The latest version of Disk Password Protection 5.5 allows you to change the welcome message for the boot protection system.
Continue readingThe latest version of Disk Password Protection 5.5 allows you to change the welcome message for the boot protection system.
Continue readingIs hardware disk encryption sufficiently reliable? Is it true that in the case of the theft of an encrypted disk it is impossible to access information on the media? Let’s try to understand the question.
Continue readingThe main innovation in the Disk Password Protection 5.1 is Hidden mode of operating system boot protection. No password prompt is displayed and the computer appears frozen, the computer will only start Windows (or any other operating system) after the correct password is entered and the Enter key is pressed.
Continue readingWe’re happy to inform you about a new release of Exlade Cryptic Disk 5.0. We have increased the level of security protection by adding the support of hardware security tokens and smart cards. The support of TrueCrypt keyfiles was also added as well as the user interface was adapted to help people with disabilities more enjoy the power and simplicity of Cryptic Disk.
Continue readingAll the Dropbox files are stored open on the computer. Any person can access them. If you have some important documents, photos or other files and you want to limit other persons access to them, you can encrypt all this data.
Here are some ideas on how to store the Dropbox folder on an encrypted virtual volume. It means that the whole Dropbox folder will be stored on the computer encrypted and the password will be required to access it.
Continue readingSkype stores openly all the history of your conversation on your computer. It is quite easy to steal the history files and with the help of some special software one can view all the history without your Skype password.
It is not always convenient to stop saving Skype histories as sometimes you might need to search for some important information there. Besides even if you stop saving Skype history the program will still write all the messages to its database and will delete them only upon quitting. And the events history (who and when you talked to) is never deleted from the database.
Here are some ideas on how to protect a Skype profile (including all the histories) by encrypting the profile, i.e. storing profile files on the encrypted volume or in the encrypted container.
Continue readingThe section tells how to encrypt all your portable software (and their data) that are controlled by PortableApps. It is very easy to encrypt them. You should only place the PortableApps folder with the portable software on the encrypted volume (or in the container).
Continue readingYou have created and encrypted a volume or container and want to create a hidden encrypted volume within it. You should remember that it is impossible to prove that such a volume exists.
Continue readingIf there is no encrypted volume or container it is very easy to create one with the help Cryptic Disk. Just go through the instructions:
How to Create an Encrypted Container
How to Encrypt a Volume
All the files on the encrypted volumes are protected against unauthorized access in any type of situation - loss, thievery, computer/laptop withdrawal or an unwanted user by the computer. And, as we say, it is better to be on the safe side.
Continue readingAn encrypted container is an ordinary encrypted file that can be connected (mounted) to any free volume letter and you can work with such a volume as with a normal one. Sometimes it is called a virtual encrypted volume. All the data written to the volume is automatically encrypted. Any moment the volume is disconnected (unmounted), the access to the data is blocked. Upon system shutdown all the encrypted volumes are automatically unmounted. To re-mount a volume you have to enter the password (and/or key files) that you have specified upon creating the volume. After you mount the encrypted virtual volume all the files on it become accessible and the software will automatically decipher them when reading (encrypt them when writing). A file in the encrypted container can be copied, moved or deleted, i.e. you can handle it as an ordinary file.
Continue readingIf you haven’t downloaded software’s installation package you can go to:
www.exlade.com/en/cryptic-disk/download
Run the downloaded package (double left-click the installation file).
Continue readingWe are glad to announce the release of a new free version of Cryptic Disk with TrueCrypt support.
Continue readingExlade announces a complete relaunch of the professional Disk Password Protection utility that was designed to provide comprehensive protection for the user’s data stored on their computers against any unauthorized access.
Continue readingExlade Company announces a new version of Cryptic Disk 3.1 - a powerful encryption tool for file containers and physical disks.
Continue reading