Iedere dag bieden wij GRATIS software met licentie waarvoor je normaliter moet betalen!
abylon CRYPT in the BOX 2013 werd aangeboden als een giveaway op 22 augustus 2013
De software abylon CRYPT in the BOX is gebruikersvriendelijk en versleuteld automatisch je belangrijke bestanden. Je kunt de bestanden via de Windows verkenner kopiëren naar een speciale CRYPT-map of toevoegen of bewerken in het programma zelf. Om toegang te krijgen tot de data moet de gebruiker eenmalig een wachtwoord invoeren voor zolang het programmavenster open blijft.
Vrije toegang is alleen voor geregistreerde gebruiker beschikbaar. Aanpassingen aan bestanden worden automatisch naar de versleutelde bestanden gekopieerd. De bestandsstructuur biedt gelijktijdige toegang voor meerdere gebruikers, zelfs over een netwerk.
XP, Vista, 7, 8 (x32/64)
25.6 MB
$28.47
Eenvoudig VERSLEUTELEN en ZIPPEN: ondertekenen, versleutelen, comprimeren en kopiëren! De veiligheid van gevoelige gegevens worden vaak verwaarloosd. Alleen versleuteling biedt een volledige bescherming van bestanden op je computer of die worden verzonden per email. abylon BASIC is een pakket om te versleutelen, te ondertekenen, te comprimeren, te zoeken, bestanden en mappen te kopiëren of te verplaatsen.
Je data eenvoudig beveiligen. Onversleutelde data is een gemakkelijk doel voor onbevoegden. abylon CRYPTDRIVE biedt een gemakkelijke manier om je documenten, video’s, foto’s en programma’s te beveiligen d.m.v. het aanmaken van een versleutelde container, met internationale algorithme standaards zoals AES (256 bit) of Blowfish (448 bit).
De activiteiten op de computer en het gebruik van internet laten veel digitale sporen achter. De normale functies van het besturingssysteem verwijderen deze sporen niet volledig. Om deze data echt te verwijderen overschrijft de abylon SHREDDER de bestanden, internetsporen en vrije ruimte tot 35 keer.
Yes it's FREE today....but what happens if you lose the GAOTD KEY?
Besides that can't see any outstanding feature which makes it a better choice when compared to freeware alternatives out there...
THUMBS DOWN!!!
BEST FREE ALTERNATIVES (besides TrueCrypt & Axcrypt)
First of all download this FREE GEM designed to scan any documents in your PC containing unprotected sensitive data like passport numbers, student ID numbers, credit card number, mobile phone numbers etc...
http://code.google.com/p/coe485-101
Then.....
* A+ Folder Locker Free Edition (==> My Personal First Choice)
Amazing FREE tool designed to keep hackers and other prying eyes away from your sensitive data stored in your PC.
In short it creates new LOCKERS where you can put any files, folders, and/or programs you want to be protected.
Each locker is securely protected through advanced encryption algorithms and multilevel anti-hacking security, whose degree may increase should hacking attempts continue.
It sports a powerful built-in Virtual Keyboard, which makes pretty impossible to capture users' pattern passwords even in systems infected by keyloggers: cool, isn't it?
Can also be used to permanently delete any Files & Folders of your choice from your system, without any chance of being recovered by any professional file recovery tool out there.
http://www.giantmatrix.com/products/aplus-folder-locker-free-edition/features
* Secret Space Encryptor (also suitable for Android Users)
http://paranoiaworks.mobi/download/downloads.html
Full Online Tutorial:
http://paranoiaworks.mobi/android_asset/~sse/en/help/
* (Portable) Encoding Decoding Free (==> Cool FREE Italian App)
http://elefantsoftware-en.weebly.com/encoding-decoding.html
* Toolwiz BSafe
http://www.toolwiz.com/products/toolwiz-bsafe
* Safetica Free
http://www.softpedia.com/get/Security/Encrypting/DisCryptor-Personal.shtml
So 30 BUCKS??? ==> LOL <== !!!!!!!!!!!!!!!!!
Enjoy!!!
I used this one time before on a giveaway.
This is one bizarre piece of software that should be used with caution. Although it appears innocent enough and installs quite easily, it has at least one nasty quirk -- it could keep programs from working.
In my case it crippled a couple programs for no apparent reason and kept them from opening and that was before I even used this program -- I had merely installed it and was getting ready to test it.
And how do I know it was this program? Upon uninstalling it everything went back to normal and my programs worked again.
In addition, I found a copy of other little spooky things. Drag and drop? Drag all you like but you ain't dropping -- it doesn't work. Copy and paste, maybe but drag and drop is out.
Second, if you don't shut down the program it stays open. And that's open as in "hey, come on in everybody else!". It doesn't stop operations after a period of disuse so you'd best be on guard.
Pros
*Supports all file types
*Once encrypted, files can easily be viewed/edited and then are automatically re-encrypted
*Batch encryption
*Uses AES 256-bit
Cons
*Doesn't have quite a few features found in other encryption software
*Is a security risk due to how it behaves
Free Alternatives
Review of best free encryption program for Windows
Final Verdict
Click here for final verdict and full review
Having been caught out in the DOS days with a program of this nature I am very wary of them.
In my case a suite of 29 programs included a proprietary compression module; in those days discs used to quite regularly develop surface faults with ensuing loss of the program that resided there, this happened to me with this suite which required all modules for it to load.
Fortunately my friend had a copy of this suite, unfortunately all 29 EXE and COM modules had a virus attached to them and I had to hand clean them using a hex editor to uncompress my files.
The moral being, don’t rely on a program to retrieve your data unless you are absolutely confident that the program will be available in the future, preferably for free.
With encrypting software, once again the question comes up: what happens to your encrypted files if the encryption program should crash or otherwise cease to work correctly?
The same question comes up but usually the question is poorly answered. It is assumed that it is the most important files are the files that are encrypted by the computer user. Hence, if the means to un-encrypt a file is lost because the program used to encrypted in the first place no longer works then it is possible for one's encrypted files to remain locked unless the user purchases program used to encrypt the files in the first place. The same question is usually asked and is answered was some variation of the above. The answer is inadequate because just purchasing the encryption program at a later date will not necessarilyl bail the user out of hot water. Those of us that have been around for a while have seen encryption programs change as they mature. As an example take the case of: Suppose that with a program's progressive changing of versions, that the algorithms for encryption also changes - perhaps subtly but nevertheless there are changes in the algorithm. In this case one may be holding a perfectly new and up-to-date file encryption program but with the changing encryption algorithms used in a newer version of the program may still leave encrypted files locked. The best way to guard against this happening is to purchase the encryption program at the same time that the program is being offered by GOTD or at the same time that one wishes to begin using a program to hide a files true meanings. Practically this means that extensive testing of a purchased encryption program at the time that it is first put into use is absolutely necessary. Without this testing programs used to encrypt files may still leave critical files unusable.
As we all have found out the version of a program offered to the GOTD audience is often are not identical to the version of the program being sold on the vendor's website to the general public. Often times the differences between the GOTD offering and offering available through the website differ extensively. The implications of this is purchase the program from the vendor's website at the very time that one intend to start using the program. The next important step is to extensively test the same program intended for file encryption and recovery without limiting testing to a single type of file. Safety dictates that one just not limit tests to the single type of file, for example do not limit tests to " *.exe, or *.zip, or any other *. files type". If one wishes to ensure encryption of a file and decryption of the same file result in exact duplications of the tested file. The program should be tested with all file suffixes that one intends to use to encrypt and decrypt. It is difficult to be too cautious - especially when using an encryption program that lacks a long history of successful use.
Fotoflex, heel bijzonder. Nog net voor bedtijd kunnen meenemen.
Willem B.
Save | Cancel
Off Topic.
Interactieve website geeft een beeld van het allerkleinste tot het allergrootste:
http://scaleofuniverse.com/
Save | Cancel
waar o waar heb ik zoiets ooit eerder gelezen? de hoofdpersoon steeds in de gaten houden door een groot televisiescherm aan de muur.
http://nos.nl/audio/542939-kijkt-u-naar-een-smarttv-de-smarttv-kijkt-n
aar-u.html .
Save | Cancel
leuke animatie van google met claire de lune en claude debusy
Save | Cancel
http://newestdownload.blogspot.be/2013/08/balesio-fileminimizer-suite-7-pc-free.html
Alleen vandaag.
Save | Cancel
De hamvraag bij dit soort programma's is altijd: stel dat ik het programma kwijtraak, wat dan? Kan ik dan nog bij mijn versleutelde bestanden? Bij freeware kan je het programma gewoon weer installeren. Bij gekochte software moet je maar afwachten of de leverancier nog steeds levert. En of zijn huidige versie overweg kan met uw tien jaar geleden versleutelde bestanden. In dit geval aarzel ik het programma aan te bevelen, want ik zie op de site niet staan of er een gratis leesversie is, waarmee u uw versleutelde bestanden altijd kan lezen. Dat laatste is trouwens ook handig als u versleutelde bestanden aan derden wilt sturen.
Save | Cancel