BestCrypt Volume Encryption 3.50.05 | 5Mb

| comments




























Automatic "transparent" encryption of all data in real time, stored on hard and removable devices automatically, using certified encryption. If encryption system or boot partition, BestCrypt Volume will not boot the system without entering the required password. The program uses the encryption mode to drive XTS and modern and confirmed kryptostoykostyu advanced or high-speed encryption algorithms with maximum key.

Besides passwords, as the most vulnerable places program offers use hardware USB-keys as highly secret storage encryption keys. With hardware USB-key user receives two levels of protection of encrypted data, because along with entering the password to connect to a computer the size of a small hardware usb-device, where the encryption key is stored. The program has a multilingual interface, including Russian.

Features:
• Encrypt all types of volumes located on fixed and removable disks
• Allows you to encrypt data with many encryption algorithms, known as stable algorithms
• Using XTS encryption mode with all the above-mentioned encryption algorithms
• Performing authentication computer before uploading if system or boot volume or partition encrypted
• Provide a simple way to use any own request password appears before loading Windows
• Support hardware USB-keys Aladdin eToken R2 and PRO, a highly secret storage of encryption keys
• Support for encryption of hibernation Mode (Hibernating)
• Encrypt files created by breakage of the operating system Windows (Crash Dump Files)
• Support for multiple functions save, allowing the user to decipher because in case of serious damage drive

New features in version 3:
• More protection for encrypted volumes during reconfiguration drives.
• In earlier versions the user to resize encrypted volumes, as well as the location and type of the array software (Software RAID), to decipher them. Version 3 software automatically adapts its internal information encrypted volumes when you change their configuration.
• Two-tier authentication using conventional removable disk (for example, USB-flash drives). 3 versions of the program the user can move the encryption keys on removable media. In this case, a user who needs access to encrypted in order to: 1) know the password of a key, 2) have a removable media containing the key.
• Boot the computer with an encrypted boot / system disk volume on the network. In this case, the encryption key is not stored on the local computer and the remote server. This provides an additional level of security for corporate use. Since the keys are stored on a corporate server, access to encrypted computer is possible only if it is connected to the corporate network.
• Support for new instructions enhanced system commands (AES-NI) for the latest processors Intel. As a result, the speed of AES encryption using AES-NI instructions increases by 5 times. General speed access to encrypted partitions - 30.

Encryption algorithms supported by the program:
• AES 256-bit
• Blowfish 448-bit
• CAST 128-bit
• GOST 256-bit
• RC6 256-bit
• Serpent 256-bit
• Twofish 256-bit

Information about the program:
Year: 2012
Version: 3.50.05
Platform: Windows ® 2000 | XP | Vista | 7 (x32 | x64)
Language: ML | Rus
Medications: keyfilemaker & patch-CRD
Page program: jetico.com
Size 5.1 Mb

Password : No

Download Here :

Via Uploaded.to
Via Tusfiles

Share this article :
 

Copyright © 2013. AFSWA - All Rights Reserved