Download

Section categories

Access Control Utilities [1366]
Anti-Virus Utilities [584]
Automation Utilities [694]
Backup and Copy Utilities [243]
Clipboard Management Tools [188]
Command Shells [60]
Compression and Zip File Utilities [292]
Disk Analysis Utilities [273]
Disk Maintenance and Repair Utilities [53]
Explorer Add-ons [101]
Explorer Replacements [97]
File Cataloging Utilities [1531]
File Cleanup Utilities [412]
File Encryption Utilities [501]
File Maintenance and Repair Utilities [534]
File Search Utilities [207]
File Splitting Utilities [183]
File Synchronizing Utilities [154]
Misc Encryption Utilities [155]
Misc Text Editing Tools [123]
Misc Utilities [2767]
Mouse and Keyboard Utilities [217]
Music Utilities [15]
Password Management Utilities [728]
Patches and Updates [42]
PGP Encryption Utilities [68]
Required Components [4]
Required Files [8]
System Analysis Utilities [77]
System Maintenance and Repair Utilities [947]
Text Editors A-G [82]
Text Editors H-P [25]
Text Editors Q-Z [24]
Text Form Editors [15]
Text Search and Replace Tools [74]
Text Viewers [35]

Our poll

How often do you buy software?
Total of answers: 4

Statistics


Total online: 57
Guests: 57
Users: 0

Login form

File Catalog

Main » Files » Utilities » Misc Encryption Utilities

BladeBox Iron Edition 1.1
03.02.2011, 23:52
BladeBox creates virtual encrypted volumes, which are AES-ENCRYPTED files which can be mounted as if they were disk drives (with a DOS drive letter too). Virtual Encrypted Volumes (VEV) are seen and considered by the operating system as if they were actual volumes (drives), they have a drive letter, a volume name, and you can see them inside your My Computer resources and inside the Windows Explorer.BUT actually they are transparently encrypted files on disk. Every time you write or read data to those volumes, the data buffer is transparently encrypted/decrypted on-the-fly. The key concept for security is that data on disk ALWAYS remain encrypted. BladeBox gives System Administrators full control over network deployment of Virtual Encrypted Volumes by providing support for an administrative master password. Volumes can be automatically unmounted after XX (user-defined) minutes of inactivity or they can be quickly and silently unmounted by pressing the proper hot-key (special combination of keys).

Category: Misc Encryption Utilities | Added by: File-Post
Views: 147 | Downloads: 0 | Rating: 0.0/0
Total comments: 0
Only registered users can add comments.
[ Registration | Login ]

Search

Site friends

add site