Software Index
Windows Software Security Tools File Security  

BestCrypt Volume Encryption 3.00.18 Beta

download download home home   report broken
important software information
company name:
Jetico Inc
license: Shareware
minimum requirements:
functional limitations:
BestCrypt Volume Encryption 3.00.18 Beta description
BestCrypt Volume EncryptionTM software provides transparent encryption of all the data stored on fixed and removable disk devices. BestCrypt Volume Encryption software is a new class of volume encryption products that allows users to encrypt old MS-DOS style disk partitions as well as modern volumes residing on a number of physical disk devices - for example Spanned, Striped, Mirrored or RAID-5 volumes. Main Features: 1. Encrypts all types of volumes residing on fixed and removable disks: * Simple volume, i.e. volume consisting of one disk partition. * Mount point - volume mounted as a sub-folder on NTFS-formatted volume. * Multipartition volume, i.e. volume consisting of several disk partitions: 1. Spanned volumes; 2. Mirrored volumes; 3. Striped volumes; 4. RAID-5 volumes. 2. BestCrypt Volume Encryption allows encrypting data with many strong encryption algorithms. Every algorithm is implemented with the largest possible key size defined in the algorithm's specification: * AES (Rijndael) - 256-bit key. * RC6 - 256-bit key. * Serpent - 256-bit key. * Twofish - 256-bit key. BestCrypt Volume Encryption utilizes XTS Encryption Mode with all encryption algorithms listed above. XTS Mode is designed specifically for applications working on the disk sector level and is more secure than other popular modes used previously, such as LRW or CBC mode. 3. BestCrypt Volume Encryption can encrypt the volume from which Windows boots from, as well as the volume where Windows stores its system files (including Registry, Page file and Hibernate file). Initial encryption is transparent both for running applications and for Windows system modules. 4. BestCrypt Volume Encryption performs Computer Pre-Boot Authentication if the system or boot volume/partition is encrypted -- which means that BestCrypt Volume Encryption loads before operating system and allows the computer to boot only after entering a proper password. 5. BestCrypt Volume Encryption provides an easy way to customize Pre-Boot Authentication texts appearing when the user is required to enter password. This feature allows displaying additional hints when the user is being prompted to enter a password and even hides the fact that pre-boot authentication is running. 6. BestCrypt Volume Encryption supports hardware tokens Aladdin eToken R2 and PRO as a secure hardware storage for encryption keys. With hardware token users get two levels of protection for encrypted data, because in addition to a password it is necessary to connect a small hardware token where the encryption key is stored. 7. BestCrypt Volume Encryption provides Secure Hibernating. If a user encrypts the volume where Windows stores the Hibernate File, BestCrypt Volume Encryption encrypts all write operations when Windows goes into Hibernate state and decrypts read operations when the computer wakes up from Hibernate state. Since pre-boot authentication is necessary at wake-up time, only the user who knows the proper password (and has hardware token, if used) can run the computer from Hibernate mode. Secure Hibernating is a functionality that must be implemented in BestCrypt Volume Encryption, otherwise all data written at Hibernate time (together with encryption keys) appears on disk in opened decrypted form. 8. As well as the Hibernate File, BestCrypt Volume Encryption encrypts Windows Crash Dump Files. Windows writes files in a very special way because when a crash occurs the regular disk write operations cannot be used. Without encrypting Crash Dump Files, the security level of the software is significantly lower because the files can store a snapshot of memory together with encryption keys on disk in opened decrypted form.Release notes: New ReleaseTE More robust support of encrypted disk volumes. To reconfigure the size, location or type of software RAID, earlier versions of the software first required decryption of the encrypted volumes. Now version 3 of BestCrypt Volume Encryption automatically adapts its internal information for encrypted volumes when changing their configuration.TE Two-Factor Authentication with conventional removable disks (like USB sticks). With version 3 of BestCrypt Volume Encryption, encryption keys can be moved to removable storage.So anyone who wants to access an encrypted volume must: 1) know password for the key; 2) have the removable disk where the key is stored.TE Added layer of security by booting of encrypted volumes from trusted network. In this case, encryption keys of boot/system disk volumes are not stored on the local computer, but on a network server. Enterprises can now benefit from an additional level of security. [ BestCrypt Volume Encryption full changelog ]
Similar software
BestCrypt Volume Encryption (Popularity: ) : BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a ...
BestCrypt Container Encryption (Popularity: ) : To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux ...
GoWithMe (Popularity: ) : If there is no bundled launchpad tool in your USB disk or USB hard disk, or the bundled tool is not quite handy, then you should try GoWithMe. GoWithMe integrates all desired features of USB drive user, which including launchpad, ...
Disk Password Protection (Popularity: ) : Disk Password Protection 4.9: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc.
Disk Password Protection (Popularity: ) : Disk Password Protection 4.8: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc.
SafeHouse Hard Drive Encryption (Popularity: ) : SafeHouse provides transparent on-the-fly hard drive encryption for your PC. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. You ...
Idea crypting module for BestCrypt (Popularity: ) : Idea crypting driver for BestCrypt version 6.0b or newer. The module performs encryption using well-known IDEA algorithm. Works in Bestcrypt Environment in any Windows system.The IDEA driver is installed simply enough - you need to place the driver's distributive in ...
BestCrypt Traveller (Popularity: ) : BestCrypt TravellerTM allows quick access to encrypted container files created by BestCrypt. BestCrypt Traveller starts working without installation of the software. After running a single executable file (BCTraveller.exe), a standard BestCrypt icon appears in the Windows system tray from where ...
Touch Crypto for S60 E5/Symbian^3 (Popularity: ) : Update to 1.80! Touch Crypto is the best encryption tools designed specially for touch screen mobile. It uses 128bits AES algorithm to encrypt your private files - photos, multimedias, audios, videos, songs, voice - all confidential documents on your mobile! ...
Deltacrypt OneClick Encryption Software (Popularity: ) : DeltaCrypt OneClick File Encryption Software requires no special computer memory and is self-executable taking less that 5 minutes to install. Encryption becomes accessible to everyone as no special skills are required to use it. Cipher any file format with no ...
Unlock Access MDE Design (Popularity: ) : Unlock Access MDE Design unlocks MS Access MDE, ADE and ACCDE forms and reports for editing. If you have lost the original MDB/ADP/ACCDB file and need to make design changes to the application this is the ideal software tool. TE ...
CryptoNet (Popularity: ) : CryptoNet is an easy-to-use encryption tool designed to keep your files safe. Encrypt and decrypt regular text files, or use CryptoNet encrypted files to further protect your information. Use a different password for every file, or set one as default. ...
User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
Email*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
 
Similar scripts
VOLUME ENCLOSED BY A TRIANGULATED SURFACE (Popularity: ) : Gets the Volume enclosed by the surface defined by p,t,tnorm. The surface must be closed and manifold, there is no check for this.The algorithm compute the volume of 3 tetraedrons for each triangle. The normals orientation define the sign of ...
PHPass (Popularity: ) : This is a portable public domain password hashing framework for use in PHP applications. It is meant to work with PHP 3 and above, and it has actually been tested with at least PHP 3.0.18, 4.3.x, 4.4.x, 5.0.x, 5.1.x, and ...
MatLab's Video Lectures Series - Class-3 - Part-2 (Popularity: ) : This is the 2nd part of 3rd Lecture of the MatLab's Video Lectures Series in ARABIC language. The Video File's format is "rmvb", so, you must be have the "Real Player" program or any other program can play this type ...
Online Indicator (Popularity: ) : Online Status Indicator for joomla is a module that display your current Instant messenger (Yahoo! messenger, MSN ...) online status with a server time clock.Online Status Indicator for joomla's messenger online status come from messenger company site, many messenger site ...
DynAPI 3.0.0 Beta (Popularity: ) : It uses an OOP approach to resolve problems associated with scripting for different browser engines. Requirements:

JavaScript enabled on client side
What's New in This Release:

moveBy() - has been removed
setZIndex({above:[DynLayer]}) - sets zIndex one above the given DynLayer ...

Currency Convertor (Popularity: ) : Currency Convertor program will convert any countries currency into any other countries currency.Also the program adds a 3.00 service charge for transaction.
DotPHP (Popularity: ) : DotPHP is the next step of the Web Components project. DotPHP contains web components ver 3.00. or better. DotPHP want be lor better. DotPHP wanPHI or C . It mean developer can make web site only with components. Where are ...
Calculation Lyapunov Exponents for ODE (Popularity: ) : Lyapunov exponent calcullation for ODE-system. The alogrithm employed in this m-file for determining Lyapunov exponents was proposed in A. Wolf, J. B. Swift, H. L. Swinney, and J. A. Vastano, "Determining Lyapunov Exponents from a Time Series," Physica D, Vol. ...
Room Impulse Response Generator (Popularity: ) : This function calculates a room's impulse response for an arbitrarily positioned sound source in an arbitrarily dimensioned rectangular room, as it would be heard at an arbitrary position. The output of RIR.m is a vector and can be used as ...
eqEpic (Popularity: ) : eqEpic is a web based tool for epic quest management made specially for Everquest. Although eqEpic was created for EverQuest it is possible to tailor it for other MMORPG video games that have similar epic based quests or quest systems ...
Screenshot
BestCrypt Volume Encryption 3.00.18 Beta
Rate me
supported os's
Windows 7
    Windows 7
Windows
    Windows 2000
    Windows 2003
    Windows Vista Starter
    WinXP
stats
downloads 19
price $99.95
version 1.0
size in Kb 3,379
popularity   
1096/1272475
user rating 0/10
our rating 0 Stars
share info
Recommend BestCrypt Volume Encryption 3.00.18 Beta
Report spyware
New Software
Popular Software
Latest Reviews