Disk Password Protection: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only. Disk Password Protection 5.0 offers users the option to choose what kind of protection they need. First is the Boot Protection. When chosen, any unauthorized person will not be able to boot a computer without entering the correct password. The program also offers Partition Protection. Any person can chose to have one or several partitions where all confidential information is stored. When protection is activated, the partition will be invisible to the operating system and the disk space taken up by sensitive data will appear as free disk space. The Low-Level Protection option allows users to blocks all attempts to read/write to/from the protected disk. The drive itself will appear as if it were just manufactured and is not formatted to perform any operations. This protection works only for ATA-compatible disks and must be activated in MS-DOS.
What is new in this release:
Added a possibility to manage boot protection in UEFI systems.
Added a possibility to protect the process of booting from disks with GPT partition tables.
Added a possibility to protect volumes on disks with GPT partition tables.
Added the support of disks with 4096-byte sectors (Advanced Format).
Added the support of dynamic disks with GPT partition tables.
Added the support of Windows 8 and newer versions.
The core of the program has been completely reworked. Boot and volume protection algorithms have been improved.
The interface of the program has been redesigned (made similar to that of Cryptic Disk, a tool for transparent encryption of containers and disks).
Added a possibility to automatically check for updates.
Fixed a problem with large disk support.
Fixed a problem with boot and system disk detection.
Windows 9x and Windows NT/2000 operating systems are no longer supported. The oldest supported operating system is Windows XP SP3.
The SDK is no longer distributed.
The ATA protection control module is no longer supported.
The trial version is no longer limited to 30 days.
Cryptic Disk Free Cryptic Disk creates virtual encrypted disks. This allows you to maintain secrets both on a home computer and on a workstation. Data encryption makes use of the best algorithms and takes place in real time without affecting computer performance. Cryptic Di
Cryptic Disk Pro As professional disk encryption software safeguarding data on any type of drive, Cryptic Disk will be a reliable defense for your files regardless of where they are located. The program can create virtual encrypted disks as well as encrypt physical hard di
Desktop USB Security Key This application installs to any USB thumb drive and adds extra security when the user is away from their PC or laptop. First, take out the USB Drive and the PC will go into locked windows mode and also lock the keyboard. Upon return to PC or laptop, inser
SensiGuard SensiGuard is the fastest and the easiest way to protect files and folders on your PC and your USB flash drives. With SensiGuard perform file encryption software - the hassle-free way to protect your confidential data, such as documents, photos and persona
AxCrypt (64-bit) AxCrypt (64-bit) integrates seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual files. It features password Protect any number of files using strong encryption, right-click integration with Windows Explorer makes AxC
SmartEncryptor SmartEncryptor uses the most powerful encryption algorithms existing. AES - the US Government standard symmetric encryption algorithm and Blowfish.
Encrypt files and folders
Send files over the Internet securely
Create self-decrypting executables
AEVITA Tracks Eraser AEVITA Tracks Eraser is a slim data erasing program designed to protect your computer from nosy people and boost computer performance. It securely erases your usage tracks in Windows, Internet Explorer, MS Office, and other applications. For maximum effici
Secure Privacy 1. Integrated data/files encryption/decryption management system which is very easily to manage files/data encryption
2. Self-Extraction encryption generation make you fully use of this system and distribute all kind of your encrypted data/files anywhere
Checksum Verify Checksum Verify is a multithreaded tool to verify and create checksum files.
It supports the following features as verify sfv, md5, par2 and sha1 checksum files,calculate checksum of single files,create crc32, md5 and sha1 checksum files and associate sfv
IEPassword IE Password implements a user-based Web account management system for IE. The account (username and password) information will be stored in a file -- account db(encrypted). The main value of this tool is to let user share account information between many w
MyPasswords In this day and age, we all understand the need to keep track of numerous passwords and names, especially if you are also an Internet user. There are a number of solutions that you could use. One solution is to write them down, but anyone could find them a
ExploitTracker ExploitTracker is the announcer of the latest computer security vulnerabilities. Its primary duties are: to give a detailed description of the vulnerability; to show the methods of exploitation; to instruct the user how to make his system immune to the vul
Supported Operating Systems:
Windows 2003 |
Windows 7 |
Windows 8 |
Windows Server 2008 |
Windows Vista |
Windows XP |
Comments on :
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10