DiskEncryptor 1.8

License: Free ‎File size: 2.16 MB
‎Users Rating: 4.5/5 - ‎2 ‎votes

A transparent(on-the-fly) disk/cd encryption system, which combin with AES 256-bit encryption. DiskEncryptor can make a disk partition encrypted on the windows system or create some new virtual disks and cds. After encypted, all the operation for this encrypted disk is as the same as a normal disk, when read and write, the decryption and encryption engine is running at background and transparently. DiskEncryptor doesn't allow you to read and write the right data on the disk partition until the disk is unlocked with the correct password. You can use the following three ways to protect your personal data: Encrypt system whole disk or partition directly. Create a certain capacity encrypted virtual disks/cds to hold some files. Using DiskEncryptor as a virtual disk and cdrom emluator. Encrypt the CD/DVD images and save your private data in .iso files or CD/DVD. In our tests, the program demonstrated good speed, even when securing large folders,if you have some important files or need to keep certain files to yourself, you should definitely give Diskencryptor a try. Almost support all kind of Removable, Fixed storage drive, Memory Card and floppy disk. Support for encrypt cd/dvd image(.iso) for mount to virtual cdrom or burn to cd/dvd. Support for private virtual disk and CD/DVD emulation. Support for private virtual disk encryption and virtual CD/DVD encryption. Using 256 bit AES arithmetic, support high security level. Encrypt disk partition directly, after encrypted, if someone take it, but he/she have no password or not install this software, the partition can't be accessed by any case. When insert a encrypted disk, a dialog will show automatically to tell you input your password of the disk. Even if lots of data in the disk enctypted, this data will exist all the same after enctyption. Run as a windows service, DiskEncryptor can working on a normal user account. Display encrypted icon decrypted icon on encrypted drive in explorer.

VERSION HISTORY

  • Version 1.8 posted on 2016-01-01
    Change to complete free version
  • Version 1.6 posted on 2008-09-22
    Add new functions of creating encrypted virtual disks and support a virtual disk/cd emulator.

Program Details

EULA

End-User Agreement This license agreement ("License") is a legal agreement between you (either an individual or single entity) and KernSafe Technology. Please read and understand all rights and limitations specified in the end User License Agreement (Agreement) of this KernSafe Technology software. At the end of the license you will be asked to accept this License and continue to install. By installing, copying or otherwise using the Software, you agree to be bound by the terms of this License. If you dont agree on any provision in this Agreement, you are not allowed to install or use this software. 1. EVALUATION PERIOD: You may use a Shareware Copy of the Product for an evaluation period of up to 20 days, in order to determine whether the Product meets your needs before purchasing it. Once the evaluation period ends, you agree to either purchase a Registered Copy of the Product, or to stop using it. 2. USE OF THE PRODUCT: While you are evaluating the Product: (a) You must not defeat, or try to defeat, messages in the Product which encourage users to register; (b) You must not use, produce, modify, lease or transfer this software or any part of it beyond the provisions of this Agreement; (c) You must not perform reverse engineering, reverse compiling and reverse assembly concerning this software; (d) You must not lease, rent or lend this software; (e) And you can not modify any file that come with the product. (f) You will use this software in only one computer. One copy of software license shall not be used in more than one computer. 3. IS THIS A LEGAL COPY? You can determine whether this is a legal copy of the software or not by clicking the about button in the software. If you find it written 'Unregistered' next to the 'Licensed to:' field, it means that the user is evaluating the product. Otherwise if you find a person's name or a company name next to the 'Registered to' field, it means that the user is running a registered version of the software. 4. DISTRIBUTING SHAREWARE COPIES: You may make copies of your unregistered Shareware Copy of the Product to give to others, however you may not sell Shareware Copies of the Product for a profit. Distributing the registration key (that you obtain after buying) is Illegal. Also, you can not: (a) distribute registered versions of Product (b) ship incomplete versions of the Product; (c) defeat or try to defeat, messages in the Product which encourage users to register their software or actively discourage user registration in any way. 5. Limitation of Liability: This product is an encryption software, you must make use of the product correctly, KernSafe Technology shall take no responsibility of indemnification for any indirect, direct damage or any other damage. You must not force to exit the product when the disk is encrypting or decrypting, also note that the password is to prevent forgotten, or else we can do nothing to help you! 6. TERMS OF USE: This product is an encryption software. Do not try to decompile, delete or misuse the files that come with the software, or this could result in severe problems. Please note that if you try to encrypt any unwritable device or if a sub folder inside the 'Locker' disk is open while you are encrypting your disks, then the program will not encrypt. So make sure you take all precautions needed before using the software. 7. Termination of license:If you fail to abide by the terms and conditions of this Agreement, KernSafe Technology has the right to terminate this Agreement without impairing other rights. After the termination of the Agreement, you must destroy all copies of the software or return them to KernSafe Technology. 8. WARNING:This product is protected by copyright laws and international treaties. Unauthorized reproduction or distribution of this program, or any portion of it, may result in severe civil and criminal penalties, and will be prosecuted to the maximum extent possible under the law.