دانلود نرم افزار Cryptic Disk Pro
اگر از جمله کاربرانی هستید که زیاد از
اینترنت استفاده می کنید و همیشه نگران دسترسی هکرها به اطلاعات شخصی و از همه مهم تر
عکس های خصوصی خود هستید. و یا به طور هم زمان با افراد دیگر از یک سیستم استفاده می کنید و می خواهید برای دسترسی سایر افراد به اطلاعات محرمانه خود محدودیت ایجاد کنید، می توانید از
نرم افزار Cryptic Disk Pro استفاده کنید.
Cryptic Disk Pro یک نرم افزار حرفه ای رمز گذاری دیسک است. یک نرم افزار بسیار قابل اعتماد که از اطلاعات محرمانه شما به وسیله کد کردن آنها حفاظت می کند. می تواند هارد دیسک، درایو های کارت و درایو های USB را رمز گذاری کند. در این نرم افزار رمز گذاری داده ها با استفاذه از الگورتم های جدید و قابل اعتماد چون: AES/Rijndael، Serpent، Twofish، Blowfish و CAST6 انجام می گیرد. همچنین این نرم افزار از حالت XTS پشتیبانی می کند. این برنامه از قابلیت چند كاربره نیز پشتیبانی میكند به صورتی كه هر كاربر برای خود رمز عبوری خواهد داشت و به این ترتیب از اطلاعات شما حفاظت می کند به طوری که بدون وارد کردن پسورد هیچ کس نمی تواند به آنها دسترسی داشته باشد و از جمله قابلیت های کلیدی دیگر این نرم افزار امکان استفاده از نرم افزار بر روی کامپیوتر بدون نیاز به نصب آن می باشد.
قابلیت های کلیدی نرم افزار Cryptic Disk Pro:- قابلیت رمز گذاری پارتیشن های هارد دیسک
- قابلیت رمز گذاری کارت های حافظه، درایوهای Pen و درایو های USB
- عدم تاثیر بر روی عملکرد کامپیوتر
- حفاظت مطمئن از کی لاگر
- قابلیت استفاده از نرم افزار بر روی کامپیوتر بدون نیاز به نصب آن
- پشتیبانی از الگوریتم های مختلف رمز گذاری داده ها
- استفاده از حالت XTS برای رمز گذاری داده ها
- پشتیبانی برای استفاده از الگوریتم های مختلف برای استخراج هدر کلید
- بهینه شده برای پردازنده های چند گانه
- واسط کاربری چند زبانه
- پشتیبانی از قابلیت چند کاربره
- سازگار با نسخه های مختلف
ویندوز- و ...
Cryptic Disk Pro 3.0.29.569 Download
Exlade Cryptic Disk Professional will provide a simple and affordable way to protect disks and disk partitions by encrypting them. The encrypted data cannot be accessed without entering the password, even if a hacker gets access to a PC or the hard drive is stolen.
Exlade Cryptic Disk Professional uses the AES 256-bit encryption algorithm, the same type of encryption that NASA, the FBI and the Department of Defense use to protect their data. Encrypting and decrypting takes one click and does not require a PhD in mathematics or computer science.
Exlade Cryptic Disk Professional can be used either at home or in the office. The program supports multiple users with different degrees of access privileges, as set by the system administrator. Each user will then have access to the encrypted data that he or she has the access rights to, but not to the data of others.
Naturally, Exlade Cryptic Disk Professional has been designed to work with hard drives, but the program can be used with removable storage media, such as USB Flash drives.
Once the data is encrypted, the files cannot be accessed by any person who does not know the password. After decryption, all files become accessible and the hard drive works normally.
Here are some key features of "Exlade Cryptic Disk Professional":
- Creation of virtual encrypted disks from container files and mounting them as separate disks
- Encryption of whole disk partitions (internal and removable) as well as other drives (memory cards, pen drives, USB drives, and more) without losing information
- Transparent (on-the-fly) data encryption which takes place in real time and does not affect computer performance
- Deniable Encryption so that encrypted volumes do not contain any signatures which could be used to prove that they are encrypted disks or containers
- Plausible Deniability, which allows creating hidden encrypted disks multiply nested inside of each other (steganography)
- Support for using key files together with a password or instead of a password, offering users flexibility in how they deploy the disk encryption software
- Powerful protection from brute force password attacks (both dictionary attacks and true brute force attacks) in accordance with PKCS #5 v2
- Reliable protection from keyloggers (built-in virtual keyboard for entering passwords)
- Ability to use the disk encryption software on a computer without installing it beforehand (portable mode)
- Configurable automatic actions when an encrypted disk is mounted or dismounted: play a WAV file, or launch a program or script in the following languages: CMD Shell, Windows Scripts and PowerShell
- Support for different cryptographic algorithms to encrypt data: AES/Rijndael, Serpent, Twofish, Blowfish, CAST6
- Use of XTS data encryption mode, developed specially for disk encryption (IEEE 1619 standard)
- Support for cascade encryption (use of multiple cryptographic algorithms to encrypt data in sequence) to improve the cryptographic strength provided by the disk encryption software, increasing encryption key size from 256 to 2944 bits in XTS mode
- Support for using different algorithms for header key derivation: HMAC-SHA-512, HMAC-RIPEMD- 256, HMAC-Whirlpool
- Ability to mount an encrypted container/disk using any free drive letter or an empty folder on an NTFS disk
- Support for setting hotkeys to quickly mount and dismount encrypted volumes
- Support for automatic restoration of access settings to shared resources on an encrypted disk after mounting it
- Optimization for multiple CPUs
- Ability to access the program's features from the command line, which allows automating the process of working with the program
- Multilingual interface Creation of virtual encrypted disks from container files and mounting them as separate disks
- Encryption of whole disk partitions (internal and removable) as well as other drives (memory cards, pen drives, USB drives, and more) without losing information
- Transparent (on-the-fly) data encryption which takes place in real time and does not affect computer performance
- Deniable Encryption so that encrypted volumes do not contain any signatures which could be used to prove that they are encrypted disks or containers
- Plausible Deniability, which allows creating hidden encrypted disks multiply nested inside of each other (steganography)
- Support for using key files together with a password or instead of a password, offering users flexibility in how they deploy the disk encryption software
- Powerful protection from brute force password attacks (both dictionary attacks and true brute force attacks) in accordance with PKCS #5 v2
- Reliable protection from keyloggers (built-in virtual keyboard for entering passwords)
- Ability to use the disk encryption software on a computer without installing it beforehand (portable mode)
- Configurable automatic actions when an encrypted disk is mounted or dismounted: play a WAV file, or launch a program or script in the following languages: CMD Shell, Windows Scripts and PowerShell
- Support for different cryptographic algorithms to encrypt data: AES/Rijndael, Serpent, Twofish, Blowfish, CAST6
- Use of XTS data encryption mode, developed specially for disk encryption (IEEE 1619 standard)
- Support for cascade encryption (use of multiple cryptographic algorithms to encrypt data in sequence) to improve the cryptographic strength provided by the disk encryption software, increasing encryption key size from 256 to 2944 bits in XTS mode
- Support for using different algorithms for header key derivation: HMAC-SHA-512, HMAC-RIPEMD- 256, HMAC-Whirlpool
- Ability to mount an encrypted container/disk using any free drive letter or an empty folder on an NTFS disk
- Support for setting hotkeys to quickly mount and dismount encrypted volumes
- Support for automatic restoration of access settings to shared resources on an encrypted disk after mounting it
- Optimization for multiple CPUs
- Ability to access the program's features from the command line, which allows automating the process of working with the program
- Multilingual interface
More info ( ↓ open / close ↑ )