New Cryptic Disk 2.7 Offers Safe Data Encryption
Increases reliability, expands functionality
Note: ESJ’s editors carefully choose vendor-issued press releases about new or upgraded products and services. We have edited and/or condensed this release to highlight key features but make no claims as to the accuracy of the vendors’ statements.
Exlade has released a new version of Cryptic Disk program -- Cryptic Disk 2.7 -- designed for safe encryption of data on computers. The new version has an increased reliability of working with encrypted disks, expanded functionality, and support of all the 64-bit operating systems.
The encryption driver of Cryptic Disk now has a digital signature, which enables creating encrypted disks in all the 64-bit operating systems (Windows Vista, 2008 Server, and Windows 7).
In the current version, Cryptic Disk allows mounting encrypted disks immediately after their creation, without having to reboot the operating system or reconnect the device. In this version, saving and recovery of a shared resources list of encrypted disks has been improved.
Upon a system shutdown or reboot, Cryptic Disk is now the last application to end its work. This ensures correct finishing of the work of all other third-party applications using the data on the encrypted disk. This helps to avoid mistakes and loss of important information, as well as enhances the reliability of the system operation as a whole.
Cryptic Disk is a universal solution for securing the data stored on a computer from unauthorized access. It uses a transparent encryption algorithm and has its own multi-user access system.
Key features of Cryptic Disk 2.7 includes:
Support of 64-bit systems and Microsoft Windows Vista OS
Encryption of partitions or entire disks (such as USB-storage, hard drive, etc.)
Encrypted disks and partitions can be converted back into regular ones at any time
Automatic, user-transparent data encryption ("on-the-fly" encryption)
Encryption algorithm: AES with the key length of 256 bit and the CBC encryption mode
Support of a multi-user system with the distribution of different access rights for encrypted disks
Access to encrypted disks through the local network; access rights are set only once and are saved for future connections
Program can be used without prior installation
For further details, visit http://www.exlade.com.