homeAppSaved.com WINDOWSWINDOWS WEBWEB MACMAC IOSIOS ANDROIDANDROID LINUXLINUX

Cryptic Disk Home Edition

create encrypted drives to secure data

thumb of Cryptic Disk Home Edition
  • Publishers:
    Exlade
  • License: Trial
  • Capacity: 13 MB
  • Saved: 4803
  • Update:
  • System: Windows 2000/XP/2003 Server/Vista/7

Cryptic Disk Home Edition - Create an encrypted drive to secure data

To protect important data on the computer, we often use programs that help encrypt files / folders. However, their common drawback is that it takes a lot of time to encrypt and decode to access the data. Now with Cryptic Disk 3.0 (CD), you have a new choice. Instead of encrypting each file / folder individually, the CD helps you create an encrypted drive to store important data.

No one can access these data without knowing the correct password, and if someone has brought your hard drive to another computer, they will not be able to view the data inside because they are encrypted with the technique. AES 256 advanced math.

Picture 1 of Cryptic Disk Home Edition

1. Create an encrypted drive to secure data

Choose from a list of any drives, but be aware that you don't select a drive with Windows installed. Ideally, you should choose an empty drive (if there is data in it, you should back up the data to another drive) and then press the Create button. The wizard appears, enter your administrator name and password (for later access to the drive). Finished, click Next . At this point, the program will automatically generate a random encryption key (this key is used to access the drive in case you forget the admin password). Click Start , a warning message appears that all information saved on the disk will be erased. Click Yes to begin the process of creating the encrypted disk. Complete, you perform the format (format) for the disk. Done, click Save the key and select the folder to save the encryption key.

2. Set up to access encrypted disk

Encrypted disk after being created will not show in Windows Explorer of Windows. So to access the disk, you do the following:
Right-click on the encrypted disk in the program's main window and choose Mount command from the context menu. Enter the Username and admin password. In the Mount to letter field , choose a drive letter. Next click on the Advanced button, you will see the options:
- Mount disk as read-only : If this item is selected, the drive will display allowing you to read data but cannot write / delete data.
- Mount disk as removable media : Display the drive as a removable storage device.
- Open Explorer window for successfully mounted disk : Automatically open Windows Explorer after the disk is loaded.
Finally, click OK and when you open Windows Explorer, you will see the encrypted drive appear as a normal drive. You can copy data as well as perform checks, defragments on disk .

3. Remove settings on the encrypted drive

After you have copied and worked on the data on the disk, you need to ' Unmount ' so that others cannot access and view the content on the disk. To do this, first select the encrypted disk in an accessible state (the drive labeled MOUNTED), then right-click and select the Unmount command.

4. Delete an encrypted disk

You can cancel the encryption on the drive and convert it into a normal drive. by the following way: Click on the encrypted disk and select Erase the encrypted disk in the context menu on the right of the interface (it is recommended to back up the data on the disk first because after deleting, all data on the disk will be lost). In the dialog box Deleting the encrypted disk appears, click OK to confirm.

5. Decentralize other people to gain access to the encrypted drive

For each encrypted drive, you can create multiple accounts (with certain restrictions) to allow others to access the drive. Do the following: Right-click on the encrypted drive, select User Management . In the dialog box asking for an administrator password to appear, enter the password and then click OK . To add a new person to the list, click Add , and enter the username and password respectively. Restrict access at the User permissions field with the following options:
- Read-only access : Can only read data, can not write, copy more data on disk.
- User management : Are allowed to access the disk normally as well as have the right to create a list of people allowed to use the disk.
- Change disk properties: Can change the disk properties.
You can also change information, delete, change a user's password through the corresponding buttons: Edit, Delete, Change password.

6. Restricting others from using the program

To prevent others from using or changing the settings of the CD, you need to set a password for the program by: Select menu Tools > Password for Launching , enter the password in the 2 Password and Confirm the password boxes, and then click OK .

Pactimza