Category Archives: Encryption Software

Beat Obama’s Bandits With TrueCrypt Free (Open-Source) Encryption

The so called “War on Terror” has long since lost its luster and should be appropriately reclassified as The War of Terror. The U.S. has been singularly impudent in terrorizing the terrorists but instead, it has managed to terrorize the rest of the world using a system of surveillance schemes that have gone off the board. Chalk one up for Al Qaeda – the only winners in this debacle.

In the meantime, Americans continue to live in fear – trading away freedoms for security in a war that is simple unwinnable. Obama, despite his assurances that he would “fight terrorism while maintaining our civil liberties” has been a principle mover in this assault on democracy.

And, the master of the reversal has more –

Obama, in a 2008 election sound bite, drew a sharp contrast with the Bush administration which he proclaimed, offered Americans “a false choice between the liberties we cherish and the security we demand.” And for good measure – for stooping “to spy on citizens who are not suspected of a crime.” It’s a surreal world we live in, is it not?

But why be satisfied with my ramblings? Here’s the video.

image

As America continues its slide into Fascism (eagerly joined in the venture by Canada, Australia, the U.K. and countless other self-advertised “democracies”), the justified expectation held by these governments is – you – yes, you – will take no active part in expressing your outrage at the escalating intrusions into your private life. Sadly, the undermining of democracy, or more to the point, democracy as we though we knew it, continues apace.

As a consequence (hardly the only consequence, of course), encryption technology is once again in the spotlight. And no, using encryption does not mean that one has something to hide.

Sophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Putting Obama and his bad boys aside, here are some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

It happens to us all: Just this past week, I lost not only my house keys (first time ever) – but the USB key attached to the keychain. If you guessed that the drive was encrypted – take a bow.   Smile

TrueCrypt:

TrueCrypt is an outstanding free open source software application for establishing and maintaining an on-the-fly-encrypted volume. On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved – without any user intervention. The program automatically and transparently encrypts in real time.

No data stored on an encrypted volume can be read (decrypted) without the correct password/key file or correct encryption keys. The entire file system is encrypted (i.e., file names, folder names, contents, free space, Meta data, etc.).

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). When you turn off your computer, the volume will be dismounted and files stored in the volume will be inaccessible and encrypted. You may of course, manually dismount the volume.

TrueCrypt offers a number of options – you can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Installation is simple and straightforward – no gotchas here. Lots of steps – but easy steps.

image

image

image

image

image

If you choose “Keyfiles”, be sure you understand the ramifications. This is an extra security step which has limited application for a home user. You do not need to select this option.

image

image

image

image

image

And – Win 8’s File Explorer reports that the volume has been setup successfully. If you expand the graphic below (click), you’ll also notice my first TrueCrypt volume on this HD from May 9, 2006.

image

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

I’ve been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Win 8, Win 7, Vista, XP, Mac OS X, and Linux.

Download at: TrueCrypt

14 Comments

Filed under downloads, Encryption Software, Freeware, Interconnectivity, Open Source, Software, Utilities

Take That Extra Step To Protect Your Sensitive Data With Free AxCrypt Encryption

imageSophisticated and  aware computer users know, that financial data and other confidential information stored on a computer, can easily be subject to intrusive viewing by those not authorized to do so.

Some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

AxCrypt, a free (open source) encryption application which I have reviewed here previously, takes a different approach than many other encryption applications inasmuch as it is not a stand alone executable application – instead, it’s fully integrated into Windows Explorer and is invoked from there. Integration into Windows Explorer makes it an ideal encryption application for less experienced Windows users.

As the following series of screen captures clearly show, AxCrypt integrates seamlessly into Windows Explorer’s context (right click) menu.

Right clicking on the selected file/folder in Windows Explorer, followed by selecting “AxCrypt – Encrypt”, begins the process of encryption.

Click on any graphic to expand to original size.

image

The next step requires the user to enter a protective password.

image

In the following graphic (following successful encryption) you’ll notice the green AxCrypt icon, indicating that encryption is now in force.

image

The decryption process is ever bit as simple –it’s virtually a mirror image of the encryption process.

image

The following graphic illustrates the decryption password box.

image

In the following graphic you’ll notice the green AxCrypt icon no longer shows – indicating that decryption has been successful.

image

Bonus: Built in file Shredder illustrated.

image

Fast facts:

Password Protect any number of files using strong encryption.

Right-click integration with Windows Explorer makes AxCrypt the easiest way to encrypt individual files in Windows.

Double-click integration makes it as easy to open, edit and save protected files as it is to work with unprotected files.

Many additional features, but no configuration required. Just install it and use it.

AxCrypt encrypts files that are safely and easily sent to other users via e-mail or any other means. Self-decrypting files are also supported, removing the need to install AxCrypt to decrypt.

Available languages: English, Danish, Swedish, German, Dutch, Hungarian, Spanish, French, Italian and Norwegian.

System requirements: Windows 2000, 2003, XP, Vista, 2008, Win 7 (32 and 64 bit system support).

Download at: Developer’s site (Axantum Software AB).

It’s not always possible to cover all the features and benefits of an application in a short review article – additional information is available at the developer’s FAQ page.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

2 Comments

Filed under 64 Bit Software, downloads, Encryption Software, Freeware, Geek Software and Tools, Integrated Solutions, Open Source, Privacy, Software, System Security, Utilities, Windows Tips and Tools

Free AxCrypt – Encrypt, Compress, Decrypt in Windows Explorer

imageI was introduced to AxCrypt by my good buddy Glenn Taggart, just over a year ago, and while I don’t currently use this application (I’m a diehard TrueCrypt fan), that doesn’t detract from the fact that this is a sweet encryption application – and free, as well.

AxCrypt takes a different approach than many other encryption applications  inasmuch as it is not a stand alone executable application – instead, it’s fully integrated into Windows Explorer and is invoked from there. Integration into Windows Explorer makes it an ideal encryption application for less experienced Windows users.

As the following series of screen captures clearly show, AxCrypt integrates seamlessly into Windows Explorer’s context (right click) menu.

Right clicking on the selected file/folder in Windows Explorer, followed by selecting “AxCrypt – Encrypt”, begins the process of encryption.

Click on any graphic to expand to original size.

image

The next step requires the user to enter a protective password.

image

In the following graphic (following successful encryption) you’ll notice the green AxCrypt icon, indicating that encryption is now in force.

image

The decryption process is ever bit as simple –it’s virtually a mirror image of the encryption process.

image

The following graphic illustrates the decryption password box.

image

In the following graphic you’ll notice the green AxCrypt icon no longer shows – indicating that decryption has been successful.

image

Bonus: Built in file Shredder illustrated.

image

Fast facts:

Right-click integration with Windows Explorer makes AxCrypt the easiest way to encrypt individual files in Windows.

Double-click integration makes it as easy to open, edit and save encrypted files as it is to work with unencrypted files.

Many additional features, but no configuration required, just install it and use it.

AxCrypt encrypts files that are safely and easily sent to other users via e-mail or any other means. Self-decrypting files are also supported, removing the need to install AxCrypt to decrypt.

Available languages: English, Danish, Swedish, German, Dutch, Hungarian, Spanish, French, Italian and Norwegian.

System requirements: Windows 2000, 2003, XP, Vista, 2008, Win 7 (32 and 64 bit system support).

Download at: Developer’s site (Axantum Software AB).

It’s not always possible to cover all the features and benefits of an application in a short review article – additional information is available at the developer’s FAQ page.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

5 Comments

Filed under 64 Bit Software, Don't Get Hacked, downloads, Encryption, Encryption Software, Freeware, New Computer User Software Tools, Open Source, Software, Utilities, Windows Tips and Tools

TrueCrypt – Free Encryption To The Max

imageSophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

TrueCrypt is an outstanding free open source software application (one I have been using for years), for establishing and maintaining an on-the-fly-encrypted volumes.

On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved, without any user intervention.

image

image

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

Mac OS X version

Graphical user interface for the Linux version of TrueCrypt

XTS mode of operation – XTS is faster and more secure than LRW

As I said, I have been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under 64 Bit Software, Don't Get Hacked, downloads, Encryption, Encryption Software, Encryption Software Alternatives, flash drive, Freeware, Open Source, Software, USB, Utilities, Windows Tips and Tools

EncryptOnClick – Encrypt and Decrypt Files and Folders With A Few Clicks

The article I posted a few days ago – Free Secret Disk – Keep Your Secret Computer Files “Secret”, led to a more than a few reader questions on additional free encryption applications.

So, I’ve retested the updated versions of a number of free encryption applications I’ve recommended in the past few years, and I’ll post on these in the coming days – starting today with EncryptOnClick

EncryptOnClick ( last updated March 08, 2011), is a free program that lets you securely encrypt and decrypt files/folders. The program is very simple to use, and features military grade 256-bit AES encryption.

After you have launched the application, simply select the target file/folder you want to encrypt.

Following the easy interface, type a password for that file/folder which will then be encrypted. To open the encrypted file/folder at a later date, you must type the correct password.

In the following example I’ve chosen to encrypt a folder by clicking on the Folder button…

image

which prompted me to browse and select the target folder.

image

The application took approximately one minute to encrypt this 220 MB folder and its sub folders.

In the following graphic you can see that the file I’ve highlighted, within the encrypted folder, can only be accessed through EncryptOnClick.

Click on graphic to expand to original size.

image

Decrypting the selected folder is just as simple and straightforward.

image

In the following graphic  you can see that the file I’ve highlighted within the folder (following  decrypting), can now be accessed normally.

Click on graphic to expand to original size.

image

Fast facts:

A very secure encryption and decryption method is used (256-bit AES encryption)

Files are both compressed & encrypted, which results in a smaller file

Password protected

Will encrypt single files or all files in a folder

Very simple to use interface

Can be used on a USB key

Fully Unicode enabled so filenames in any language can be encrypted

Will encrypt, decrypt, compress, and uncompress files which can also be opened and decrypted using third party programs like WinZip 9 – provided the correct password is used

Will detect if you’re decrypting a file that is in a temporary folder, and if so, will prompt you to see if you would like to decrypt it into a different folder

Command line parameters can be used

Complete help file

Tip: Run on a Flash Drive by copying the files EncryptOnClick.exe, EncryptOnClick.exe manifest, ExceedZip.dll to a named folder on the Flash Drive.

System Requirements: Windows XP, Vista, Win 7 and NT.

Download at: Download.com

Tomorrow: Free Encrypt Stick reviewed.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under Don't Get Hacked, downloads, Encryption, Encryption Software, Freeware, Privacy, Software, Utilities, Windows Tips and Tools

Conseal Security Takes Portable Device Security To Another Level With Conseal USB

“This tape will self-destruct in five seconds!” – Mission Impossible.

Growing up in the 1960’s, I though that was just the coolest phrase – and the underlying technology, of course. As a way of keeping confidential  information out of the hands of the bad guys, what could be better than that? BOOOM!

Today, safeguarding confidential information is far more complex – and there are many more “bad guys”. Information, in a very real sense, is currency – and the need to protect it is every bit as real as if it were hard currency.

Unfortunately, protecting critical data in an age of extreme data portability (USB sticks, portable Hard Drives, memory cards …. ) against theft, or loss, is exasperated by the very nature of portable technology.

How hard is it to lose a USB key through theft or misadventure – easy (personally, I’ve lost two over the years).

How hard is it to lose a portable Hard Drive through theft or misadventure – easy.

How hard is it to lose a memory card through theft or misadventure – easy.

How hard is it recover any one of the storages devices mentioned? Hard. Hard. Hard.

While it’s true, that both password and encryption applications, offer some protection against unauthorized access should a portable storage device vanish, neither provides absolute protection. Both password cracking, and decrypting applications (and the computing resources necessary), are readily available to those with less than honorable intentions.

What’s needed then, is a technology that not only offers password protection and file encryption, but the ability to remotely destroy data on a non-recoverable device – if it becomes necessary.

I suspect that the Ministry of Defense in the UK, would have been delighted with this type of technology had it been available when, in 2008,  fifty eight Ministry of Defense unencrypted drives – which contained details of troop movements, locations, and travel accommodation, were “lost”.

Certainly, portable media device theft, or loss, is not restricted to organizations; it can just as easily happen at an individual level. For example, in the U.K., in 2008, – 9,000 USB drives were found by dry cleaners in various articles of clothing. It’s safe to say, that data loss and data leakages related to lost or stolen computer portable devices, are now commonplace.

Luckily, Conseal Security has just released a security safety system  that not only includes strong AES encryption, it allows protected devices to be remotely self-destructed, if they are lost or stolen. Moreover, as part of the package the ability to lock devices to specific networks, domains or specific computers, is included. A bonus feature includes a capacity to review all access attempts on a device.

Application setup, including creating an account which provides access to all of the programs features, is straightforward.

image

The initial account password will be emailed to you. The temporary account password in the screen capture shown below, has been changed.

image

Once logged in, you can proceed to manage the portable device attached to your machine.

image

In the following screen shot, you’ll notice I have logged in and entered a name for the attached device.

image

The USB drive I used for this test was quite small (512 MB), so the encryption and registration took less than two minutes.

image

image

As per the message box, no files were accessible on Drive F: (the original drive designation) – instead the files were on Drive G: (the newly concealed drive).

image

Following encryption of the drive’s contents you will have a number of options to choose from, including –

Access Control

You can set up rules to control where and when this device can be unlocked.

image

Alerting

You can set up alerts to email you when this device is used.

image

Self Destruct

You can securely delete the contents of this device if it has been lost or stolen. It will become a blank disk.

image

Unlocking the portable device is an uncomplicated process – as shown in the following screen captures.

image

image

A taskbar popup will notify you on successful completion of the “unlock” process, as illustrated in this screen capture.

image

Fast facts:

Remote self destruct – If your Consealed device is lost or stolen, you can remotely destroy the data it contains. Press a button on a website and the contents of your device will be securely wiped when next inserted.

image

Who’s accessed your data? – View a log of who attempts to unlocks your Consealed device, including who they are and what computer they used. The log shows all access attempts and contains sufficient information for law enforcement officials to uniquely identify the computer used.

image

Define who can access your data – Specify the computers or network domains which can unlock your Consealed device. Also specify what times of the day it can be unlocked. Rules can be changed even when the device is out of your hands.

image

Safe from password guessing attempts – Even fairly complex passwords can be guessed on average within 16 minutes. Conseal’s “Dual Locks” system completely secures your protected data against password guessing attempts. Consealed devices can only be unlocked with permission from a central server.

Warnings of attempted break-ins – Receive email warnings when someone tries to unlock your Consealed device, directly and uniquely identifying the user, where they are, and what computer they used.

Strong encryption – Your data is stored using super-strength 256-bit AES encryption (approved by governments to protect ‘Top Secret’ information).

Takeaway: A very impressive and elegant solution to a potentially disastrous occurrence at a cost that’s appropriate.

Conseal USB Licenses:

Home User – 1 year’s protection. Non-commercial use only. Up to 5 devices £19.95.

Corporate User – 10 devices £140 (for 1 year). 100 devices £99/month. 1000 devices £830/month. 10,000 devices £5950/month.

Conseal Security offers a full no-quibble 14 day money-back guarantee from date of purchase.

System requirements: Windows XP and above.

Devices: You can Conseal literally any USB storage device. This includes memory sticks, USB pen drives, external hard disks, SD / MMC / xD / CompactFlash cards. It also includes all Firewire, eSATA and USB3 devices. Conseal is completely device and manufacturer independent.

Further details, and a 15 day Trial download are available at the developer’s site – Conseal Security.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

3 Comments

Filed under Business Applications, Cloud Computing, Computer Tools, Connected Devices, Cyber Crime, Cyber Criminals, downloads, Encryption, Encryption Software, flash drive, Geek Software and Tools, Software, Software Trial Versions, Surveilance Tools, USB, Windows Tips and Tools

Download Free Encrypt Stick 4.3 – A Digital Privacy Manager

image When talking about encryption applications, my good buddy Glenn Taggart likes to say, “My primary use is encrypting my personal information in the event prying eyes happen upon my stuff.”

I can’t argue with that. Financial data and other privileged information on a computer can easily be subject to intrusive viewing by those not authorized to do so.

Of course, it’s not only those with physical access that can probe a computer for sensitive and confidential information. Internet malware attack statistics show, more and more, that this type of information is targeted by hackers/information thieves, for the purpose of identity theft.

Can it happen to you? The short answer is – you can count on an attempt. The reality is; there is no such thing as a totally secured internet connected computer. All internet connected computers are subject to attack.

As well, many of us have additional files that we may consider sensitive and confidential. Files that we don’t want a spouse, girlfriend, a child, or others, to have ready access to.

To reduce or eliminate the security threat to your sensitive data, the most prudent course for you to follow is to encrypt your data. Data encryption makes the data unreadable unless, or until, decrypted by you.

I’ve just finished testing the recently released Encrypt Stick digital privacy application, which is available in both a free version and a commercial version, and I have to say, I’m very impressed.

Encrypt Stick runs directly (and only), from a USB drive which guarantees that no foot print is left on your machine.

On launching the application, which must be launched from the flash drive to which it was downloaded (or in my case copied), the following screen appears. The process of encryption is very straightforward from there, as the screen captures below indicate.

image

After activation (in this case the free version), you will be prompted for a password.

image

The first time you run Encrypt Stick digital privacy software, you’ll be presented with a quick tutorial which explains the basic steps so that you can get up and running quickly. A very cool idea!

image

image

Please be aware that you must enter your password before you can gain access to the application.

image

Double clicking on the new vault (First Vault), which I’ve created on my D drive, allows access to all of the application’s functions.

image

In this case, I encrypted a test file (application) – TaskBar Repair Tool. You’ll notice I have the option of removing this file (the unencrypted version), from my D drive or, leaving it on the drive as is.

image

The end result is, the test file is now safely encrypted and stored in “First Vault”. To ensure the file was stable, I then launched the application directly from inside the vault.

image

Here’s how the developer describes Encrypt Stick:

Encrypt Stick digital privacy software turns any Flash Drive into a personal Digital Privacy Manager (DPM). The DPM is the key that locks down privacy for your sensitive digital files.

It’s a complete file security system for all your desktops, laptops, storage devices and portable USB devices. Most utilities can do only part of the job. Encrypt Stick software does it all, quicker and easier — without expensive hardware.

This application is very substantial, and includes a vast number of features. However, the free version is limited to 20 MB of storage. Still, an average user should find this limitation acceptable.

Fast Facts – Free version:

Free Downloadable Updates

No Administrator Access Necessary to setup or run Encrypt Stick

Setup and running in under 5 minutes!

Easy to use – no learning curve

Compatible with Windows 2000/XP/Vista/Win7

Compatible with Mac OS 10.4+

Encrypt Stick runs from your flash drive – not your computer

Uses 512bit Polymorphic Encryption

Encryption Algorithm is unique to each Flash Drive

High speed encryption

Protects any type of digital file

Encrypted Vault’s are hidden from other users

Encrypted Flash Drive Storage Space 20mb

Store Encrypted Vaults on any computer

Store Encrypted Vaults on Network Servers

Protects Files and folders on any type of storage device

Unlimited Folders – Create folders within Vaults to organize your files

Automatic Timeout Feature – Never leave your files exposed   5 minutes

Encrypted Virtual Keyboard – Eliminate Key Stroke Logging

And lots more

System requirements: Mac OSX 10.4+, Windows XP, Vista, Win 7.

Download at: the developer’s site (ENC).

As an added bonus, Encrypt Stick includes both a password manager, and a virtual keyboard. Testing of both these additional features was outside the scope of this review, however.

To get a feel for just how easy this application is to run, checkout – Walkthroughs – Encrypting Files To Your Flash Drive, on the developer’s site.

The following are additional free encryption applications we’ve previously reviewed here:

TrueCrypt

AxCrypt

EncryptOnClick

Secret Disk

USB Safeguard

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under Apple, cybercrime, Don't Get Hacked, downloads, Encryption, Encryption Software, Encryption Software Alternatives, Freeware, Mac OS X, Portable Applications, Software, USB, Utilities, Windows 7, Windows Vista, Windows XP