Cryptic Disk Pro v3.0.29.569

Software, Security. April 23, 2011 by SoftSharing.

Cryptic Disk Pro v3.0.29.569 | 13 MB

As professional disk encryption software safeguarding data on any type of drive, Cryptic Disk will be a reliable defense for your files regardless of where they are located. The program can create virtual encrypted disks as well as encrypt physical hard disks (in their entirety or just certain partitions), USB drives and memory cards. Data are encrypted using the most reliable modern algorithms (AES/Rijndael, Serpent, Twofish, Blowfish, CAST6) with support for XTS mode, which was specially developed for encrypting data on disk drives. Transparent encryption allows working with an encrypted disk just like with any other one, without the computer's performance being impacted in the slightest.

Cascade encryption (the use of multiple algorithms in sequence) allows disk encryption software to improve cryptographic strength, in the case of Cryptic Disk by increasing the encryption key size from 256 to 2944 bits. For additional security, Cryptic Disk has built-in protection from brute force password attacks and keyloggers.

Thus Cryptic Disk is the most reliable disk encryption software today for protecting personal information and secret corporate data from hacking attempts. Not only does the program meet all generally accepted security standards, but it boasts a number of innovative technologies and solutions unique in its class.

• Creation of virtual encrypted disks from container files and mounting them as separate disks
• Encryption of whole disk partitions (internal and removable) as well as other drives (memory cards, pen drives, USB drives, and more) without losing information
• Transparent (on-the-fly) data encryption which takes place in real time and does not affect computer performance
• Deniable Encryption so that encrypted volumes do not contain any signatures which could be used to prove that they are encrypted disks or containers
• Plausible Deniability, which allows creating hidden encrypted disks multiply nested inside of each other (steganography)
• Support for using key files together with a password or instead of a password, offering users flexibility in how they deploy the disk encryption software
• Powerful protection from brute force password attacks (both dictionary attacks and true brute force attacks) in accordance with PKCS #5 v2
• Reliable protection from keyloggers (built-in virtual keyboard for entering passwords)
• Ability to use the disk encryption software on a computer without installing it beforehand (portable mode)
• Configurable automatic actions when an encrypted disk is mounted or dismounted: play a WAV file, or launch a program or script in the following languages: CMD Shell, Windows Scripts and PowerShell
• Support for different cryptographic algorithms to encrypt data: AES/Rijndael, Serpent, Twofish, Blowfish, CAST6
• Use of XTS data encryption mode, developed specially for disk encryption (IEEE 1619 standard)
• Support for cascade encryption (use of multiple cryptographic algorithms to encrypt data in sequence) to improve the cryptographic strength provided by the disk encryption software, increasing encryption key size from 256 to 2944 bits in XTS mode
• Support for using different algorithms for header key derivation: HMAC-SHA-512, HMAC-RIPEMD-256, HMAC-Whirlpool
• Ability to mount an encrypted container/disk using any free drive letter or an empty folder on an NTFS disk
• Support for setting hotkeys to quickly mount and dismount encrypted volumes
• Support for automatic restoration of access settings to shared resources on an encrypted disk after mounting it
• Optimization for multiple CPUs
• Ability to access the program's features from the command line, which allows automating the process of working with the program
• Multilingual interface

Home Page :

Download Links:



Download File

Here you can download files online. Unlimited access to all sources file with one click direct download link!
  • Featured link
  • [23-04-2011]