会员: 密码:  免费注册 | 忘记密码 | 会员登录 网页功能: 加入收藏 设为首页 网站搜索  
 安全技术技术文档
  · 安全配制
  · 工具介绍
  · 黑客教学
  · 防火墙
  · 漏洞分析
  · 破解专题
  · 黑客编程
  · 入侵检测
 安全技术论坛
  · 安全配制
  · 工具介绍
  · 防火墙
  · 黑客入侵
  · 漏洞检测
  · 破解方法
  · 杀毒专区
 安全技术工具下载
  · 扫描工具
  · 攻击程序
  · 后门木马
  · 拒绝服务
  · 口令破解
  · 代理程序
  · 防火墙
  · 加密解密
  · 入侵检测
  · 攻防演示
安全防线 > 加密解密
BestCrypt-1.6-3.tar.gz
发表日期:2007-03-13 11:18:24文件大小:190.10 K 下载次数:8210  

版权所有:
软件版本:
文件大小:190.10 K
操作系统:Linux
下载说明: 工具来源:http://www.jetico.com/ * Strong Security Once written to a BestCrypt file (container), data is never stored in an 'open' condition. Yet BestCrypt's smooth operation and complete transparency allows instant data access to any authorized user. BestCrypt's advanced data encryption and authorization technology provides a new level of security with standard, proven and published cryptographic algorithms, safe password input and transparent encryption. * Proven Encryption Methods It is very important for a trusted security system to use open published encryption methods to allow professionals to verify its reliability. The BestCrypt system allows users to choose any of algorithms listed below to protect sensitive data as well as to use all algorithms simultaneously. (*) Note: US Federal Standard DES is implemented for compatibility reasons only. DES usage is strongly discouraged due to insufficient key length. * Linux and Windows compatibility BestCrypt for Linux uses the same container format as BestCrypt v6 and newer for Windows. Containers, created and used by BestCrypt for Linux are accessible under Windows OSes. See also: container format considerations. * Versatile functions In addition to comprehensive encrypted storage BestCrypt software offers wide range of security enhancements and handy features: o Swap space encryption o Urgent container unmounting o Hidden part in container o Up to 7 passwords per container * Using in Network environment BestCrypt software can use any network drive for creating and accessing file-containers. This network drive may be shared by computer with any operating system, for example UNIX-like operating systems (OSF/1, LINUX, BSD, SunOS, AIX and others), Novell, Windows 2000/NT, Windows Me/98/95, Windows 3.xx and others. BestCrypt virtual drives look like usual local drives and any software or operating system utility will work with these virtual drives in the usual way. As the example of this feature, BestCrypt virtual drives may be shared in a network in the same way as the other local drives on computer. * Easy to Install and Use BestCrypt is easy to use. You need only enter the appropriate password. After password verification, access and use of the encrypted data become transparent for any application. No further action is needed to keep new or altered data in the secure encrypted form.

立即下载
下载的书籍需要相应的阅读器才能查看,请到如果你的机器上没有相应的阅读器,请到 图书阅读工具 栏目中下载相关的工具。

返回顶部】 【打印本页】 【关闭窗口

关于我们 / 给我留言 / 版权举报 / 意见建议 / 网站编程QQ群   
Copyright ©2003- 2024 Lihuasoft.net webmaster(at)lihuasoft.net 加载时间 0.00169