that’s not utilized by one other system gadget.
- AES (Rijndael) – 256-bit key.
- Blowfish – 448-bit key.
- CAST – 128-bit key.
- GOST 28147-89 – 256-bit key.
- RC6 – 256-bit key.
- Serpent – 256-bit key.
- Triple-Des – 168-bit key.
- Twofish – 256-bit key.
The information saved on a BestCrypt disk is saved within the container file. A container is a file, so it’s potential to backup a container, transfer or copy it to different disk (CD-ROM or community, as an example) and proceed to entry your encrypted information utilizing BestCrypt.
Any free drive letter within the system could also be used to mount and to open an encrypted file-container for entry. As effectively, with BestCrypt you possibly can mount file-container as a subfolder on NTFS disk. When the digital disk is opened, you possibly can learn and write information as if it had been a standard detachable disk.
BestCrypt gives customers with the next safety stage in addition to with a set of recent capabilities. Besides, there are a number of methods of encrypting information:
- Storing encrypted information in containers and accessing the info via digital drives (as earlier variations of the software program do);
- Encrypting set of records data right into a single compressed and, if wanted, self-extracting archive
- Encrypting and accessing transparently entire Windows partitions/volumes
Supported Operating Systems: Windows XP, Vista, Windows 7, 8, 8.1, 10 (32-bit, 64-bit).
Changes in BestCrypt Container Encryption 9.03.3 | 28-April-2017:
- Automated process to format digital disks throughout container creation.
- Updated the process of making containers by way of command line for higher compatibility with batch processing.
- Improved consumer interface for managing anti-keylogger.
- Fixed minor bug.
Homepage – http://www.jetico.com
Size: 24.2 MB