Software Index
Windows Software Security Tools File Security  

Rohos Disk Encryption

download download home home   report broken
important software information
company name:
Tesline-Service.S.R.L.
license: Shareware
minimum requirements:
functional limitations:
Rohos Disk Encryption description
Rohos Disk - program creates hidden and protected partitions on the computer or USB flash drive. Those who have megabytes of sensitive files and seriously concerned with data security, can not imagine their computer or USB drive without the hidden partition that is created using this wonderful tool. Strong & On-the-fly disk encryption Rohos disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly. No risk of data loss Partition password reset option allows creating a backup file to access your secured disk if you forgot your password or lost USB key. Easy of use Rohos cares about usability: Your first Encrypted Drive can be turned on with a single click or automatically on system startup. Disk-On notification help first-time users to know when secured partition is ready to work. Portable data security solution You can have a protected partition on your USB flash drive and access it on any computer. Rohos has a portable portion that can be installed into any USB flash drive along with a secured partition. Unlimited encryption capacity You can have unlimited number of additional encrypted virtual drives, over your network storage, USB flash drive or DVD-ROM. Virtual drives size is unlimited. Each secured drive can have a shortcut to open it. MS Office applications integration You can Open or Save your protected documents right from MS Word (Excel) by clicking on the personal disk icon. You donOCOt need to navigate to sub folders or additional disk letter. Have a USB Key for access control You can use USB flash drive or security tokens like Aladdin eToken to access all of your secured disk automatically without the need to remember and enter password manually. Secure shortcuts on the desktop DonOCOt worry about the shortcuts to the documents from the encrypted drive. Rohos automatically hide them from the desktop when secured drive gets off-line. DoesnOCOt require Admin privileges You can access your virtual drive on the USB flash drive or DVD-ROM with Rohos Disk Browser on any guest computer without having administrators rights. Integrated File-shredder Any file or folder can be easily moved into Encrypted Rohos Disk with shredding afterwards. Right from File Explorer. Expandable virtual drives Rohos Disk allows to enlarge virtual encrypted partition any time you need (applied only for NTFS format partitions). Steganography Hide your sensitive files into a single AVI movie or media file such as MP3, OGG, WMA etc.
Similar software
Disk Encryption Software Cryptic Disk (Popularity: ) : Virtual encrypted disks are the best way to protect personal or confidential information on your home computer. Data encryption takes place in real time when information is written or read, and in no way affects your computer's performance. Containers are ...
GiliSoft Full Disk Encryption (Popularity: ) : The value of Full Disk Encryption (FDE) technology grows with every report of a lost or stolen laptop or sensitive data record. The cost of exposing sensitive business or personal data is devastating. With so many incidents of data loss ...
imlSoft Whole Disk Encryption (Popularity: ) : imlSoft Whole Disk Encryptio locks down the entire contents of a laptop, desktop, external drive, or USB flash drive, including boot sectors, system, and swap files. The data encryption software continuously safeguards data from unauthorized access, providing strong security for ...
Dekart Private Disk Multifactor (Popularity: ) : Disk encryption software that secures confidential data on laptops, USB disks and other endpoint devices. Combines the industry standard NIST-certified AES 256-bit encryption, innovative Disk Firewall mechanism, 64-bit platform compatibility, USB disk portability and smart card authentication into a low-cost ...
R-Crypto Disk Security (Popularity: ) : R-Crypto is a disk encryption software to protect confidential information and personal data on a desktop, notebook, or a removable data storage device against unauthorized access. R-Crypto creates virtual disks (virtual data storage devices) encrypted on-the-fly. Such virtual disk is ...
Dekart Private Disk (Popularity: ) : Powerful, reliable and flexible disk encryption program. Hide your programs and data, and exclusively restrict access to them. Private Disk shields files from viruses and malware even if your antivirus or antispyware program fails to protect the system. Your data ...
Rohos Disk (Popularity: ) : Rohos-Disk program creates hidden and protected partitions on the computer or USB flash drive.
Those who has megabytes of sensitive files and seriously concerned with data security, cannot imagine their computer or USB drive without the hidden partition that is created ...

Cryptainer LE Free Encryption Software (Popularity: ) : Cryptainer LE totally free 448 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data in them. Cryptainer LE allows you to encrypt any file or folder on any ...
R-Crypto Disk Security (Popularity: ) : R-Crypto is an easy-to-use disk encryption software to protect confidential information and personal data on a desktop, notebook, or a removable data storage device against unauthorized access.
R-Crypto creates virtual disks (virtual data storage devices) encrypted on-the-fly. Such virtual disk ...

BestCrypt Volume Encryption (Popularity: ) : BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a ...
Crypto Password Protect Folder (Popularity: ) : Want to know what the easiest and the safest way to protect your data is? It's encryption and password protection. With Crypto Password Protect Folder, you select a folder or folders to be protected, enter a password, and press one ...
V2 Softlogic Recover IE Password (Popularity: ) : V2 Softlogic Recover IE Password provides solution to view all types of IE passwords including saved passwords, Internet Explorer AutoComplete fields, AutoForm, cached credentials and Identities. The application povides a simple solution for extracting the multiple passwords saved in Internet ...
User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
Email*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
 
Similar scripts
DCPP (Popularity: ) : Offers AES 256 bit, full disk encryption and pre-boot authentication. Able to protect the entire computer including the operating system, in real time. DCPP also works with the Aladdin USB-Token at a pre-boot level.
Disk (Popularity: ) : This script provides a simple simulation of secondary memory and is primarily designed to provide a driver interface to a virtual hard drive. The interface is simple and allows the simulation of IO errors. Also provided are methods that allow ...
Disk Dumper (Popularity: ) : This script will display a hex dump of the disk specified on the command line. As the last two arguments, the program takes the first sector and last sector that should be displayed by this utility. The size of the ...
Rijndael Encryption Algorithm (Popularity: ) : The Rijndael Encryption algorithm has been recently recognized as an AES (Advanced Encryption Standard). It was recently (April 2001) released in Visual Basic. The source code here is for Microsoft Visual C 6.0 for developing and testing.
Simple XOR keyword Encryption (Popularity: ) : This script shows a very simple keyword encryption algorithm. It produces an encrypted string the same size as the orginal. Not very strong encryption but good enough for lightweight stuff. Works on bytes so could be used for binary streams ...
Python XTEA Encryption (Popularity: ) : The module implements the basic XTEA block encryption algorithm (`xtea_encrypt`/`xtea_decrypt`) and also provides a higher level `crypt` function which symmetrically encrypts/decrypts a variable length string using XTEA in OFB mode as a key generator. The `crypt` function does not use ...
xICE Encryption Algorithm SDK (Popularity: ) : The xICE Encryption Algorithm Software Development Kit allows developers of all skill levels to implement xICE encryption into their applications, and web applications.Code in C , ASP, VB6, JScript, and Ruby. C#, and Perl ports are planned.
Simple Encryption (XOR) (Popularity: ) : This is a very simple encryption code using XOR.There are included three methods of encryption. The first is a user password which the user enters and the same password must be entered in to decrypt. You have the option to ...
Cipher Block Encryption (Popularity: ) : This cipher encryption starts by buffering the message to be encrypted, then separating the buffered string into equal numbered blocks, a random number is then generated and used along with the key to encrypt each block simultaneously, thus speeding up ...
TrueCrypt (Popularity: ) : TrueCrypt is on-the-fly encryption software which can create a virtual encrypted disk within a file and mount it as a real disk. It can also encrypt a hard disk partition or storage device, such as USB flash drive. Moreover, TrueCrypt ...
Screenshot
Rohos Disk Encryption
Rate me
supported os's
Windows 7
    Windows 7
Windows
    Windows 2000
    Windows 2003
    Windows Vista Starter
    WinXP
stats
downloads 19
price $35.00
version 1.8
size in Kb 2,990
popularity   
739/1272475
user rating 0/10
our rating 0 Stars
share info
Recommend Rohos Disk Encryption
Report spyware
New Software
Popular Software
Latest Reviews