Join our community.
Receive useful tips and update notifications as soon as they become available.

Disk Password Protection 5.5: boot protection with any welcome message

Disk Password Protection 5.5: boot protection with any welcome message

The latest version of Disk Password Protection 5.5 allows you to change the welcome message for the boot protection system.

Continue reading

The built-in data encryption vulnerabilities of hard drives

The built-in data encryption vulnerabilities of hard drives

Is hardware disk encryption sufficiently reliable? Is it true that in the case of the theft of an encrypted disk it is impossible to access information on the media? Let’s try to understand the question.

Continue reading

Cryptic Disk 5.1: Support of the Notification Center in Windows 8/10 and Multiple Bugfixes

Cryptic Disk 5.1: Support of the Notification Center in Windows 8/10 and Multiple Bugfixes

Our new Exlade Cryptic Disk 5.1 features lots of bugfixes and improvements.

Continue reading

Disk Password Protection 5.1: hidden boot protection

Disk Password Protection 5.1: hidden boot protection

The main innovation in the Disk Password Protection 5.1 is Hidden mode of operating system boot protection. No password prompt is displayed and the computer appears frozen, the computer will only start Windows (or any other operating system) after the correct password is entered and the Enter key is pressed.

Continue reading

Cryptic Disk 5.0: increased protection security and improved support of TrueCrypt

Cryptic Disk 5.0: increased protection security and improved support of TrueCrypt

We’re happy to inform you about a new release of Exlade Cryptic Disk 5.0. We have increased the level of security protection by adding the support of hardware security tokens and smart cards. The support of TrueCrypt keyfiles was also added as well as the user interface was adapted to help people with disabilities more enjoy the power and simplicity of Cryptic Disk.

Continue reading

How to Encrypt a Dropbox folder

How to Encrypt a Dropbox folder

All the Dropbox files are stored open on the computer. Any person can access them. If you have some important documents, photos or other files and you want to limit other persons access to them, you can encrypt all this data.

Here are some ideas on how to store the Dropbox folder on an encrypted virtual volume. It means that the whole Dropbox folder will be stored on the computer encrypted and the password will be required to access it.

Continue reading

How to Encrypt a Skype Profile

How to Encrypt a Skype Profile

Skype stores openly all the history of your conversation on your computer. It is quite easy to steal the history files and with the help of some special software one can view all the history without your Skype password.

It is not always convenient to stop saving Skype histories as sometimes you might need to search for some important information there. Besides even if you stop saving Skype history the program will still write all the messages to its database and will delete them only upon quitting. And the events history (who and when you talked to) is never deleted from the database.

Here are some ideas on how to protect a Skype profile (including all the histories) by encrypting the profile, i.e. storing profile files on the encrypted volume or in the encrypted container.

Continue reading

How to Encrypt PortableApps

How to Encrypt PortableApps

The section tells how to encrypt all your portable software (and their data) that are controlled by PortableApps. It is very easy to encrypt them. You should only place the PortableApps folder with the portable software on the encrypted volume (or in the container).

Continue reading

How to Create a Hidden Encrypted Volume

How to Create a Hidden Encrypted Volume

You have created and encrypted a volume or container and want to create a hidden encrypted volume within it. You should remember that it is impossible to prove that such a volume exists.

If there is no encrypted volume or container it is very easy to create one with the help Cryptic Disk. Just go through the instructions:
How to Create an Encrypted Container
How to Encrypt a Volume

Continue reading

How to Encrypt a Volume

How to Encrypt a Volume

All the files on the encrypted volumes are protected against unauthorized access in any type of situation - loss, thievery, computer/laptop withdrawal or an unwanted user by the computer. And, as we say, it is better to be on the safe side.

Continue reading

How to Create an Encrypted Container

How to Create an Encrypted Container

An encrypted container is an ordinary encrypted file that can be connected (mounted) to any free volume letter and you can work with such a volume as with a normal one. Sometimes it is called a virtual encrypted volume. All the data written to the volume is automatically encrypted. Any moment the volume is disconnected (unmounted), the access to the data is blocked. Upon system shutdown all the encrypted volumes are automatically unmounted. To re-mount a volume you have to enter the password (and/or key files) that you have specified upon creating the volume. After you mount the encrypted virtual volume all the files on it become accessible and the software will automatically decipher them when reading (encrypt them when writing). A file in the encrypted container can be copied, moved or deleted, i.e. you can handle it as an ordinary file.

Continue reading

How to Install Cryptic Disk

How to Install Cryptic Disk

If you haven’t downloaded software’s installation package you can go to:
www.exlade.com/en/cryptic-disk/download

Run the downloaded package (double left-click the installation file).

Continue reading

Free version of Cryptic Disk 4 with TrueCrypt support

Free version of Cryptic Disk 4 with TrueCrypt support

We are glad to announce the release of a new free version of Cryptic Disk with TrueCrypt support.

Continue reading

Disk Password Protection 5 - new version released

Disk Password Protection 5 - new version released

Exlade announces a complete relaunch of the professional Disk Password Protection utility that was designed to provide comprehensive protection for the user’s data stored on their computers against any unauthorized access.

Continue reading

Cryptic Disk 3.1 is a new level of reliability and performance

Cryptic Disk 3.1 is a new level of reliability and performance

Exlade Company announces a new version of Cryptic Disk 3.1 - a powerful encryption tool for file containers and physical disks.

Continue reading