Jetico BestCrypt v8.20 | 14.6 MB
If your computer were ever to be stolen, are you certain that your personal information cannot be discovered? Jetico’s BestCryptTM software automatically encrypts your files so that nobody can read the data unless they have the right password or keys.
"My evaluation of this product has centered on functionality, usability, support for algorithms I like and trust, and of course, overall polish. I think BestCrypt succeeds on all those counts, and based on the consistently high quality of Jetico's software in those areas, I'm willing to believe that their cryptographic implementations are equally meticulous and well executed. In conclusion, BestCrypt is an impressive product. If stability, comprehensive and modular support for a variety of popular encryption algorithms, and overall tightness are anything to go by, it seems to be highly secure as well. I enthusiastically recommend considering BestCrypt for your filesystem encryption needs, especially if you use both Linux and Windows. It's helped restore some of my hope for a more crypto-enabled populace and has been fun to play with, too." - Mick Bauer, Linux Journal BestCrypt supports several encryption algorithms and security standards and offers multiple ways to work transparently with encrypted data: * Store encrypted data in containers and access the data through virtual drives. * Encrypt sets of files into a single compressed and self-extracting archive (Read more about BCArchive - included in BestCrypt). * See BestCrypt Volume Encryption to encrypt and transparently access whole Windows partitions/volumes - 25% discount when purchased together with BestCrypt. BestCrypt automatically encrypts data before saving or storing a file. Sensitive information is scrambled using an algorithm, making the data unreadable. BestCrypt will transparently decrypt the file once the file has been opened by providing the correct password or key. BestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. with any drive letter that is not used by another system device). Reliable Encryption BestCrypt encrypts data using a choice of several encryption algorithms (AES, Blowfish, Twofish, CAST and others). Every algorithm is implemented with the largest possible key size defined in the algorithm's specification. BestCrypt v.8 can utilize LRW Encryption Mode,which is designed specifically for applications working on disk sector level and is more secure than other popular modes like Cipher Block Chaining (CBC) mode. Convenient Storage & Access Data encrypted with BestCrypt is stored on the disk in a container file so that it is possible to backup the container, move it, or copy it to another disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt. Thanks to container-level compatibility on different platforms, BestCrypt container files may be moved between any computer or storage media, on a variety of supported operating systems. Whether you're using Linux kernel version 2.2.x or the latest version of Windows, your BestCrypt container files will continue to work as you expect. Any free drive letter in the system may be used to mount and to open an encrypted file-container for access. With BestCrypt, you can mount file-container as a subfolder on NTFS disk. When the virtual disk is opened, you can read and write data as if it were a conventional removable disk. For more information about security enhancements and added functionality in version 8 of BestCrypt, read the New features in BestCrypt version 8 article. BestCrypt is encryption software with a number of advanced and unique features. To learn more, read the General BestCrypt Features article.
System Requirements
Windows Operating Systems:
Windows 7, Windows Vista, Windows XP, Windows 2008 Server, Windows 2003 Server, Windows 2000, Windows NT, Windows 9x, Windows ME
Linux Systems:
2.2.x,
2.4.x,
2.6.x
Installation Instructions:
1.Scan with anti-virus.
2.Check any included readme.txt / .nfo files...
3.Install using .exe file
4.Use keygen from the /keygen folder to generate serial and or patch files.
Download
|