To avoid an unauthorized restoration of deleted files from your disks, you can run BCWipe utility to wipe deleted files from the disk. Note that there is a separate version of BestCrypt for the Linux operating system. For example, a user may copy or move a file-container from a computer with a Windows operating system to a UNIX computer, yet continue access the data (now stored inside the container on the UNIX computer) from the Windows computer. User may copy (backup) BestCrypt containers from one computer to another in network and continue to access encrypted data without any limitation on the operating system type.This network disk may be shared by a server with any operating system. Any network accessible disk may be used by BestCrypt software for creating and accessing file-containers.Any type of physical media may be used to store and access the data on the BestCrypt containers - hard drives, removable media, magneto-optical devices, etc. There are no limitations on the number of local physical drives on which a user stores BestCrypt containers. ![]() Here are some key features of "BestCrypt": BestCrypt is professionally developed product which keeps your files out of other people’s eyes. The wiping utility is included allowing you to wipe files "on-the-fly" while they are deleted by applications or by the system. ![]() Time-out and Hot Key options.Īny number of hidden containers inside a single outer container. Strong encryption algorithms Rijndael (AES), Blowfish,Twofish, GOST, DES, etc. ![]() All data written there are encrypted "on-the-fly". You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form.īestCrypt creates a virtual drive in your system which you work with like with any other drive. Protects your secret data from other people's eyesīestCrypt is a powerful and easy-to-use data encryption software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |