Your Ad Here

Sunday, October 11, 2009

EXLADE Cryptic Disk v2.4.9.0


EXLADE Cryptic Disk v2.4.9.0 | 2.33 MB
Cryptic Disk provides a simple and affordable way to protect disks and disk partitions by encrypting them. The encrypted data cannot be accessed without entering the password, even if a hacker gets access to a PC or the hard drive is stolen. The program uses the AES 256-bit encryption algorithm, the same type of encryption that NASA, the FBI and the Department of Defense use to protect their data. Encrypting and decrypting takes one click and does not require a PhD in mathematics or computer science. Cryptic Disk can be used either at home or in the office. The program supports multiple users with different degrees of access privileges, as set by the system administrator. Each user will then have access to the encrypted data that he or she has the access rights to, but not to the data of others.

Cryptic Disk can be used either at home or in the office. The program supports multiple users with different degrees of access privileges, as set by the system administrator. Each user will then have access to the encrypted data that he or she has the access rights to, but not to the data of others.

Naturally, Cryptic Disk has been designed to work with hard drives, but the program can be used with removable storage media, such as USB Flash drives. Once the data is encrypted, the files cannot be accessed by any person who does not know the password. After decryption, all files become accessible and the hard drive works normally.

Cryptic Disk can be downloaded and tried absolutely FREE of charge. The trial version does not have any functional limitations, but only allows the word "demo" as the password.

Main features:

- Creating encrypted disks and partitions
You can select regular disks or partitions and convert then into encrypted ones.
- Erasing encrypted disks and partitions
You can always erase encrypted disks and partitions and convert them into regular ones.
- Mounting and unmounting encrypted disks
You can mount an encrypted disk/partition onto the system and work with it just as with a regular disk/partition.
- Multi-user access
Each user of an encrypted disk can have an individual password and access rights.
- Protecting the program with a password
This feature will allow you to limit access to the program by other users of the computer.


No comments:

Post a Comment

Your Ad Here

Disclaimer

This site does not infringe any Copyrights. It only lists through Freedom of Information Act what is listed on Search Engines.All files are found using legitimate search engine techniques. This site does not and will not condone hacking into sites to create the links it list. We will and do assume that all links found on the search engines we use are obtained in a legal manner and the webmasters are aware of the links listed on the search engines. If you find a URL that belongs to you, and you did not realize that it was "open to the public", please email on to notify the blogmaster of your request to remove it. This is not an invitation for webblog haters to spam with requests to remove content they feel that is objectionable and or unacceptable. Proof of URL ownership is required. None of the files shown here are hosted by this server. I do not upload any file , links are provided by users of this site and other websites. If you do not have enough rights to download them please don't download.

User Agreement

The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These Ebooks here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. IF YOU DO NOT AGREE TO THESE TERMS THEN LEAVE.