Once written to a BestCrypt file (container), data is never stored in an 'open' condition. Yet BestCrypt's smooth operation and complete transparency allows instant data access to any authorized user.
BestCrypt's advanced data encryption and authorization technology provides a new level of security with standard, proven and published cryptographic algorithms, safe password input and transparent encryption.
Proven Encryption Methods
It is very important for a trusted security system to use open published encryption methods to allow professionals to verify its reliability. The BestCrypt system allows users to choose any of algorithms listed below to protect sensitive data as well as to use all algorithms simultaneously.
(*) Note: US Federal Standard DES is implemented for compatibility reasons only. DES usage is strongly discouraged due to insufficient key length.
Linux and Windows compatibility
BestCrypt for Linux uses the same container format as BestCrypt v6 and newer for Windows. Containers, created and used by BestCrypt for Linux are accessible under Windows OSes. See also: container format considerations.
In addition to comprehensive encrypted storage BestCrypt software offers wide range of security enhancements and handy features:
o Swap space encryption
o Urgent container unmounting
o Hidden part in container
o Up to 7 passwords per container
Using in Network environment
BestCrypt software can use any network drive for creating and accessing file-containers. This network drive may be shared by computer with any operating system, for example UNIX-like operating systems (OSF/1, LINUX, BSD, SunOS, AIX and others), Novell, Windows 2000/NT, Windows Me/98/95, Windows 3.xx and others.
BestCrypt virtual drives look like usual local drives and any software or operating system utility will work with these virtual drives in the usual way. As the example of this feature, BestCrypt virtual drives may be shared in a network in the same way as the other local drives on computer.
Easy to Install and Use
BestCrypt is easy to use. You need only enter the appropriate password. After password verification, access and use of the encrypted data become transparent for any application. No further action is needed to keep new or altered data in the secure encrypted form.
>> 下载 <<