Editor: Think of all of the information on your computer - and what could happen if someone else gained access to it. Virtual encrypted disks, like those in Cryptic Disk, are the best way to protect personal or confidential information on your home computer. Encryption takes place in real time and in no way affects your computer's performance. Any data being written are saved to the encrypted disk in encrypted form, and are decrypted when read.
Encrypted virtual disks are mounted as separate disks attached to a drive letter of your choice, or an ordinary folder on NTFS disks. They do not have any special markers which give away that they are, in fact, an encrypted disk. After mounting the encrypted disk, using it is no different than using ordinary disks. Extremely convenient and good-looking, Cryptic Disk's interface is simple and intuitive even for less experienced users.
The program's cryptographic algorithms guarantee both the integrity of your information and quick access to it. The speedy and reliable 256-bit AES (Rijndael) Algorithm is used in XTS mode, developed specially for encrypting disk data. The program boasts strong Protection against brute force password attacks, in accordance with PKCS #5 v2, as well as against keyloggers.
The only way to access encrypted data is by using key files or the password which only you know.
Even if a disk is lost or stolen, the disk's data will be hidden from access when attached to another computer. The only way to gain access is Cryptic Disk together with the key files and password entered when creating the encrypted disk.
Cryptic Disk can also work in portable mode, which does not require that the disk encryption software be installed on a computer before use.
Professional and corporate users can take advantage of the Professional and Ultimate versions with a rich selection of additional features. Download Cryptic Disk today for the peace of mind that comes with the complete security of disk encryption software!