Popular x64 Tags
- encryption software x64 download
- blowfish x64 download
- twofish x64 download
- privacy x64 download
- encrypt x64 download
- lock x64 download
- folder x64 download
- decryption x64 download
- decrypt x64 download
- software x64 download
- data security x64 download
- file encryption x64 download
- security x64 download
- password x64 download
- protection x64 download
- aes x64 download
- rijndael x64 download
- encryption x64 download
- protect x64 download
- encrypt file x64 download
- pdf x64 download
- data encryption x64 download
- hide x64 download
- disk x64 download
- drive x64 download
- file x64 download
- des x64 download
- disk encryption x64 download
- free x64 download
- secure x64 download
You are here: X-64-bit Download
\ Security & Privacy
\ Encryption Tools \ BestCrypt Volume Encryption
BestCrypt Volume Encryption 5.12.3
Sponsored links:
Jetico Inc
BestCrypt Volume EncryptionTM software provides transparent encryption of all the data stored on fixed and removable disk devices. BestCrypt Volume Encryption is a comprehensive and practical program that provides transparent encryption of all the data stored in your disk devices, regardless of their type. It allows you to encrypt modern volumes, MS-DOS style disk partitions and various Windows 8 storage spaces.
BestCrypt Volume Encryption software is a new class of volume encryption products that allows users to encrypt old MS-DOS style disk partitions as well as modern volumes residing on a number of physical disk devices - for example Spanned, Striped, Mirrored or RAID-5 volumes.
Main Features:
1. Encrypts all types of volumes residing on fixed and removable disks:
* Simple volume, i.e. volume consisting of one disk partition.
* Mount point - volume mounted as a sub-folder on NTFS-formatted volume.
* Multipartition volume, i.e. volume consisting of several disk partitions:
1. Spanned volumes;
2. Mirrored volumes;
3. Striped volumes;
4. RAID-5 volumes.
2. BestCrypt Volume Encryption allows encrypting data with many strong encryption algorithms. Every algorithm is implemented with the largest possible key size defined in the algorithm's specification:
* AES (Rijndael) - 256-bit key.
* RC6 - 256-bit key.
* Serpent - 256-bit key.
* Twofish - 256-bit key.
BestCrypt Volume Encryption utilizes XTS Encryption Mode with all encryption algorithms listed above. XTS Mode is designed specifically for applications working on the disk sector level and is more secure than other popular modes used previously, such as LRW or CBC mode.
3. BestCrypt Volume Encryption can encrypt the volume from which Windows boots from, as well as the volume where Windows stores its system files (including Registry, Page file and Hibernate file). Initial encryption is transparent both for running applications and for Windows system modules.
4. BestCrypt Volume Encryption performs Computer Pre-Boot Authentication if the system or boot volume/partition is encrypted -- which means that BestCrypt Volume Encryption loads before operating system and allows the computer to boot only after entering a proper password.
5. BestCrypt Volume Encryption provides an easy way to customize Pre-Boot Authentication texts appearing when the user is required to enter password. This feature allows displaying additional hints when the user is being prompted to enter a password and even hides the fact that pre-boot authentication is running.
6. BestCrypt Volume Encryption supports hardware tokens Aladdin eToken R2 and PRO as a secure hardware storage for encryption keys. With hardware token users get two levels of protection for encrypted data, because in addition to a password it is necessary to connect a small hardware token where the encryption key is stored.
7. BestCrypt Volume Encryption provides Secure Hibernating. If a user encrypts the volume where Windows stores the Hibernate File, BestCrypt Volume Encryption encrypts all write operations when Windows goes into Hibernate state and decrypts read operations when the computer wakes up from Hibernate state. Since pre-boot authentication is necessary at wake-up time, only the user who knows the proper password (and has hardware token, if used) can run the computer from Hibernate mode. Secure Hibernating is a functionality that must be implemented in BestCrypt Volume Encryption, otherwise all data written at Hibernate time (together with encryption keys) appears on disk in opened decrypted form.
8. As well as the Hibernate File, BestCrypt Volume Encryption encrypts Windows Crash Dump Files. Windows writes files in a very special way because when a crash occurs the reg
BestCrypt Volume Encryption software is a new class of volume encryption products that allows users to encrypt old MS-DOS style disk partitions as well as modern volumes residing on a number of physical disk devices - for example Spanned, Striped, Mirrored or RAID-5 volumes.
Main Features:
1. Encrypts all types of volumes residing on fixed and removable disks:
* Simple volume, i.e. volume consisting of one disk partition.
* Mount point - volume mounted as a sub-folder on NTFS-formatted volume.
* Multipartition volume, i.e. volume consisting of several disk partitions:
1. Spanned volumes;
2. Mirrored volumes;
3. Striped volumes;
4. RAID-5 volumes.
2. BestCrypt Volume Encryption allows encrypting data with many strong encryption algorithms. Every algorithm is implemented with the largest possible key size defined in the algorithm's specification:
* AES (Rijndael) - 256-bit key.
* RC6 - 256-bit key.
* Serpent - 256-bit key.
* Twofish - 256-bit key.
BestCrypt Volume Encryption utilizes XTS Encryption Mode with all encryption algorithms listed above. XTS Mode is designed specifically for applications working on the disk sector level and is more secure than other popular modes used previously, such as LRW or CBC mode.
3. BestCrypt Volume Encryption can encrypt the volume from which Windows boots from, as well as the volume where Windows stores its system files (including Registry, Page file and Hibernate file). Initial encryption is transparent both for running applications and for Windows system modules.
4. BestCrypt Volume Encryption performs Computer Pre-Boot Authentication if the system or boot volume/partition is encrypted -- which means that BestCrypt Volume Encryption loads before operating system and allows the computer to boot only after entering a proper password.
5. BestCrypt Volume Encryption provides an easy way to customize Pre-Boot Authentication texts appearing when the user is required to enter password. This feature allows displaying additional hints when the user is being prompted to enter a password and even hides the fact that pre-boot authentication is running.
6. BestCrypt Volume Encryption supports hardware tokens Aladdin eToken R2 and PRO as a secure hardware storage for encryption keys. With hardware token users get two levels of protection for encrypted data, because in addition to a password it is necessary to connect a small hardware token where the encryption key is stored.
7. BestCrypt Volume Encryption provides Secure Hibernating. If a user encrypts the volume where Windows stores the Hibernate File, BestCrypt Volume Encryption encrypts all write operations when Windows goes into Hibernate state and decrypts read operations when the computer wakes up from Hibernate state. Since pre-boot authentication is necessary at wake-up time, only the user who knows the proper password (and has hardware token, if used) can run the computer from Hibernate mode. Secure Hibernating is a functionality that must be implemented in BestCrypt Volume Encryption, otherwise all data written at Hibernate time (together with encryption keys) appears on disk in opened decrypted form.
8. As well as the Hibernate File, BestCrypt Volume Encryption encrypts Windows Crash Dump Files. Windows writes files in a very special way because when a crash occurs the reg
OS: Windows 2000, Windows 2003, Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64, Windows 11
Add Your Review or 64-bit Compatibility Report
Top Encryption Tools 64-bit downloads
The Enigma Protector x64 7.40
Software Protection and Licensing System for Win32/64 PE and .NET executables
Demo | $199.00
tags: protector, packer, software, shareware, license, registration, protect, packing, protection, encryption, enigma
XBoft Folder Lock 1.1
XBoft Folder Lock is a secure and easy-to-use file/folder encryption software.
Freeware
DewVPN unlimited free VPN for Windows 1.2.0.318
DewVPN for Windows - 100% Free, Fast, Secure, Anonymous, No Signup, No Logging.
Freeware
All-In-One Protector 5.1
Content and Copy Protection, DRM for Flash, PDF, PPT, Excel, EXE, Video, Audio
Shareware | $650.00
ArmorTools Home x64 24.3.1
ArmorTools keeps sensitive information secure.
Shareware | $29.99
tags: encryption, virtual disk, encrypt, security, shredder, cleaner, disk, disks, windows, encrypted disk, encrypted, shred, tweak, privacy, code, extra disks, disks
Members area
Top 64-bit Downloads
-
OpenVPN x64 2.6.10
x64 open source download -
NOD32 Antivirus (64 bit) 17.0.16.0
x64 trialware download -
The Enigma Protector x64 7.40
x64 demo download -
COMODO Internet Security
(64 bit) 12.2.2.8060
x64 freeware download -
Microsoft Safety Scanner
x64 1.409.357.0
x64 freeware download -
Cayo | Suspend™ for
Active Directory 1.0.1
x64 freeware download -
McAfee Stinger x64 13.0.0.102
x64 freeware download -
Система видеонаблюдения
Visec 8.0.0.133
x64 freeware download -
Shadow Defender x64 1.5.0.726
x64 trialware download -
BulletsPassView 64-bit 1.32
x64 freeware download
Top Downloads
-
Smadav 2023 Rev15.1
freeware download -
CmosPwd 5.0
freeware download -
OpenVPN x64 2.6.10
open source download -
TestDisk & PhotoRec 7.2
open source download -
NOD32 Antivirus (64 bit) 17.0.16.0
trialware download -
The Enigma Protector x64 7.40
demo download -
USB Disk Security 6.8.0.0
freeware download -
Malwarebytes Chameleon 3.1.33.0
freeware download -
BlockSmart 1.0.2.8
freeware download -
Trend Micro Virus
Pattern File 19.285.00
freeware download -
BleachBit 4.6.0
freeware download -
Nessus 10.7.0
freeware download -
Clean Master 6.0
freeware download -
Metadata Interrogator 0.7
freeware download -
Free Porn Blocker 1.0
freeware download