xfocus logo xfocus title
首页 焦点原创 安全文摘 安全工具 安全漏洞 焦点项目 焦点论坛 关于我们
添加工具Xcon English Version


工具大小:194659 Bytes
文件MD5 :f1175d2e408bf237681ad73da9a16ba0

      Strong Security

      Once written to a BestCrypt file (container), data is never stored in an 'open' condition. Yet BestCrypt's smooth operation and complete transparency allows instant data access to any authorized user.

      BestCrypt's advanced data encryption and authorization technology provides a new level of security with standard, proven and published cryptographic algorithms, safe password input and transparent encryption.
      Proven Encryption Methods

      It is very important for a trusted security system to use open published encryption methods to allow professionals to verify its reliability. The BestCrypt system allows users to choose any of algorithms listed below to protect sensitive data as well as to use all algorithms simultaneously.

      (*) Note: US Federal Standard DES is implemented for compatibility reasons only. DES usage is strongly discouraged due to insufficient key length.
      Linux and Windows compatibility

      BestCrypt for Linux uses the same container format as BestCrypt v6 and newer for Windows. Containers, created and used by BestCrypt for Linux are accessible under Windows OSes. See also: container format considerations.
      Versatile functions

      In addition to comprehensive encrypted storage BestCrypt software offers wide range of security enhancements and handy features:
          o Swap space encryption
          o Urgent container unmounting
          o Hidden part in container
          o Up to 7 passwords per container

      Using in Network environment

      BestCrypt software can use any network drive for creating and accessing file-containers. This network drive may be shared by computer with any operating system, for example UNIX-like operating systems (OSF/1, LINUX, BSD, SunOS, AIX and others), Novell, Windows 2000/NT, Windows Me/98/95, Windows 3.xx and others.

      BestCrypt virtual drives look like usual local drives and any software or operating system utility will work with these virtual drives in the usual way. As the example of this feature, BestCrypt virtual drives may be shared in a network in the same way as the other local drives on computer.
      Easy to Install and Use

      BestCrypt is easy to use. You need only enter the appropriate password. After password verification, access and use of the encrypted data become transparent for any application. No further action is needed to keep new or altered data in the secure encrypted form.

>> 下载 <<