![]() If you attach the encrypted drive to another computer that does not have USBCrypt software already installed on it, the administrative rights are needed to use the encrypted drive on such a computer. The administrator rights are also necessary to create the Virtual Encrypted Disks. Just like with most other software, the administrator rights are required to install USBCrypt on a computer. Is administrator access needed to use USBCrypt? To protect you from such an unpleasant situation, USBCrypt offers you an option to create a spare key file on your computer. This is the good news the bad news is that if you forget your password, there would be no way to get your files back. ![]() The only way to get access to the files protected with USBCrypt is to provide the correct password. Checking all possible keys would take a long, long time (longer than the age of the Universe). This encryption is very strong: there is currently no realistic method that can break such encryption. (Business customers have the option of using several other encryption algorithms, as well). USBCrypt uses the Advanced Encryption Standard (AES) with the key strength of 128 or 256 bits. How strong is the encryption of USBCrypt? For example, if you've purchased USBCrypt for use in your office, you can take the encrypted USB drive home with you and use it on your home computer without installing the full copy of USBCrypt software on your home computer. USBCrypt puts its software on the encrypted drive, too, to make you able to use the removable drive on other computers, without USBCrypt installed on them. ![]() When you no longer need to work with the private files, you can stop the Virtual Encrypted Disk and it will become locked with your password again. When you open a document or move a file out of the Virtual Encrypted Disk, it gets decrypted automatically on the fly. Any file that you move to the Virtual Encrypted Disk gets encrypted transparently, without you having to do anything special. After you encrypt a drive with USBCrypt, you can enter your password to start the Virtual Encrypted Disk and use it just like any other real disk: you can browse it with Windows Explorer or any other software you have, copy files to it, or move them back to your main hard disk, save documents to the Virtual Encrypted disk and open them when needed, and so on. You decide how large the Virtual Encrypted Disk should be: it can take all of the available space of the host disk, or only a fraction of it. USBCrypt is the "on-the-fly" encryption software, that works by creating a Virtual Encrypted Disk on the host drive and protecting it with the password of your choosing. Any file you put onto the drive E: will be encrypted and decrypted on-the-fly, in the background, as necessary. The drive E: becomes available only after you have entered a valid password. When you encrypt a host disk (such as drive H:) with USBCrypt, it uses a portion of the host disk to create a Virtual Encrypted Disk with its own drive letter (such as drive E:). USBCrypt ™ is a software utility that you can use to encrypt USB and other removable and fixed drives with strong encryption: Other product and company names mentioned in this document may be the trademarks or registered trademarks of their respective owners and are hereby acknowledged. WinAbility, WinAbility.Com, USBCrypt, and "The Way Software Should Be!" are either registered trademarks or trademarks of WinAbility Software Corporation and/or its suppliers in the U.S.A. This document may include technical or other inaccuracies or typographical errors. Any use of the information contained herein is at the risk of the user. The technical information in this document is provided AS-IS and WinAbility Software Corporation makes no warranty as to its accuracy or use. Except as expressly provided in any written license agreement from WinAbility Software Corporation, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. WinAbility Software Corporation may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of WinAbility Software Corporation. Complying with all applicable copyright laws is the responsibility of the user. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted. Information in this document is subject to change without notice. The software described in this guide is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |