Ogni giorno offriamo programmi GRATUITI che altrimenti dovresti comprare!
abylon CRYPT in the BOX 2013 era disponibile come app gratuita il 22 agosto 2013!
Il software abylon CRYPT in the BOX permette di crittografare automaticamente i file importanti. È possibile copiare i file in una speciale cartella cifrata o aggiungere/modificare i dati direttamente all'interno del programma. Per accedere ai file sarà dunque necessario inserire una password che impedirà gli accessi non autorizzati.
L'accesso gratuito è disponibile solo per gli utenti registrati. Le modifiche ai file originali vengono copiate automaticamente nella cartella cifrata. La struttura file-based consente l'accesso simultaneo ai dati da parte di più utenti autorizzati, anche in rete.
XP, Vista, 7, 8 (x32/64)
25.6 MB
$28.47
La sicurezza dei dati sensibili viene spesso trascurata, anche se in realtà crittografare foto o altri documenti con algoritmi sicuri come AES o Blowfish è molto semplice. abylon BASIC è una collezione di strumenti per la crittografia, la firma, la compressione, la ricerca, la copia e lo spostamento di file e cartelle. Per la crittografia, il software usa l'algoritmo Blowfish e la crittografia AES con password, smart card, certificati e chiavi USB.
Proteggete facilmente i vostri dati. I file non cifrati sono un bersaglio facile per gli accessi non autorizzati. abylon CRYPTDRIVE offre la maniera più semplice per mettere in sicurezza i vostri documenti, i vostri video, le vostre foto ed i programmi, creando un contenitore cifrato con algoritmi standard riconosciuti a livello internazionale, come AES (256 bit) e Blowfish (448 bit).
Il lavoro al computer e la navigazione su Internet lasciano un mucchio di tracce che il sistema operativo non provvede a cancellare del tutto. Ciò permette a determinati tipi di software di recuperare documenti, foto, video e tracce della navigazione anche a diverse settimane dalla loro cancellazione ordinaria.Per cancellare realmente tutti questi dati una volta per tutte, basta usare abylon SHREDDER che sovrascrive i file eliminati per ben 35 volte.
Yes it's FREE today....but what happens if you lose the GAOTD KEY?
Besides that can't see any outstanding feature which makes it a better choice when compared to freeware alternatives out there...
THUMBS DOWN!!!
BEST FREE ALTERNATIVES (besides TrueCrypt & Axcrypt)
First of all download this FREE GEM designed to scan any documents in your PC containing unprotected sensitive data like passport numbers, student ID numbers, credit card number, mobile phone numbers etc...
http://code.google.com/p/coe485-101
Then.....
* A+ Folder Locker Free Edition (==> My Personal First Choice)
Amazing FREE tool designed to keep hackers and other prying eyes away from your sensitive data stored in your PC.
In short it creates new LOCKERS where you can put any files, folders, and/or programs you want to be protected.
Each locker is securely protected through advanced encryption algorithms and multilevel anti-hacking security, whose degree may increase should hacking attempts continue.
It sports a powerful built-in Virtual Keyboard, which makes pretty impossible to capture users' pattern passwords even in systems infected by keyloggers: cool, isn't it?
Can also be used to permanently delete any Files & Folders of your choice from your system, without any chance of being recovered by any professional file recovery tool out there.
http://www.giantmatrix.com/products/aplus-folder-locker-free-edition/features
* Secret Space Encryptor (also suitable for Android Users)
http://paranoiaworks.mobi/download/downloads.html
Full Online Tutorial:
http://paranoiaworks.mobi/android_asset/~sse/en/help/
* (Portable) Encoding Decoding Free (==> Cool FREE Italian App)
http://elefantsoftware-en.weebly.com/encoding-decoding.html
* Toolwiz BSafe
http://www.toolwiz.com/products/toolwiz-bsafe
* Safetica Free
http://www.softpedia.com/get/Security/Encrypting/DisCryptor-Personal.shtml
So 30 BUCKS??? ==> LOL <== !!!!!!!!!!!!!!!!!
Enjoy!!!
I used this one time before on a giveaway.
This is one bizarre piece of software that should be used with caution. Although it appears innocent enough and installs quite easily, it has at least one nasty quirk -- it could keep programs from working.
In my case it crippled a couple programs for no apparent reason and kept them from opening and that was before I even used this program -- I had merely installed it and was getting ready to test it.
And how do I know it was this program? Upon uninstalling it everything went back to normal and my programs worked again.
In addition, I found a copy of other little spooky things. Drag and drop? Drag all you like but you ain't dropping -- it doesn't work. Copy and paste, maybe but drag and drop is out.
Second, if you don't shut down the program it stays open. And that's open as in "hey, come on in everybody else!". It doesn't stop operations after a period of disuse so you'd best be on guard.
Pros
*Supports all file types
*Once encrypted, files can easily be viewed/edited and then are automatically re-encrypted
*Batch encryption
*Uses AES 256-bit
Cons
*Doesn't have quite a few features found in other encryption software
*Is a security risk due to how it behaves
Free Alternatives
Review of best free encryption program for Windows
Final Verdict
Click here for final verdict and full review
Having been caught out in the DOS days with a program of this nature I am very wary of them.
In my case a suite of 29 programs included a proprietary compression module; in those days discs used to quite regularly develop surface faults with ensuing loss of the program that resided there, this happened to me with this suite which required all modules for it to load.
Fortunately my friend had a copy of this suite, unfortunately all 29 EXE and COM modules had a virus attached to them and I had to hand clean them using a hex editor to uncompress my files.
The moral being, don’t rely on a program to retrieve your data unless you are absolutely confident that the program will be available in the future, preferably for free.
With encrypting software, once again the question comes up: what happens to your encrypted files if the encryption program should crash or otherwise cease to work correctly?
The same question comes up but usually the question is poorly answered. It is assumed that it is the most important files are the files that are encrypted by the computer user. Hence, if the means to un-encrypt a file is lost because the program used to encrypted in the first place no longer works then it is possible for one's encrypted files to remain locked unless the user purchases program used to encrypt the files in the first place. The same question is usually asked and is answered was some variation of the above. The answer is inadequate because just purchasing the encryption program at a later date will not necessarilyl bail the user out of hot water. Those of us that have been around for a while have seen encryption programs change as they mature. As an example take the case of: Suppose that with a program's progressive changing of versions, that the algorithms for encryption also changes - perhaps subtly but nevertheless there are changes in the algorithm. In this case one may be holding a perfectly new and up-to-date file encryption program but with the changing encryption algorithms used in a newer version of the program may still leave encrypted files locked. The best way to guard against this happening is to purchase the encryption program at the same time that the program is being offered by GOTD or at the same time that one wishes to begin using a program to hide a files true meanings. Practically this means that extensive testing of a purchased encryption program at the time that it is first put into use is absolutely necessary. Without this testing programs used to encrypt files may still leave critical files unusable.
As we all have found out the version of a program offered to the GOTD audience is often are not identical to the version of the program being sold on the vendor's website to the general public. Often times the differences between the GOTD offering and offering available through the website differ extensively. The implications of this is purchase the program from the vendor's website at the very time that one intend to start using the program. The next important step is to extensively test the same program intended for file encryption and recovery without limiting testing to a single type of file. Safety dictates that one just not limit tests to the single type of file, for example do not limit tests to " *.exe, or *.zip, or any other *. files type". If one wishes to ensure encryption of a file and decryption of the same file result in exact duplications of the tested file. The program should be tested with all file suffixes that one intends to use to encrypt and decrypt. It is difficult to be too cautious - especially when using an encryption program that lacks a long history of successful use.
utile o non utile? dipende da ogni singolo…. certo bisogna prestare attenzione a installare e disinstallare in continuazione programmi, si riempie il registro di chiavi inutili, ci si ritrova con un sacco di programmi che si auto impostano all’avvio, che tentano di collegarsi alla rete x aggiornamenti di solito gia di impostazione…. tutto questo e altro provocano rallentamenti e possibili crash, ma specialmente fate ricerche in rete prima di installare sulla serietà della casa produttruce, e ogni tanto sbirciate sul server americano di gaotd, li postano i commenti degli utenti piu velocemente che qua in italia…. a proposito moderatore, ma ti dai una sveglia a velocizzare la pubblicazione dei commenti????
Save | Cancel
Il software ha buone potenzialità come l'utilizzo di un dispositivo USB (quindi cellulari, MicroSD....)quale chiave per criptare i file.
Purtroppo il funzionamento è macchinoso ed impreciso:
- per ben 2 volte ho estratto la chiave USB e il software non ha bloccato in automatico l'accesso ai file...
- I file vengono salvati in una cartella (quindi visibile a chiunque) e quindi l'utente potrebbe venire "obbligato" a rivelare la password. Bisognerebbe avere un solo file incrementale che all'apertura del software diventi un drive virtuale!
Save | Cancel