BestCrypt software will create and
will support encrypted virtual disks.
These disks are visible as regular
disks with correspondent drive
letters. The data stored on a
BestCrypt disk is stored in the
container file.
A container is a file, so it is
possible to backup a container, move
or copy it to other disk (CD- ROM or
network, for instance) and continue
to access your encrypted data using
BestCrypt.
Any free drive letter in the system
may be used to mount and to open an
encrypted file-container for access.
When the virtual disk is opened, you
can read and write data as if it were
a conventional removable disk.
How does BestCrypt work? BestCrypt
creates a pre-encrypted file called
a container. This container is
created by an encryption algorithm
(Twofish,
Blowfish, Rijndael, or GOST28147-89).
In addition, BestCrypt creates a
logical disk. The container is linked
to a logical disk, and the disk is
opened for access using the unique
container password. All data stored
in the logical disk are stored in the
container in an encrypted form and
transparently accessible for an
authorized person.
http://www.jetico.com
Download File Size:14.6 MB