Every day we offer FREE licensed software you’d have to buy otherwise.

CRYPTDRIVE 7.3 Giveaway
$29.95
EXPIRED

Giveaway of the day — CRYPTDRIVE 7.3

Container-based, encrypted drive for files and programs
$29.95 EXPIRED
User rating: 349 (34%) 674 (66%) 54 comments

CRYPTDRIVE 7.3 was available as a giveaway on March 24, 2009!

Today Giveaway of the Day
$24.99
free today
Convert and decrypt eBooks purchased from Amazon Kindle, Kobo, Sony etc.

Unencrypted data is an easy target for unauthorized persons, but abylon CRYPTDRIVE offers a simple way to protect you documents, videos, photos and programs.

It creates a software encrypted container, using the international algorithm standards AES (256 bit) or Blowfish (448 bit).

System Requirements:

Pentium or compatible; 256 MB RAM; 30 MB; Windows NT, 2000, XP, Vista 32 und 64bit, 2003 or WTS; display resolution min. 1024x768 Pixel; smartcard reader and smartcard or USB Token (optional)

Publisher:

Abylonsoft

Homepage:

http://www.abylonsoft.com/cryptdrive/index.htm

File Size:

9.91 MB

Price:

$29.95

Comments on CRYPTDRIVE 7.3

54 comments
(will not be published)
You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Cool, Shame they dont have a suite :D.
Indeed i want this + Lots of other stuff from abylon!

Reply   |   Comment by Steen  –  6 years ago
Did you find this comment useful? yes | no (0)

Thank You, bobbie jones!
I usually try & research programs before I attempt to download them.
It has been many years & years ago, that I downloaded EasyCrypto.
Personally, I've never had a problem at all with the program, especially none of the problems that that "forum", you gave a link to, talks about.
I have to admit, I've not tried updating the program in many years, or tried to keep updated on it, info-wise.
Better to be safe than sorry, I uninstalled it off my computer, then deleted the installer, & the left-over folder under the Programs folder - luckily no problems 86'in it.

Thanks for your posts, link, & all of your helpful info, bobbie jones!
Take Care!



......................Original Post......................
Reply To: #22 > llvllaxX

Friend I deeply regret having to advise you that EasyCrypto is “MALWARE” that contains a “Call_Home” Trojan. The Vendor use to provide a “Re-Mover” at the vendors website but the “re-mover” did not work an the ONLY way of completely re-moving the Trojan was to Re-Format.
Re-search this yourself. Please do not take my word for this information because you do not know me. Research it yourself. There may still be a few Archived topics on this subject somewhere on the internet. It was about 10 or 12 years ago that the Trojan was revealed so I can only suppose that the information was Lost over the passing years. Today I seriously doubt if you will find anyone who has knowledge of this.
This is what I ment in a previous post regarding “hidden Backdoors”.
Comment by bobbie jones — March 24th, 2009 at 1:34 pm


Reply To : # 22

Friend here is an old link to some information regarding the spyware in EasyCrypto.

http://www.wilderssecurity.com/showthread.php?t=13100

The Posters were “Awear” of the problem.
Comment by Bobbie Jones — March 24th, 2009 at 1:42 pm

Reply   |   Comment by llvllax X  –  6 years ago
Did you find this comment useful? yes | no (0)

Mike (#51)

1. The vast majority of discussions on this topic was about crackers (hackers to the uninformed), not about nosey 10 year old kids.
2. You can still encrypt a file on external storage, I figured that would be common-sense. My mistake.
3. If you encrypt the file on an external drive or dvd it is NOT on your computer for a cracker to get his hands on. If you stored it on a SDHC thumbdrive for example and put it in your lockbox in the closet, how is somebody going to get their hands on it?? Yes, somebody might possibly break in and steal it, but guess what, they don't need the file, they have all your paper bills and documents that are in shoeboxes in the closet, drawers in the study etc. Amazing how that is...
4. Did I say EVERYONE keeps porn? It was simply an example. No not everybody stores porn. But what else is there to hide?? If you store your credit card numbers and financial data ( on a personal, not business level) on the computer, you're asking for trouble anyways. And if you're running a business, you're not going to be relying on programs like we're talking about here anyways. At least I hope MY financial institutions aren't relying on $30 programs and freeware to protect my info. Don't get me wrong, I'm a freeware nut, love it, live for it, spend TOO many hours looking for it, but keeping something so important on machines we THINK are safe but know are attacked regularly is nuts.

I run 2 anti-virus programs piggyback, I have no less then a half-dozen spyware/malware scanners that I run religiously, and 3 rootkit scanners, on top of two guards that run at boot watching for changes to my registry and browser ect. and I KNOW without a doubt I still have viruses on my computer. If you spend any amount of time on the net you have them, no matter what you're running for safety. So WHY keep files on your computer when it is so simple and easy to encrypt them, put them on a TINY little SD card and put it where it can't be accessed? I would much rather have it sit in a lockbox or drawer even for that matter waiting for a snoopy kid to find it and give up on it, then to leave the info in a "secure" partition or file on my computer so some cracker can work on it in his spare time.

We were talking about people breaking the encryption, crackers, not family members snooping which is the only other obvious choice here, and if the file is not on the computer, it can't be cracked.

I'll take my $10 4GB SDHC card over your encrypted partitions and files any day of the week. Or my 20GB pocket drive, or my 320GB external drive with the switch set to OFF. The files if I choose to, can still be encrypted for extra protection, and it's not actively connected to the computer so it can be worked on and opened by bad people.

I appreciate your comment in return, and your vivid imagination, but I hope you're not handing out advice like that to paying customers. Have a nice day.

Reply   |   Comment by Dan  –  6 years ago
Did you find this comment useful? yes | no (0)

Dan @ #48 - "If you do not want something ripped from your computer, don't have it on there, it’s that simple. Take your porn or whatever you need to “hide” from prying eyes, and put it on discs, or pocket drives, or an external hard-drive and simply unplug it. It doesn't matter what program you use to hide your information, if somebody wants it bad enough, if the feds show up and kick down your door, it’s gonna be found. The answer is simply to NOT have it on your computer in the first place."

Hi Dan - I can't help thinking you just shot yourself in the foot with that comment - what happens if the CD / DVD / External Drive etc. is found by someone else ?
Without a password at some point - either Zip OR Encryption - all the files are not only viewable BUT ALSO can be copied to other machines without the owner's knowledge !!!


If you had a pile of cash - would you leave it in an open drawer that everyone has access to OR would you LOCK IT AWAY - preferably IN A SAFE ???

Using Window XP's "Lock your personal files" within Control Panel/Users/Password - YOU CAN PREVENT PRYING EYES - even if the hard drive is viewed on a separate PC as a slave etc. BUT this will only cover the files within the Documents & settings folder - anything outside of this folder will be open to view as usual ! This also means that the files will never leave the owner's PC without their knowledge !

I've been building / upgrading & repairing PC's for nearly 20 years - since the days of Windows 2.0 & 3.1 etc. Windows may have changed BUT the one thing that's stayed the same is how EASY it is to copy from ANY HARD DRIVE once it's inserted into a PC as a slave. - it literally becomes a part of the computer SO ANYTHING not "LOCKED DOWN" on the SLAVE DRIVE can be opened or copied onto the MASTER DRIVE with no fuss whatsoever & it only takes seconds to connect the drive !

Obviously it's even less safe if you transfer the files to DVD etc. Un-Protected. Not to mention the fact that a single DVD - lost or damaged means the data is LOST FOREVER - these should be used for BACKUP PURPOSES ONLY & even then - if it is sensitive data either .Zip protect it or if you are using "Backup Software" - Enable the Password Function !

You don't need to be a "Hacker or a Cracker" to rip the data from an open DVD - just a computer user -
from 8yrs to 108 - so your advice is probably bordering on DANGEROUS as far as FILE SAFETY is concerned !!!
Better advice would be to try to keep all of your sensitive files TOGETHER in ONE MASTER FOLDER with all of the data in Sub-Folders within - that way - you only need to protect the one folders contents & this then protects everything required. It also means that - should you wish to back-up or move the data - the MASTER FOLDER can be Zipped ( I prefer .Rar myself - WinRar ) & locked without the worry of several files with several passwords etc.


One FINAL POINT that's not been mentioned today is ...
INTERNET SECURITY - II IS ESSENTIAL TO HAVE SOME - otherwise it's not just people in the same room as your PC that can see your files BUT people ANYWHERE IN THE WORLD !!!!
I personally recommend COMODO Internet Security ( currently v3.8 ) which includes a FULL Anti-Virus & FULL FireWall & is 100% FREE !!!
( There is a $39 version BUT this uses the EXACT SAME SOFTWARE - you are just paying for 24/7 instant online backup support + 1 other program ) - THAT'S HOW FULL THE SOFTWARE IS !!!
http://personalfirewall.comodo.com/index.html

. . . Also - NOT EVERYONE has PORN on their PC's - some of us just have personal DATA like finances etc. that we don't want others to see !

I hope this has been of use to at least some people.

As has been mentioned before - YOU DON'T HAVE TO SPEND A SINGLE PENNY to protect yourself & your files - CERTAINLY keep the VISA CARD locked away :o)

- M!ke -
( Macs-PC )

England
UK
:o)

Reply   |   Comment by M@CS-PC  –  6 years ago
Did you find this comment useful? yes | no (0)

well i dont see difference after instalin then free trucrypt
so i will stay with trucrypt but anyway THANX for free try!

Reply   |   Comment by kwiaty  –  6 years ago
Did you find this comment useful? yes | no (0)

I created a restore point before installing this software. Shortly thereafter, I uninstalled the software, then tried to use the restore point I created. System restore reported failure, both with the point I had just created, as well as one farther in the past. System restore was working perfectly before installing CryptDrive.

Reply   |   Comment by tom  –  6 years ago
Did you find this comment useful? yes | no (+1)

I don't think there are too many files somebody wants to hide from crackers (yes, the correct term is cracker, not hacker, hackers are simply computer geeks, programmers and such, the term has been misused for ages) that will not fit on a SDHC or other removable media. If you do not want something ripped from your computer, don't have it on there, it's that simple. Take your porn or whatever you need to "hide" from prying eyes, and put it on discs, or pocket drives, or an external hard-drive and simply unplug it. It doesn't matter what program you use to hide your information, if somebody wants it bad enough, if the feds show up and kick down your door, it's gonna be found. The answer is simply to NOT have it on your computer in the first place. Hacker by the way comes from the term "hacking away" at something, which refers to programmers spending countless hours writing code. Cracker on the other hand, is the term for somebody that "cracks" this code to find ways around or into a program. Thanks for the free premium programs GOTD!!

Reply   |   Comment by Dan  –  6 years ago
Did you find this comment useful? yes | no (-2)

Okay, according to Sarah Dean's comparison chart for Win 2000,XP,Vista the number one software is Teledisk (pg6) followed by TrueCrypt(pg7) (Trend Micro ALert noted above should be considered with TrueCrypt) TrueCrypt Gold is listed but failed to supply answers so not possible to rate them.
Teledisk is a Polish software and can be found here in English
http://www.televox.pl/en/index.php

Rick S.

Reply   |   Comment by Pastor_Rick  –  6 years ago
Did you find this comment useful? yes | no (0)

Hey badad2d, #39, duh! Did you actually try reading any of the install instructions that are posted with every download on this website that say "must be downloaded and installed today (by midnight)"???
I guess if you really need that program, try buying it!

Reply   |   Comment by VCR_flashing_12:00  –  6 years ago
Did you find this comment useful? yes | no (-1)

hi badad2d, sorry it's too late....... if you read the README document, and read just below the download link above, it says "CRYPTDRIVE 7.3 is available as a Giveaway of the day! You have 3 hours 55 minutes to download and install it" where the 3 hours 55 mins refers to the time left out of the 24hours you get to install the program.

You have to install the giveaway within a specified time. If you don't you lose the chance of getting a full version product.

It's clearly labelled as such.

regards

WR

Reply   |   Comment by Treat  –  6 years ago
Did you find this comment useful? yes | no (+1)

WARNING!!!

If you use this and have some major problem down the road with your system, you very well will loose YOUR DATA.

If you're seriously thinking about using this, then you MUST buy a copy of the program and keep a universally installable copy of the program and keys in a safe place. Otherwise, if you used the GOTD download, later you may be unable to locate the this program and/or buy a key online.

Please don't say "it's a good deal because it's free" or "don't look a gift horse in the mouth" because just like a free horse could have rabies, this could end up biting you and killing your data.

What this offer should have been is a "trial only" and a warning that you better buy it with the KEY if you intend to use it because after today, you simply WON'T be able to reinstall this version if you need to, AND there are no guarantees that this will be available anymore.

BELIEVE ME, I was bitten on something that I BOUGHT before 2000 ... and it had a built in Y2K bug, and instead of a free Y2K upgrade, the manufacturer played games and left me and thousands of others hanging with no way to export data out of the program.

Reply   |   Comment by Max  –  6 years ago
Did you find this comment useful? yes | no (0)

@badad2d You have to install it the very day it is offered. The installer work only on the day offered.

Reply   |   Comment by K.L.Martin  –  6 years ago
Did you find this comment useful? yes | no (0)

They state the bits of encryption you use, but can you choose others? If not, this is so out of the question. Not that I need it anyway, but wow... Dumb.

Reply   |   Comment by -(A)-  –  6 years ago
Did you find this comment useful? yes | no (0)

#17 and #33 and #35
I installed from the download on the abylon site and copied the ini file from the G.o.t.D. download into the folder. That gave me a registered version. So I believe you can reinstall if you need to.

#14
Install onto a USB drive is working. I tried it.

I like in particular that they support card based security solutions too. True Crypt and others are missing that option so imho that makes CryptDrive the superior product. If you can only use passwords choose as you wish. They are all using the same encrytion.

Reply   |   Comment by nobody123  –  6 years ago
Did you find this comment useful? yes | no (+2)

There's a nice, free, seemingly efficient encryption package called EncryptOnClick that will encrypt individual files or all files within designated folders.

Reply   |   Comment by flitexn  –  6 years ago
Did you find this comment useful? yes | no (0)

hey ! i downloaded swfdecompiler yesterday, didnt open until today ! couldnt open file ,said it was out of date !!!!that sucks within ONE DAY !! can anyone help with this ???? please !!! thx

Reply   |   Comment by badad2d  –  6 years ago
Did you find this comment useful? yes | no (-12)

Reply To : # 22

Friend here is an old link to some information regarding the spyware in EasyCrypto.


http://www.wilderssecurity.com/showthread.php?t=13100


The Posters were "Awear" of the problem.

Reply   |   Comment by Bobbie Jones  –  6 years ago
Did you find this comment useful? yes | no (+1)

Reply To: #22 > llvllaxX


Friend I deeply regret having to advise you that EasyCrypto is "MALWARE" that contains a "Call_Home" Trojan. The Vendor use to provide a "Re-Mover" at the vendors website but the "re-mover" did not work an the ONLY way of completely re-moving the Trojan was to Re-Format.
Re-search this yourself. Please do not take my word for this information because you do not know me. Research it yourself. There may still be a few Archived topics on this subject somewhere on the internet. It was about 10 or 12 years ago that the Trojan was revealed so I can only suppose that the information was Lost over the passing years. Today I seriously doubt if you will find anyone who has knowledge of this.
This is what I ment in a previous post regarding "hidden Backdoors".

Reply   |   Comment by bobbie jones  –  6 years ago
Did you find this comment useful? yes | no (+4)

I use AXCrypt, based on what a cryptographic expert on Wilders had to say a while back.

I've got CryptDrive downloaded and installed. It seems to work well. I've got some junk files that I was ready to delete. I encrypted them with a 12 digit password. The encryption was done fairly easily and quickly. Decryption was just as smooth. No glitches and the files are undamaged.

That isn't much of a test, but I have no way to try to break into encrypted folders. Nor, I imagine do many other reviewers. I'll keep AXCrypt on my desktop (which has the only stuff worth hiding)

CryptDrive will stay on my laptop until I hear from experts that it's unsafe, or has a built in back door (which I doubt).

Reply   |   Comment by Chuck  –  6 years ago
Did you find this comment useful? yes | no (0)

Not at all useful if your the only person whoever uses your computers. (literally). My systems one user only & password protected at login like I'd expect everybody's to be. Thats plenty for me but thanks for this offer just the same.
However, if I was to use an encryption application, I's use an open source one like True Crypt or AXCrypt. Never do this with a program you can't reinstall unless you pay for it & this one isn't worth $10, no less $30. It's ugly as sin & as cheesy an offer as I've ever seen here in over a year of daily visits.
Like I've said 1,000 or more times, free or a day isn't always a good thing, especially if theres better, always freeware thats better to begin with. Sometimes free really is better. Just check out AXCRypt to see & decide for yourselves.

Reply   |   Comment by ww2vet56  –  6 years ago
Did you find this comment useful? yes | no (-5)

I prefer dsCrypt - no install and only 25KB

http://members.ozemail.com.au/~nulifetv/freezip/freeware/

It doesn't create an encrypted volume on your hard drive but to protect the odd file it should suffice. To protect an entire folder you'd have to zip it, then encrypt it...

Reply   |   Comment by rezidue  –  6 years ago
Did you find this comment useful? yes | no (0)

System: AMD Athlon 64X2 4000+~4 gig RAM~Seagate 1TB HDD~Windows XP sp3:Just about every person prior to me is advocating True Cript(Which I use BTW) However, I downloaded this program and set about encripting a MS Word document.(*.doc)....Hmmmm well its encripted and sits there. So yes ok this program works like the company who produce it say it will, do I like it, however? No, I cant say I do. My biggest worry is what if I have to format or reload my Windows, ( I will not mention the pro's and cons of open sourse code or anything technical) I need to state that this program is not free, which means I would have to BUY it if I wanted to access my encripted documents, once my windows was reloaded....So, here I have to say that although the program works and even if its a little akward to use, I'll pass it by today, thanks but no thanks.

Reply   |   Comment by Argonaught  –  6 years ago
Did you find this comment useful? yes | no (+1)

Thanks GOTD but http://www.truecrypt.org/ is far better. I use it on my HD as well as my USB Drives. It is very secure and free.

Reply   |   Comment by tazdev  –  6 years ago
Did you find this comment useful? yes | no (-2)

I wanted to ask any of you that might now a good security program over a network. The problem is I have multiple XP Home computers and also a secure wireless that Only the people I want on it can go on. But I have some files I want to share via a password so that I can work from any on my computers on the network. And even access a database via the network path. But I don't want anyone else to access it unless I give them the password. I cannot upgrade from XPHome do to the cost. But would like to now if anyone can tell me a great program to make it secure (Kind of like the old 98 security of a foler for full or read access only?)

Thank You. From What I've read about today's software it doesn't sound like this will do the job.

Reply   |   Comment by cjdoug01  –  6 years ago
Did you find this comment useful? yes | no (0)

Hi #25, Yes indeed you are correct. I stand corrected.
All I meant was that no software is exempt from the hacker - and I know a lot of people (some of which has great dislike of MS etc) tend to go down the Open Source road - and swear by many of its products.
I certainly did not try to misslead people and I think most readers would (I hope)understand the whole concept that all software can be (if accessed) "examined" - be it Open Source or otherwise.
If one retains "important data on their pc, then the danger of theft still remains.
Cheers #25.

Reply   |   Comment by struan7  –  6 years ago
Did you find this comment useful? yes | no (-7)

#19

Why would you need to "reverse engineer" an encryption software to know how AES and Blowfish works?

Also, great explanation, but no encryption software will pop out a message saying "We refuse to tell you the private key, but here is the public key: XXXXXXXXX".

Plus, when it comes to protecting your data, both ways do not matter - what matters is that the keys are kept secret.

And then again, when you say protecting your files, isn't placing all the files into a password-protected zip file secure enough? Are you imagining that if you hex edit the file the password will show up clearly? Certainly zip file protection is not as secure as compared to other algorithms like AES but you seem to be under the impression that password-protected zip files do not require a password to be opened.

Perhaps you should double-check your information sources.

Louie.

Reply   |   Comment by Louie  –  6 years ago
Did you find this comment useful? yes | no (+9)

Phil, you are just parading your ignorance with this type of comment. It is widely accepted that Open Source offers advantages in security products of this type. It means that there is a large community of programmers who are able to examine the code for weaknesses and attack vectors (and do), and also a large community able to respond to any that are found (speeding solutions). Closed source means that there may or may not be weaknesses, but it is hard for anyone except the vendor to look for them (except of course for hackers (good or bad); since there's a much smaller number of people looking (and most of those that are were involved in the design/programming of the application, and anyway have an interest in not publicising what they find), there's greater scope for problems to exist - the unknown is whether hackers have found them.

I would point out that the algorithms used everywhere (Rijndael/AES etc)are open source!

Reply   |   Comment by Dm  –  6 years ago
Did you find this comment useful? yes | no (+22)

It was about a quarter to five
When I downloaded your CryptDrive.
Perhaps the algorithm works
To keep out the jerks,
But on a scale of ten I give it a five.

Happy Dae·

Reply   |   Comment by Dae Powell  –  6 years ago
Did you find this comment useful? yes | no (0)

#2 It is not right for you to label this program a "piece of crap" before you even tested it out. Similarly it is wrong to brand it a ripoff of Truecrypt within 6 minutes of it being offered when you could just not possibly have evaluated it at all. A fair trial of the program and constructive arguments as to why Truecrypt is better are far more helpful than blindly brandishing something you haven't even tested as "crap".

Reply   |   Comment by Mark  –  6 years ago
Did you find this comment useful? yes | no (+26)

#19 -

a “hacker” can reverse engineer a program (and that definitely includes OPEN SOURCE software)

Why would you need to "reverse engineer" an open source program? You do understand that "open source" means the source code for the program is freely available, right?

Reply   |   Comment by Guiseppe Madre  –  6 years ago
Did you find this comment useful? yes | no (+24)

To be able to read unencrypted files from your computer, a hacker needs access to your computer. And if he (or she) has access to your computer, encryption isn't really going to help you much.

All encryption is going to do for most of you is make it much more difficult to recover your files when - not if - you have problems with your computer. There are legitimate uses for encryption, but it's certainly not the "must-have" some people would have you believe. Most people will get along just fine without it.

Reply   |   Comment by Guiseppe Madre  –  6 years ago
Did you find this comment useful? yes | no (-14)

Reply to #16 > Phil

Phil, can you so much as provide us with even one Link to verify the comments you posted ? Provide us with even one Link to an Open Source Product that had Malware/Spyware injected into it's Code ? Sir, respectfully, I do not think you can.

You have an obvious mis-conception of the workings of Open Source.
For Twenty-four years I have been a member of the Security Community helping protect the public from Malware?spyware and the Vendors who make such Trash. But the one thing nither myself or anyone else in the Security Community has been able to prevent is the Mis-information that is forever being Posted in an attempt to confuse the Public.

Reply   |   Comment by bobbie jones  –  6 years ago
Did you find this comment useful? yes | no (+31)

Another Free alternative, especially for older computers, like myself, is HandyBits EasyCrypto.
I've used this for years & years, & still use it today.
It's very easy & simple to use & I would recommend this to anyone.
Get it here:
http://tinyurl.com/HandyBits-EasyCrypto

Reply   |   Comment by llvllax X  –  6 years ago
Did you find this comment useful? yes | no (-1)

I'll stick with AXCrypt but thanks anyway. For the few things I encrypt I find open source the way to go.
Alyways free is better sometimes & today just happens to be one of those times. getting messed up with an app of this type your not familiar with & can't reinstall if you need to is to risky for me!

Reply   |   Comment by who said that  –  6 years ago
Did you find this comment useful? yes | no (0)

@#9 Dr. Olaimi you gotta be kidding!
The only thing you showed your kids that you have a credit card and therefore can buy anything ... but... this time it was free
You got wrong free Software this time (see below)
First that may not be always the case (that you can use your credit card). Then sure it doesn't mean that you are buying good quality product.
Definitely in this particular instance you could get totally free best quality Software mentioned here already ... and show your kids that you , say donate just a couple of bucks to the guys creating such excellent free product
Finally you habit of buying anything with credit cards or getting it for free this time should be accompanied with some thoughts like is it safe to get such important Software like encrypting / security and alike when there is no Updates and no Support.
You will encrypt something forever eventually. And if that happen ... I am not sure how that credit card of yours will help

Reply   |   Comment by Cannot Decrypt  –  6 years ago
Did you find this comment useful? yes | no (-15)

When it comes to real Security I'd say watch out for "Technobabble". In other words, claims of "trust us only" from the vendor - any vendor.
If you get a good professional vendor, they will not tell you (in depth) how the their system works - why? well because those clever dicks out there will soon figure it out. Technobabble not only confuses people, it can also fool people - often into a false sence of security.

Remember that a "hacker" can reverse engineer a program (and that definitely includes OPEN SOURCE software) to see how it works - so poor implimentaion of the algorithm will eventually render an encrypted product useless.
Apply a good strong lock (and I mean good long named mixed syntax data ie: numbers mixed with letters) then you are much better protected.
Good (wise) crytography is the type of lock you require - so it's often considered (among experts) best to avoid so called "secret" algorithms.

Popular methods outwith creating a virtual encrypted disk (TrueCrypt etc) include the options to choose between Asymmetric Cryptography (slightly more flexible) or Symmetric.

Symmetric is often used between two or three people - each having (using) the same key to access the data. This is the shared approach. One could (in a manner of speaking) place users of(simply zipping a file) zip and 7-zippers in this catagory - and if so, then you can see that a hacker can unzip and examine your data.

Good Asymmetric Crypography tends to have two keys (pair) one Public and one Private. The private key IS ALWAYS KEPT PRIVATE.

Here's an example: Let's say Jill wants to send Jack a "secret" document, Jill simply looks up Jack's public key and sends it (encrypted) to him.
Jack, using his own private key then decrypts the document and reads it.
Of the two, Asymmetric ciphers tend to be much slower and key sizes are usually quite large - but this method can (in the eyes of many experts) be that bit more secure. But it too has some disadvantages - file sizes etc - and all experts do not share the same opinion.

From what I understand, much of the hacker's digging include factors like viewing how keys are generated, the viewing of Plain text and the more difficult one of finding out which two primes created the asymmetric key along with reading checksums.

So my humble advice is to actually try to fully PROTECT your information - not simply zip it - as it can be quickly unzipped. Perhaps place it (encrypted) inside a folder and apply good strong passwords to that folder - before it can accessed or even be opened.
In other words LOCK IT! That will make life a little bit more difficult for those desperate to look at your private data.

Hope this brief info helps you formulate a good workable method of protection - whatever software and system you choose to use - be it Cryptdrive 7.3, TrueCrypt, 7zip, some cunning Password Locks or some other piece of software.
As usual, it's Thanks to GOTD & Abylonsoft for today's free offer.

Reply   |   Comment by struan7  –  6 years ago
Did you find this comment useful? yes | no (+5)

Installed program. Started program. Clicked on "Registry Now". Next window asks for registration code. I assume one has to pay for the code. Is this correct?

Reply   |   Comment by Ivan  –  6 years ago
Did you find this comment useful? yes | no (-34)

Beware:

You encrypt a drive\file

A months later you need to reinstall Windows for some other reason.

Can you then reinstall CRYPTDRIVE 7.3 again to un-encrypt. Doh!

Reply   |   Comment by Steve  –  6 years ago
Did you find this comment useful? yes | no (+10)

#11 Open source means that others can modify the code (Which can lead to hacking)and more of a "Back door opportunity" for others to create. To say open source is more secure is down right funny. The software developers who support the open source concept believe that by allowing anyone who's interested to modify the source code, the application will be more useful and error-free over the long term.By error free they don't mean it's more safe to use than a compiled code.
It is extremely difficult to modify the compiled version of most applications and nearly impossible to see exactly how the developer created different parts of the program. Most commercial software manufacturers see this as an advantage that keeps other companies from copying their code and using it in a competing product. It also gives them control over the quality and features found in a particular product.

Reply   |   Comment by Phil  –  6 years ago
Did you find this comment useful? yes | no (-33)

The author of the open-source FreeOTFE, Sarah Dean, mentioned by #1, browser, has some additional security utilities, and a comparison table of OTFE (volume encryption) applications. Abylon CRYPTDRIVE 6.0 (current is 7.3) is on page 1, FreeOTFE 4.50 (current is 4.60) is on page 3, and TrueCrypt 6.1a (current) is on page 7. I should also note that TrendProtect is presently giving its highest security warning, Dangerous, to TrueCrypt.org. This is new, and TrendProtect has quicker response to security issues than other site-rating services, but it doesn't provide explanations for the issues. It was probably something transient, perhaps the site was hacked, or malicious ads were being served, but TrendProtect doesn't issue warnings for no reason, so one should use caution and check the digital signature of the TrueCrypt download (they give instructions). I didn't notice any major security alerts related to TrueCrypt 6.1a.

There are pros and cons to using volume-encryption versus file/folder encryption. For my purposes, I use a password manager, and the open-source AxCrypt for file/folder encryption. Since there are many issues related to volume encryption, I have to agree that open-source is generally the safer and more secure option.

Reply   |   Comment by Fubar  –  6 years ago
Did you find this comment useful? yes | no (+45)

You guys didn't think you would get rid of me that easily did you? =). I actually have not been MIA, bar yesterday's giveaway. Just have been posting here less; reviews have been up though (bar yesterday's of course).

The Good
* You can create multiple different encrypted 'drives'.
* You can use multiple different methods of securing your data.
* Has a built in certificate manager.
* Has the ability to support multiple user access to one encrypted 'drive'.

The Bad
* Not open source.
* Horrid, horrid English.
* A log is recording your activity w/ CryptDrive.
* Ugly/overwhelming interface.
* The install-onto-a-USB drive is not working.

Free Alternatives
TrueCrypt
FreeOTFE (thx browser)
deVault

For final verdict, recommendations, and full review please click here.

Reply   |   Comment by Ashraf  –  6 years ago
Did you find this comment useful? yes | no (+63)

An yet another very good Open Source Encrption Program that requires no prior knowledge of encrption: Ax Crypt


http://www.axantum.com/AxCrypt/

works by just one "click"


Myself I use TrueCrypt

Reply   |   Comment by bobbiejones  –  6 years ago
Did you find this comment useful? yes | no (+4)

I don't know if this has been said before, but TrueCrypt is far much better.

Reply   |   Comment by Orvis  –  6 years ago
Did you find this comment useful? yes | no (-23)

So why choose Open Source over today's giveaway ? Its a matter of Security. Open Source means just what it implys. Countless people are forver checking the CODE to insure that the public obtains a "PURE" Product that does not contain "Backdoors" that some un-known Snoop can gain access through. Whereas, a Private Company "just may" fall victim to higher authorities an provide them with access through that possible "Backdoor".
Everyone needs encryption in today's world. Be it sending emails, tax records, don't sell short the use of encrption without knowing the real security it can provide.

Reply   |   Comment by bobbiejones  –  6 years ago
Did you find this comment useful? yes | no (+41)

I forgot to add a bit detail :D

For zip file:
If the password length is 10
Search speed is 500000 passwords per second
Password uses lower case, upper case, digits...

Brute Force Attack will take up to 4274902 years!!!

So... here we go... my favorite zip program is 7-zip: full functionality + easy-to-use

Reply   |   Comment by akai  –  6 years ago
Did you find this comment useful? yes | no (-22)

Perfect timing!

Timezone difference is a blessing sometimes!

I am right now in Kuwait City, and the time that this post is less than an hour from this software was posted (midnight US timezone) which is almost 10am here (tomorrow there!)

Last night my daughter gave me her digital camera along with memory stick and couple of blank CDs. She asked me to empty her camera's memory so she can use it again after saving all her pictures on both the memory disk (flash). so far nothing strange i guess.

The trick came when she called me this morning at 9:30am asking me "if there is a way I can make sure there is a password on both mediums (CD+Flash) just in case of someone unwanted had an access to her "private" collection of photos, he/she would not be able without a password!!? my answer was ... (as any good parent would answer) let me try honey! :)

So, as a "good father" like i might be, I pulled my credit card out of my wallet and started searching the net looking for "any" software that would do the required job!

Since GAOTD site is one of browser's home pages(multiple home pages at startup), my eye just popped out seeing it with a very nice big smile!

GAOTD team ... Thank you very much for this outstanding "coincidence", Gift, or whatever you wish to name it; because it doesn't matter what kind of technical issues are associated with this software. Ultimately it served the purpose %100, and better yet, it is going to be available for reuse again!

Another thanks for making me truly sustain the image of a good parent who have an answer for all of his kids' answers, and with "solutions" too! :))

Cheers

Reply   |   Comment by Dr. Olaimi  –  6 years ago
Did you find this comment useful? yes | no (-64)

I have to say that nowadays people make programs without really thinking of them.
Who could put out money just to buy a software to encrypt while there are thousands of free alternatives out there.
For a general and ordinary user, it's no need to encrypt.
Even if you want to encrypt, use an zip or 7z format and put a password is quite sufficient. According to a source I found:

"Although Zip Password is very fast, password recovery may take a lot of time. If a lost password is long, then the recovery time may be inappropriate (months, years, ...). This problem is of global nature - in general, protection in ZIP archives is very complex. You can use our Password Calculator to estimate required recovery time for your specific situation."

So overall, some good tips in making password + a program to zip is more than this such expensive program

Thanks

Reply   |   Comment by akai  –  6 years ago
Did you find this comment useful? yes | no (+1)

A good free option is TrueCrypt, which is very powerful, easy and well worth looking at.

http://www.truecrypt.org/

Reply   |   Comment by Eliram  –  6 years ago
Did you find this comment useful? yes | no (+25)

Free (all the time) and open source: http://www.truecrypt.org/

Reply   |   Comment by Scotia  –  6 years ago
Did you find this comment useful? yes | no (+30)

I prefer True Crypt, which is free.

Reply   |   Comment by DiamondAge  –  6 years ago
Did you find this comment useful? yes | no (+33)
Add a comment

iPhone app giveaways »

Flow And His Glowing Pebbles Giveaway
X2 the benefits in 1 app! Educational & bedtime story.This interactive book app is...
$0.99 ➞ free today
Band Extras Giveaway
Band Extras is a utility supplement for the Microsoft Band. The Microsoft Health...
$0.99 ➞ free today
Gem Island Giveaway
Choose from six highly addictive game modes and catch all the gems, if you can!Are...
$0.99 ➞ free today
Sign It! - Swipe to add a signature Giveaway
**** Valentine's Special: Get 'Sign It!' for free! ****Social media offers great...
$0.99 ➞ free today
Vintage Gadget Giveaway
The only utility app you’ll ever need. Timer, Counter, Compass, Flashlight, Stopwatch,...
$0.99 ➞ free today

Android app giveaways »

1200 Giveaway
Join the game, and get to the 1200 level!Put all the dots to the target.Get to the...
$0.99 ➞ free today
Suru for Android Giveaway
Suru is a vivid, high-resolution icon pack for Android to install and use with your...
$1.82 ➞ free today
Ultimate Skylanders Reference Giveaway
The ultimate guide to Skylanders Characters. Character Attributes, Stats, and Character...
$2.99 ➞ free today
Jewelion Giveaway
Go on a Match 3 Magical Adventure. Become an apprentice to a powerful Archon named...
$0.99 ➞ free today
QuikCoach V2 - Sports Analysis Giveaway
QuikCoach is a sports video analyses and planning application for Android tablets...
$4.96 ➞ free today