homeAppSaved.com WINDOWSWINDOWS WEBWEB MACMAC IOSIOS ANDROIDANDROID LINUXLINUX

Cryptic Disk Ultimate Edition

create encrypted drives to secure data

thumb of Cryptic Disk Ultimate Edition
  • Publishers:
    Exlade
  • License: Trial
  • Capacity: 13,7 MB
  • Saved: 863
  • Update:
  • System: Windows XP/Vista/7/8

Cryptic Disk is an effective solution designed to protect your files from unauthorized access. This program will create virtual drives as well as encrypt hard drives, USB drives and memory cards. This allows you to maintain your privacy and protect your secrets on both your home computer or on a workstation. The data encryption process will use the best algorithms (you can choose any of the following modern encryption algorithms: AES / Rijindael, Serpent, Twofish, Blowfish, CAST6) and take place in time. indeed, therefore does not affect computer performance. In addition, Cryptic Disk provides users with powerful functions to protect their information.

Picture 1 of Cryptic Disk Ultimate Edition

The encrypted virtual and physical drives will be mounted as separate drives that attach to a drive letter of your choice, or a normal folder on an NTFS disk. They do not have any special marking tools. Additional protection can be provided using steganography, by creating an encrypted drive hidden in other drives.

Cryptic Disk allows you to increase the encryption key size from 256 to 2944 bits using the orderly cipher algorithms. This will greatly increase the protection for encrypted data against the risk of being cracked.

This program supports XTS mode, specially developed for encrypting drive data. The program will provide strong protection against password attacks with brute force compliant with PKCS # 5 v2 and a virtual keyboard to protect user passwords from keylogger software.

The only way to access encrypted data is to use a key file or enter a password that only you know.

Cryptic Disk offers many options that are configured to mount or dismantle an encrypted drive: play WAV files, or start programs or scripts in CMD Shell, Windows Script and PowerShell programming language.

In addition, Cryptic Disk also has a portable mode that does not require installation on the computer before use.

Outstanding advantages:

  • Create encrypted virtual drives from files and mount them as separate disks.
  • Encrypt entire drive partitions (built-in and removable) as well as other types of drives (memory cards, pen drives, USB drives and more) without losing information.
  • Direct encryption will take place in real time and will not affect computer performance.
  • Encrypted drives will not contain any signatures that can be used to show that they are encrypted drives.
  • Plausible Deniability mode allows creation of hidden encrypted drives.
  • Strong protection from brute force attacks according to PKCS # 5 V2.
  • Use drive encryption software on the computer without installation.
  • Configure automatic tasks when an encrypted drive is mounted or removed.
  • Support many different data encryption algorithms such as AES / Rijndael, Serpent, Twofish, Blowfish, CAST6.
  • Use XTS data encryption mode, specially developed for disk encryption (according to IEEE 1619 standard)
  • Support sequential data encryption mode to improve the strength of the encryption provided by the drive encryption software, increasing the encryption key size from 256 to 2944 bits in XTS mode.
  • Support using many different algorithms to get page title keys: HMAC-SHA2-512, HMAC-SHA3-512, HMAC-RIPEMD-256, HMAC-Whirlpool.
  • Support hot key setup to quickly mount and remove encrypted drives.
  • Support automatically restores access to settings to a shared resource on an encrypted drive after mounting it.
  • Optimized for multiple CPUs.
  • Access program features from the command line, which allows automation of the process of working with it.
  • Multilingual interface: English, German, French, Spanish, Italian, Russian, Arabic and Hungarian.

Pactimza

Step 1. Create an encrypted drive to secure data

Choose from a list of any drives, but be aware that you don't select a drive with Windows installed. Ideally, you should choose an empty drive (if there is data in it, you should back up the data to another drive) and then press the Create button. The wizard appears, enter your administrator name and password (for later access to the drive). Finished, click Next . At this point, the program will automatically generate a random encryption key (this key is used to access the drive in case you forget the admin password). Click Start , a warning message appears that all information saved on the disk will be erased. Click Yes to begin the process of creating the encrypted disk. Once completed, you perform the format (format) for the disk. Done, click Save the key and select the folder to save the encryption key.

Step 2. Set up to access the encrypted disk

Encrypted disk after being created will not show in Windows Explorer of Windows. So to access the disk, you do the following:

Right-click on the encrypted disk in the program's main window and choose Mount command from the context menu. Enter the Username and admin password. In the Mount to letter field , choose a drive letter. Next click on the Advanced button, you will see the options:

  • Mount disk as read-only: If you select this item, the drive will display allowing you to read data but not be able to write / delete data.
  • Mount disk as removable media: Display the drive as a removable storage device.
  • Open Explorer window for successfully mounted disk: Automatically open Windows Explorer after the disk is loaded.

Finally, click OK and when you open Windows Explorer, you will see the encrypted drive appear as a normal drive. You can copy data as well as perform checks, defragments on disk .

Step 3. Remove settings on the encrypted drive

After you have copied and worked on the data on the disk, you need to ' Unmount ' so that others cannot access and view the content on the disk. To do this, first select the encrypted disk in an accessible state (the drive labeled MOUNTED), then right-click and select the Unmount command.

Step 4. Delete an encrypted disk

You can cancel the encryption on the drive and convert it into a normal drive. by the following way: Click on the encrypted disk and select Erase the encrypted disk in the context menu on the right of the interface (it is recommended to back up the data on the disk first because after deleting, all data on the disk will be lost). In the dialog box Deleting the encrypted disk appears, click OK to confirm.

Step 5. Authorize others to gain access to the encrypted drive

For each encrypted drive, you can create multiple accounts (with certain restrictions) to allow others to access the drive. Do the following: Right-click on the encrypted drive, select User Management . In the dialog box asking for an administrator password to appear, enter the password and then click OK . To add a new person to the list, click Add , and enter the username and password respectively. Restrict access at the User permissions field with the following options:

  • Read-only access: Can only read data, can not write, write more data on the disk.
  • User management: Are allowed to access the disk normally and have the right to create a list of people allowed to use the disk.
  • Change disk properties: Can change disk properties.

You can also change information, delete, change a user's password through the corresponding buttons: Edit, Delete, Change password.

Step 6. Restrict others from using the program

To prevent others from using or changing the settings of the CD, you need to set a password for the program by: Selectmenu Tools > Password for Launching , enter the password in the 2 Password and Confirm the password boxes, and click OK.

Pactimza