Latest News

Home » 網路自動賺錢軟體推薦 » 固定和抽取式磁碟加密軟體 Jetico BestCrypt 8.24.3

固定和抽取式磁碟加密軟體 Jetico BestCrypt 8.24.3

固定和抽取式磁碟加密軟體 Jetico BestCrypt 8.24.3

BestCrypt軟體中開啟一個新的類卷的加密產品。
隨著軟體的使用者可以加密歲的MS-DOS風格的磁碟分區以及現代化的卷駐留在物理磁碟裝置,例如跨區卷,帶區卷,對映卷或RAID-5卷。
BestCrypt卷加密可以加密卷,在Windows啟動,以及從Windows存儲的卷的系統檔案(內含註冊表,頁面檔案和休眠檔案)。
起始加密是透明運行應用程式和Windows系統模組。
BestCrypt卷加密進行電腦開機前驗證,如果系統或啟動卷/分區加密。
這意味著BestCrypt卷加密之前加載操作系統,並容許電腦開機後,才輸入正確的密碼。
BestCrypt的卷加密提供了一種簡單的方法,自訂開機前驗證文字出現時,使用者需要輸入密碼。
該功能容許顯示額外的提示時,使用者被提示輸入密碼,甚至可以隱藏正在運行的事實,預啟動身份驗證。

固定和抽取式磁碟加密軟體 Jetico BestCrypt 8.24.3

固定和抽取式磁碟加密軟體 Jetico BestCrypt 8.24.3主要特點
加密所有類型的卷駐留在固定和抽取式磁碟:
簡單的量,即量組成的一個磁碟分區。
掛載點 – 作為一個子資料夾的NTFS格式化的捲上安裝卷。
,多態量,即量由多個磁碟分區:
跨區卷;
對映卷;
帶區卷;
RAID-5卷。

BestCrypt卷加密容許擁有許多強大的加密算法對資料進行加密。每個算法來實現最大可能的密鑰算法的規範中定義的大小:

AES(Rijndael算法) – 256位密鑰。
RC6 – 256位密鑰。
蛇 – 256位密鑰。
Twofish算法 – 256位密鑰。

BestCrypt卷加密與上面列出的所有加密算法採用XTS加密模式。 XTS模式是專為磁碟扇區層級的安全性比其他流行的模式,像LRW或CBC模式上工作的應用程式。
BestCrypt卷加密支援硬體令牌阿拉丁eToken R2和PRO的安全的硬體存儲加密密鑰。隨著硬體令牌使用者獲得兩個層級的加密的資料保護,因為它除了密碼是必要的連線小的硬體令牌,加密密鑰存儲。
BestCrypt卷加密提供了安全冬眠。如果使用者加密卷的Windows存儲休眠檔案,加密所有的寫操作時,Windows會進入休眠狀態BestCrypt卷加密和解密的讀操作,當電腦從休眠狀態中喚醒。由於預啟動身份驗證是必要的,只有使用者誰知道正確的密碼(並有硬體令牌,如果使用的話),可以運行電腦從休眠模式喚醒時間。安全冬眠是一個必須實現此類軟體的BestCrypt卷加密,否則在開啟解密的形式出現在磁碟上寫入的所有資料在休眠時間(加密密鑰)的功能。

以及休眠檔案,BestCrypt卷加密Windows崩潰轉儲檔案進行加密。 Windows寫入檔案中一個非常特殊的模式,因為崩潰發生時,一般的磁碟寫操作,不能使用。沒有崩潰轉儲檔案進行加密的軟體的安全層級均顯著降低,因為這些檔案可以存儲記憶體的快照磁碟上開啟解密與加密密鑰。

BestCrypt卷加密支援的救援功能,容許使用者解密卷,如果出現了嚴重的磁碟崩潰。

BestCrypt卷的BartPE可引導的CD / DVD的加密外掛程式是可用的。使用者可以加密卷的使用可引導的CD / DVD啟動電腦和運行BestCrypt卷加密指令,直接從CD / DVD。該功能可以為不同的恢復而言,是非常有用的。

除了BestCrypt卷加密功能,必須在這樣的軟體,方便使用軟體的關心:
如果是共享的網路訪問一些加密的捲上的資料夾,將BestCrypt卷加密自動恢復股份當使用者安裝量。軟體訊息共享資料夾以加密的形式存儲。
BestCrypt卷加密容許可選的安裝系統卷自動在電腦前開始加載操作系統(「安裝在系統啟動時間」選項)。
該軟體容許每個使用者的設定,不是系統卷安裝在使用者登入時(「安裝登入時」選項)。
該軟體有一個選項,隱藏,沒有安裝的卷的磁碟機號。此選項容許避免意外格式化未安裝加密卷。
BestCrypt卷的加密可以顯示物理扇區的內容,相對的物理磁碟或邏輯卷。各部門的資料可以儲存到檔案或從檔案中恢復。

BestCrypt software opens a new class of Volume Encryption products. With the software users can encrypt old MS-DOS style disk partitions as well as modern volumes residing on a number of physical disk devices, for example Spanned, Striped, Mirrored or RAID-5 volumes. BestCrypt Volume Encryption can encrypt volumes where Windows boots from, as well as the volume where Windows stores its system files (including Registry, Page file and Hibernate file). Initial encryption is transparent both for running applications and for Windows system modules. BestCrypt Volume Encryption performs Computer Pre-Boot Authentication if system or boot volume/partition is encrypted. It means that BestCrypt Volume Encryption loads before operating system and allows computer to boot only after entering a proper password. BestCrypt Volume Encryption provides an easy way to customize Pre-Boot Authentication texts appeared when the user is required to enter password. The feature allows displaying additional hints when the user is being prompted to enter a password and even hide the fact that pre-boot authentication is running.

Main Features
Encrypts all types of volumes residing on fixed and removable disks:
Simple volume, i.e. volume consisting of one disk partition.
Mount point – volume mounted as a sub-folder on NTFS-formatted volume.
Multipartition volume, i.e. volume consisting of several disk partitions:
Spanned volumes;
Mirrored volumes;
Striped volumes;
RAID-5 volumes.

BestCrypt Volume Encryption allows encrypting data with many strong encryption algorithms. Every algorithm is implemented with the largest possible key size defined in the algorithm’s specification:

AES (Rijndael) – 256-bit key.
RC6 – 256-bit key.
Serpent – 256-bit key.
Twofish – 256-bit key.

BestCrypt Volume Encryption utilizes XTS Encryption Mode with all encryption algorithms listed above. XTS Mode is specially designed for applications working on disk sector level and more secure than other popular modes used earlier, like LRW or CBC mode.
BestCrypt Volume Encryption supports hardware tokens Aladdin eToken R2 and PRO as a secure hardware storage for encryption keys. With hardware token users get two levels of protection for encrypted data, because in addition to password it is necessary to connect small hardware token where encryption key is stored.
BestCrypt Volume Encryption provides Secure Hibernating. If user encrypts volume where Windows stores Hibernate File, BestCrypt Volume Encryption encrypts all write operations when Windows goes into Hibernate state and decrypts read operations when the computer wakes up from Hibernate state. Since pre-boot authentication is necessary at wake-up time, only the user who knows the proper password (and has hardware token, if used) can run computer from Hibernate mode. Secure Hibernating is a functionality that must be implemented in such software as BestCrypt Volume Encryption, otherwise all data written at Hibernate time (together with encryption keys) appears on disk in opened decrypted form.

As well as Hibernate File, BestCrypt Volume Encryption encrypts Windows Crash Dump Files. Windows writes files in a very special way, because when a crash occurs, regular disk write operations cannot be used. Without encrypting Crash Dump Files the security level of the software were significantly lower, because the files can store a snapshot of memory together with encryption keys on disk in opened decrypted form.

BestCrypt Volume Encryption supports a number of rescue functions allowing users to decrypt volumes if a serious disk crash occurs.

BestCrypt Volume Encryption Plugin for BartPE bootable CD/DVD is available. The user can boot computer with encrypted volume using the bootable CD/DVD and run BestCrypt Volume Encryption commands directly from the CD/DVD. The functionality can be extremely useful for various recovering purposes.

Besides of the functionality that must be in such kind of software, BestCrypt Volume Encryption cares about convenience in using the software:
If some folders on encrypted volume are shared for network access, BestCrypt Volume Encryption will automatically restore the shares when the user mounts the volume. The software stores information about shared folders in encrypted form.
BestCrypt Volume Encryption allows optional mounting not system volumes automatically before computer starts loading operating system (“Mount at Boot Time” option).
The software allows per-user setting for mounting not system volumes when the user logs on (“Mount at Logon” option).
The software has an option to hide drive letters for volumes that are not mounted. The option allows avoiding accidental formatting not mounted encrypted volumes.
BestCrypt Volume Encryption can display contents of physical sectors, relatively to physical disk or logical volume. The sectors’ data can be saved to file or restored from file.

固定和抽取式磁碟加密軟體 Jetico BestCrypt 8.24.3 | Home Page: www.jetico.com

固定和抽取式磁碟加密軟體 Jetico BestCrypt 8.24.3: 17.74 MB

About