Download ViPNet Safe Disk   ViPNet Safe Disk 2.9.1

Software Specifications


ViPNet Safe Disk Screenshot
  View more screenshots
Editor Rating
0.0
Version:
2.9.1
Size:
3.76 MB
License [?]:
Shareware
Price:
$55.00 USD
Last Updated:
Category:
Encryption, Decryption and File Wiping Software
Developer:
INFOTECS GmbH
Operating System:
Windows 95 Windows 98 Windows 2000 Windows ME Windows XP Windows Server 2003
Additional Requirements:
Pentium II-233, 64MB RAM
Limitations
Not available

ViPNet Safe Disk Review

" Provides transparent "on-the-fly" encryption for your notebook or desktop personal computer. "

ViPNet Safe Disk keeps your confidential data in a strongly encrypted form on your disk and provide you with transparent access to it from any application program.

ViPNet Safe Disk provides transparent "on-the-fly" encryption for your notebook or desktop personal computer. In the working process the system is creating files so-called "containers", whose size is specified by user; the files are displayed as logic disks. Password authentification is performed once on the entire volume. Once access has been granted to the volume, users can create, read, write, drag, drop and copy files to the volume just as if it were another hard drive. Best of all, since Safe Disk appears to Windows as another drive letter, it is instantly compatible with almost any standard business application, word processor, spreadsheet or database program. All information that the user stores on the disks is kept encrypted. When read, the information automatically is being decrypted, when saved-encrypted. This process is completely transparent for a PC user.

ViPNet Safe Disk Features:

1. ViPNet Safe Disc utilizes a proprietary encryption algorithm with a key lengh - 256 bit.
2. ViPNet Safe Disk does not only guarantees reliable confidential information storage and processing, moreover, it supports additional information security features:
a) The system is invisible for a PC user: while non-activated, the system cannot be seen (only connected device of data storage (Reader, for example) can show presence of the system);
b) When requested for real password, use the one for "under control" mode. The password of the given mode allows to conceal the presence of any confidential information when concealing the presence of the very system is impossible.

Share

Top Related Downloads
1. Download Data Destroyer Data Destroyer
Overwrites files so they cannot be recovered. Can wipe entire hard disk.
2. Download CryptoForge CryptoForge
Encrypt, decrypt, and wipe files of any type, folders, or entire drives.
3. Download File Protector File Protector
Lock file, folder and drive and protect your important data, your file and your privacy in seconds.
4. Download Encrypt PDF SDK-COM Component Encrypt PDF SDK-COM Component
Encrypt PDF SDK-COM allows you to encrypt existing PDFs.
5. Download Armor Tools Armor Tools
Suite of tools which ensure your privacy and keep sensitive information secure.