Folder Castle 4.1

License: Free Trial ‎File size: 1.94 MB
‎Users Rating: 3.0/5 - ‎2 ‎votes

Folder Castle protects your data from thieves and snoopers. It provides two levels of protection: you can lock away files and folders, or you can put them into Secure Storage with on-the-fly AES-256 encryption. Whether you choose to lock away or put files into Secure Storage, you can be sure that they cannot be seen in Windows Explorer even if the computer is rebooted in Safe Mode. For more peace of mind, you can enter into the Windows Stealth Mode, which hides the presence of Folder Castle itself. Folder Castle seamlessly integrates into Windows Explorer, including context menu, toolbar and hotkeys. Protecting data is fairly easy. Click on the file you want to protect, select the Hide option from its right-click menu and that''s it. The same can be done from within Folder Castle. Run the program and use the Add File dialog or a simple drag and drop operation to add a file to the list of protected data. But that''s not all! True touch typists are sure to appreciate the ability to protect files by using hotkeys. Unhiding files is just as easy. Run Folder Castle and remove files from the list. A password is needed to confirm each operation. Folder Castle is a definite benefit for anyone who needs to keep certain files to themselves. Once protected, your personal information cannot be viewed, copied, deleted or seen by anyone who is unauthorized. Folder Castle also offers a practical and novel way to go anywhere with the protected data. Just create Secure Storage on the removable drive, put files in to it and you''re free to roam the planet without the fear of data loss or theft. To get access to the files, plug the USB drive into the USB port, mount the drive and open the storage. The only condition is that another computer should also have Folder Castle installed. But it''s not a problem if you register. The buyer of a single-user license is allowed to install Folder Castle on three computers - home, office and laptop. Isn''t it nice, or what?

Program Details

EULA

Folder Castle ("Software") End-User License Agreement for Use IMPORTANT - READ CAREFULLY: Be Sure To Carefully Read And Understand All The Rights And Restrictions Described In This End-User license Agreement ("Agreement") The author forbids, under any circumstances, the unauthorized reproduction of the Software or use of illegally obtained Software. Making illegal copies of the Software is prohibited. Individuals who violate copyright law and Software licensing agreements may be subject to criminal or civil action by the owner of the copyright. 1. LICENSE GRANT The user is granted a non-exclusive license to use Software on one computer, for any legal purpose. The primary user of the computer on which the Software is installed may make two additional copies of the Software: a second copy for his or her exclusive use on a laptop and a third copy for his or her exclusive use on a home or work computer. 2. RIGHTS AND RESTRICTIONS This Agreement does not convey title or ownership to you but instead gives you only the limited rights set forth in this Agreement. Pursuant to this Agreement, you may: 1) use the Software on one computer and additionally on laptop and/or a home or work computer; 2) transfer the Software and license to another party if the other party agrees to accept the terms and conditions of this Agreement. If the Software is an update, the transfer must include the update and all previous versions. Except as expressly set forth in this Agreement, you have no right to use, make, sublicense, modify, transfer or copy either the original or any copies of the Software or to permit anyone else to do so. You may not allow any third party to use or have access to the Software. It is illegal to copy the Software and install that single program for simultaneous use on multiple machines. You may not copy, emulate, clone, rent, lease, sell, modify, decompile, disassemble, otherwise reverse engineer, or transfer this demo, or any subset of the demo. Any such unauthorized use shall result in immediate and automatic termination of this Agreement and may result in criminal and/or civil prosecution. You may not remove, disable, modify, or tamper with any copyright, trademark or other proprietary notices and legends contained within the Software. All rights not expressly granted here are reserved by MagneticSoft. 2.1. RESTRICTIONS OF A DEMO VERSION OF SOFTWARE You can use trial version of Software ONLY 15 DAYS after installation and ONLY FOR TESTING features of Software. Following this period, if you wish to continue to use Software, you MUST order full version. Otherwise you must stop using this Software and remove all files and copies of product from your storage devices. 3. USING A THIRD PARTY CODE This Software is based in part on the source code of AES algorithm implementation by Brian Gladman. The licensing information is provided below. 4. LIMITATION OF LIABILITY THIS SOFTWARE IS DISTRIBUTED "AS IS". NO WARRANTY OF ANY KIND IS EXPRESSED OR IMPLIED. YOU USE IT AT YOUR OWN RISK. THE AUTHOR WILL NOT BE LIABLE FOR DATA LOSS, DAMAGES, LOSS OF PROFITS OR ANY OTHER KIND OF LOSS WHILE USING OR MISUSING THIS SOFTWARE. 5. TERM Installing and using this Software signifies acceptance of all terms and conditions of the license. The license is effective until terminated. You may terminate it at any other time by deleting the Software together with all copies. If you do not agree with the terms of this license you must remove all copies of Software from your storage devices and stop using of the Software. Copyright (c) MagneticSoft 2006-2009. All rights reserved. http://www.magneticsoft.com ----------------------------------------------------------------- Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved. LICENSE TERMS The free distribution and use of this software in both source and binary form is allowed (with or without changes) provided that: 1. distributions of this source code include the above copyright notice, this list of conditions and the following disclaimer; 2. distributions in binary form include the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other associated materials; 3. the copyright holder''s name is not used to endorse products built using this software without specific written permission. ALTERNATIVELY, provided that this notice is retained in full, this product may be distributed under the terms of the GNU General Public License (GPL), in which case the provisions of the GPL apply INSTEAD OF those given above. DISCLAIMER This software is provided ''as is'' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose.