encrypted disk free software
Search results for tag «encrypted disk»:
Paragon Encrypted Disk 3.02
… e system, then every application and system process will have transparent access to the contents of encrypted virtual disk. You can use a password or you can have key-files on a Flash Memory stick or card, diskette or other removable media to access encrypted disks.
Paragon encrypted disk is a…
Virtual Encrypted Disk 1.1.0
…
Physically, all the files you put into your created virtual disk, are stored in this physical file in encrypted way; at the same time, the mounted disk can be visible as a usual disk or external device, and all files can be normally accessed.…
MY ENCRYPTED DISK 1.10
… malicious delete.
virtual encrypted partition can be formatted to the file system which operating system supports (FAT, FAT32, NTFS);
full plug and play,max 4 scsi removeable disk can use at one time. you can simple stop device when logout.…
BladeBox Iron Edition 1.1
… ecrypted to a temporary folder, instead they're encrypted/decrypted in real-time while you write/read them.
Limitations
BladeBox Iron Edition allows you to create up to 4 virtual, encrypted volumes, and each can contain up to 30mb of data.…
Able Disk 2.1
… and the drive is mounted the new virtual drive can then be used as a normal drive, files can be saved and retrieved to the drive.
Limitations
Able Disk Free:
Maximum size of an encrypted drive mapped to a correspondent container file is 200 MBy…
Safe Disk 2.2
… d to the drive.
Limitations
Safe Disk Free:
Maximum size of an encrypted drive mapped to a correspondent container file is 200 MBytes.
Safe Disk:
Maximum size of an encrypted drive mapped to a correspondent container file is 2048 GBytes.…
fSekrit 1.40
… unless you use secure file wiping programs, it would be a trivial matter for someone to retrieve your un-encrypted data, even though you has been deleted. This can't be done with fSekrit, though, since it never stores your un-encrypted data on disk.…
DiskEncryptor 1.3
… data will not be destro…
TurboCrypt: Disk Encryption Software 6.5
… even to those who do not share TurboCrypt software.
Supports use with external disks and USB Devices. Also Encrypted volumes can be shared over an entire network. Customized versions are available for upon request for corporate customers.…
Cryptic Disk 5.3.2
… e accessed by any person who does not know the password. After decryption, all files become accessible and the hard drive works normally.
Limitations
Unchangeable "demo" password…
Related: