Menu
Is free
check in
the main  /  Education / Program to encrypt a certain expansion. Comparison of tableware for encryption

A program to encrypt a certain expansion. Comparison of tableware for encryption

Editor's Choice

Programs encryption files

Encrypt everything!

Every time the information about the scandal associated with the fact that important documents leaked somewhere were leaked, I ask myself why they were not encrypted? Document protection should be everywhere in the end.

Encryption algorithms

The encryption algorithm is similar to a black box. Dump document, images or other file that you download to it, you get back. But what you see seems to be nonsense.

You can turn this plate back to a normal document through a window with the same password that you entered when encrypted. Only so you get the original.

The US government recognized the advanced encryption standard (AES) as a standard, and all products that are assembled here, support AES encryption standard.

Even those who support other algorithms are usually recommended to use AES.

If you are an encryption expert, you may prefer another algorithm, blowfish, and perhaps even the algorithm of the Soviet government for GOST.

But it is already completely for lovers of extreme entertainment. For an ordinary user AES is just an excellent solution.

Open key cryptography and exchange

Passwords are important and you must keep them secret, right? Well, not when using open key infrastructure (PKI), which is used in cryptography.

If I want to send you a secret document, I just encrypt it using an open key. When you get it, you can use it to decipher the document. All simple!

Using this system in the opposite direction, you can create a digital signature that confirms that your document came from you and was not changed. How? Just encrypt it with your closed key.

The fact that your public key decrypts it is proof that you have the right to edit it.

PKI support is less common than support for traditional symmetric algorithms.

Many products allow the creation of self-seeping executable files.

You may also find that the recipient can use a free definite tool for decryption only.

What's better?

Now there is a huge selection of products available in the encryption area.

Everyone simply has to choose the solution that will be convenient for functionality, practical and stylish from the point of view of the primary program interface.

Digital CertainSafe Safe passes through a multistage security algorithm that identifies you on the site. You will have to pass several authentication.

Your files are encrypted if they are trying to hack, they crumple themselves, and no one can recreate them. In this case, there is a certain risk, but at the same time, the level of reliability is very worthy.

Then each piece of file is stored on another server. A hacker who was able to hack one of the servers will not be able to do anything useful.

Lock can encrypt files or just lock them so that no one can open them. It also offers encrypted lockers for safe storage personal confidential.

Among many others useful features It is possible to note the possibility of grinding, binding of free space, secure network backup and self-seeping files.

Veracrypt (Windows / OS X / Linux)

Veracrypt supports encryption on TrueCrypt, which has ceased to develop last year.

The developer team argues that they have already considered the issue raised during the initial TrueCrypt audit, and believe that it can still be used as an accessible version for, OS X and.

If you are looking for a file encryption tool that really works, then it is it. Veracrypt supports AES (most frequently used algorithm).

It also supports TWOFISH and Serpent Encryption Ciphers, supports both hidden encrypted volumes.

The program code is open, most of the code base consists of TrueCrypt.

The program is also constantly developing, regular security updates and independent audit at the planning stage (according to developers).

Those of you who have already tried it, praised it for the fact that the encryption tool works perfectly on the fly, and in your files are decrypted only when they are needed. So the rest of the time they are stored in an encrypted form.

Especially users note that the program is a powerful tool that is easy to use and always to the place. Yes, he lacks a pretty interface or tons of bells.

AXCRYPT (Windows)

AxCrypt is a free program, open source GNU license.

The GPL-licensed encryption tool for Windows, which is proud to be simple, efficient and reliable to use.

It is perfectly integrated with the Windows shell, so you can right-click on the file that you want to encrypt and give the command.

Or you can simply configure the executable code, so the file will be blocked if it is not used for a certain period of time. It can be decrypted later, or when the recipient will notify about receipt.

Files with AxCrypt can be decrypted on request or keep them decrypted while they are used, and then automatically they will be encrypted.

It supports 128-bit AES encryption, provides protection against hacking attempts. It is very light (less than 1 MB.)

Everyone himself decides which program to use, but if your data is at least worth something for you, be sure to think about what you need a program for encryption.

Encryption of files and folders in Windows

Programs for encryption files: what better to choose?

Encryption is the process of encoding information in such a way that it cannot be accessible to other people if they do not have the necessary key for decoding. Encryption is usually used to protect important documents, but it is also good way Stop people who are trying to steal your personal data.

Why use categories? To smash a huge variety of information encryption programs for simpler and understandable sets of programs, i.e. structure. This article is limited to a set of utilities for encrypting files and folders.

  1. File and folder encryption utilities - these utilities are discussed in this article.These encryption utilities operate directly with files and folders, in contrast to utilities that encrypt and storing files in volumes (archives, that is, in file containers). These encryption utilities can operate in "on demand" mode or in the "on the fly" mode.
  2. Virtual disk encryption utilities. Such utilities work using volume creation tools (encrypted containers / archives), which are submitted in the file system as virtual disks with their letter, for example, "L:". These discs can contain both files and folders. The file system of the computer can read, write and create documents in real time, i.e. in open video. Such utilities work in "on the fly" mode.
  3. Full-Drive Encryption utilities - encrypt all storage devices, for example, hard drives, disk and USB device sections. Some of the utilities in this category can also encrypt the disk on which the operating system is installed.
  4. Client encryption utilities in the "cloud": New category encryption utilities. These file encryption utilities are used before downloading or sync with the "cloud". Files are in encrypted form when transmitted and while stored in the cloud. The encryption utilities in the "cloud" use various virtualization forms to provide access to the source text on the client side. At the same time, all work occurs in "on the fly" mode.

Cautions

    Operating systems are vicious: Echo of your personal data - paging files, temporary files, power saving mode files ("sleep system"), remote files, browser artifacts, etc. - Most likely, will remain on any computer that you use to access the data. This is a nontrivial task - to highlight it echo of your personal data. If you need data protection hard disk During their movement or receipt from the outside, this is a rather complicated task. For example, when you create an encrypted file archive or unzipping such an archive, then, accordingly, the original version of files or copies of the original files from this archive remain on the hard disk. They can also stay in the places of temporary file storage (aka TEMP folders, etc.). And it turns out that the task of deleting these original versions becomes a task not to easily delete these files by means of the "Delete" command.

  1. The fact that the encryption program "works" does not mean that it is safe. New encryption utilities often appear after "someone" reads applied cryptography, choose the algorithm and takes on the development. Maybe even "someone" uses the proven opensis code. Implements user interface. Make sure that it works. And thinks that this is all finished. But it is not. Such a program is probably filled with fatal bugs. "Functionality does not mean quality, and no beta testing will uncover the security problems. Most of the products are a beautiful word" observed ". They use cryptography algorithms, but they themselves are not safe." (Free translation) - Bruce Schneier, from Security Pitfalls in Cryptography. (Source phrase: "Functionality Does not Equal Quality, and No Amount of Beta Testing Will Ever Reveal A Security Flaw. Too Many Products Are Merely Buzzword Complent; They Use Secure Cryptography, But The Are Not Secure. ").
  2. Using encryption is not sufficient to ensure the security of your data. There are many ways to circumvent protection, so if your data is "very secret", then it is also necessary to think about other protection paths. As "Start" for additional searching, you can use an article risks to use cryptographic software.

Overview of file encryption programs and folders

TrueCrypt. once was the most best Program In this category. And so far is one of the best, but no longer corresponds to this category, as it is based on the use of virtual disks.

Most, if not all programs described below are exposed to non-obvious threats, which are described above in paragraph No. 1 from the listredoxeons . TrueCrypt, which is based on working with sections, and not at work with files and folders - does not expose users of this vulnerability.

Sophos Free Encryption - no longer available.

Related Products and Links

Related Products:

Alternative products:

  • Safehouse Explorer is a simple, free program that weighs enough, which allows it to easily use USB drives. You can also find well-prepared video materials and user manual on their website.
  • Rohos Mini Drive is a portable (Portable) program that creates a hidden, encrypted partition on a USB drive.
  • Freeotfe (From the review of the Virtual Disk Encryption Utilities) is a program for the encryption of the disk "on the fly". It can be adapted for portable (portable) use.
  • Freeotfe Explorer is a simple version of Freeotfe. It does not require administrator rights.
  • Pismo File Mount Audit Package is a file system extension that provides access to special encrypted files (through the context menu. windows Explorer) In turn, which provide access to encrypted folders. Applications can write directly to these folders, which makes it possible to ensure that text copies of the original document will not remain on the hard disk.
  • 7-ZIP is a powerful utility to create file archives that provides 256-bit AES encryption for * .7z and * .zip formats. However, the Pismo program is a better solution, since it avoids the problem of storing unencrypted file versions.

Quick Selection Guide (download programs for encryption files and folders)

AxCrypt.

Integration with the context menu of Windows Explorer. AxCrypt allows you to easily open, edit and save encrypted files as if you work with unencrypted files. Use this product if you need to work often with encrypted files.
The program uses Open Candy (installed in a set of additional third-party software). If you want, you can not install it, but then you need to register on the site.

A modern person is no longer able to present his life without gadgets (computers, cell phones, tablets, etc.). This technique allows not only to diversify leisure, but also contributes to the rapid finding of answers to many questions of interest. Besides, information Technology allow you to do even financial operations Without the need to visit banks. However, such expanded capabilities become possible only subject to the introduction of confidential information.

Top programs for encryption files and folders.

The user has to enter logins, email addresses and, of course, passwords. If someone who has criminal inclinations will take possession of such information, the user will have to face sad consequences. It is unlikely that someone will calmly refer to the loss of personal data. For this reason, many serious concerns arise, and sometimes panic against the background of the absence of an answer to "global" to understand their understanding, how to protect their data, prevent theft of confidential information.

Appointment of encryption programs

IT technologies are developing all sorts of software, aimed at improving and accelerating user performance, expanding opportunities, including data protection. Against the background of the existing need, programmers have developed a unique product in the form of programs for encrypting files and folders. Such programs are interested not only for private users, but also economists, accountants, lawyers and other performers operating in the process of performing professional activities with important information, access to which is limited and familiarized with which, even if there are incredible desire, everyone does not have the right.

Storing open access Confidential information is rashly, since computer equipment or mobile device Maybe along the fatal chance to be in extraneous hands. Log in with fraudulent intentions is easy, moreover, some users of ignorance misses the fact that it is possible to read information not only where it was placed initially, but in other places. After deleting folders, files, visits the Internet resources on which passwords could be entered, data can be saved on the temporary file storage. In order not to become "easy prey" for computer scams, it is useful to familiarize yourself with the recommendations, how to protect your personal data, which programs for encrypting confidential data are the best.

Best programs

Over the years, the leading position has kept TrueCrypt program that provides encryption information, folders on the computer. IN currently It continues to be used by users, but it is impossible to call it the best product. In addition, this IT project is currently closed. It is not necessary to peel about this or experience an alarm, since a great successor of the TrueCrypt program has become a new VERACRYPT product, accompanied by the original open source. When developing VERACRYPT, the TrueCrypt code was taken, which was refined, improvement, due to this, the encryption quality improved significantly.

In particular, there is a significant improvement in the key generation from the password. Also, users seeking to encrypt not only individual documents, but a fully rigid disk, can easily carry out such manipulations. In this case, the programmers have implemented a completely different encryption mode of hard drives. In particular, instead of CBC is used now XTS. Such a change provides when encrypting the addition of the sector number and the intravenous offset. Hurry up to draw your attention to the fact that even this improved version Veracrypt is not out of competition. At the moment it is possible to download and start working with one of several programs, the action of which is aimed at encrypted data.

If you want to prohibit access to all unauthorized persons to folders and files on a computer and removable media, then you can use excellent program ANVIDE LOCK FOLDER. This little program is accompanied by an understandable interface, so absolutely no need to have any special knowledge. However, this is a small "miracle", indeed, restricts access to everything that you impose a ban, subjected to encryption. As the advantage of the Anvide Lock Folder program, it is possible to change the user to change the interface by adjusting it to your own preferences. Also attracts this user program and what is free.

Popular is accompanied by such a utility as Folder Lock.. It also allows you to successfully encrypt the data, but as a bonus, users get the opportunity not only to encrypt, but also to hide the attention of third-party folders. Hidden files with password are doubly protected from theft. Unfortunately, some users may encounter the fact that the Folder Lock utility cannot be free. Indeed, depending on operating system computer on which you plan to download and start actively using the Folder Lock, the network offers and free, and paid version utilities. By the way, this program excellent copes with encryption tasks not only on computer technician, but also on smartphones.

Similar features and characteristics, the Hide Folders utility, accompanied by tools, with which any user who does not have special technical knowledge can be easily analyzed. Access to encrypted folders receive only those who correctly enter the previously installed passwords.

Wise Folder Hider is a program that provides easy and fast encryption of files, folders on a rigid disk, removable media. At the same time, this utility is capable of providing double protection. The program requires the Password Introduction Initially for launch, and then to access encrypted folders or documents.

A good option to ensure reliable protection of confidential information is the SECRET DISK program. She got such a name is not just like that. Using such a utility, the user creates virtual diskTo which only the password holder can access. As a result, this program allows you to create a reliable storage of a variety of information.

Many advanced users prefer to work with the Cryptarm program due to its expanded functional. Cryptoarm allows you to encrypt not every individual folder, and run group processing, ensuring the acceleration of the encryption process. In addition, the cryptoarm program allows you to carry out:

The uninitiated will try to introduce into the course that there is a whole science (cryptography) aimed at finding and improving confidentiality, authentication, data integrity. Of course, each user does not need to dive into her with his head, but at the same time it is useful to know that the network is easy to find faithful "assistants", providing reliable protection Personal data, as well as capable of creating effective passwords.

The principle of modern cryptocringers is not to create encryption, which is impossible to read (it is almost impossible), but in increasing the cost of cryptanasalysis.
That is, knowing the encryption algorithm itself, but I do not know the key, the hacker should spend millions of years on decoding. Well, or as much as it is necessary (as you know, information ceases to be important after the death of your loved ones and you), while X-Files do not lose relevance. At the same time, the complexity comes into conflict with the ease of use: the data should be encrypted and decrypted quite quickly when using the key. Programs that have fallen in today's review are generally satisfying two named criteria: they are fairly easy to operate, while using persistent algorithms.

Let's start with the prog, which by itself is worthy of a separate article or cycle of articles. Already when installing, I was surprised by the additional possibility of creating a false operating system. Immediately after completing communication with the installation wizard, the drivevkript suggested that you create a keys store. Any file can be selected: file, drawing, MP3. After the path to the repository is specified, drive passwords, which we have two types: Master & User. They differ in access to the DCPP settings - the user does not have the ability to change something, it can only view the specified settings. Each type may consist of two and more passwords. Actually access to the protection installation can be represented by both the password of the master and by the user password.

Before encrypting any discs, you need to check the correctness of the download protection installation. Be careful if you do not check the correctness of the download protection and immediately encrypt the disk, then it will be impossible to restore its contents. After checking, you can switch to disk encryption or partition. To encrypt disk or section, follows
Select Disk Drives and click Encrypt. The disk encryption wizard will open the window in which it will be proposed to select the key from the repository. The disk will be encrypted by this key and the same key will be required to further work with the disk. After the key is selected, the disk encryption process will be launched. The process is quite long: depending on the volume of the encrypted disk or partition, it can take up to several hours.

In general, all this is quite simple and standard. It is much more interesting to work with a false axis. Formatting distributed on the hard disk required in FAT32 (it seems that rumors about the death of this file system were very exaggerated
:)), We will install Windows, install DriveCrypt. The false operating system created should look like a worker, constantly used. After the hidden operating system is created, loaded and working with the false OS is extremely dangerous, since there is a possibility to destroy the data of the hidden operating system. Thinking in the system every garbage, create a new storage,
Authorizes in DCPP, switch to the Drives tab, allocate the partition where the false operating system and the Hiddenos flu is installed. The settings window opens. Everything is simple here: specify the path to the newly created repository, passwords, the label of the hidden disk, his file system and the amount of free space that will separate the false operating system from the hidden. After the use of the CREATE HIDDEN OS button, the creation process will be launched. hidden section And all the contents of the system partition will be copied to the hidden section. The prog will create a hidden section, the beginning of which will be through the above-mentioned space from the end of the false partition specified when creating a hidden partition. Reboot I.
Log in with the introduction of passwords that were specified when creating a hidden partition. The contents of the false operating system will not be visible when working in a hidden OS, and on the contrary: when working in a false operating system will not be visible a hidden OS. Thus, only the entered password when the computer is turned on determines which operating system will be loaded. After completing the creation of a hidden operating system in it, you need to log in and encrypt the system partition.

With DriveCrypt, you can encrypt any hard disk or a remedy drive (with the exception of CD and DVD) and use it to exchange data between users. The undoubted advantage of data exchange on a fully encrypted medium is the impossibility of detecting any files on it, the media looks not formatted. Even with the information that the carrier is encrypted, if the key is missing, it will be impossible to read.

DriveCrypt encrypts a whole disk or partition, allowing you to hide not only important data, but also all the contents of the disk or partition, including the operating system. Unfortunately, this level of security has to pay a significant drop in the performance of the file system.

Here we encounter a rather original encryption algorithm with a closed key length from 4 to 255 characters developed by the authors of the program. Moreover, the password-key is not stored inside the encrypted file, which reduces the possibility of hacking it. Principle of operation of the program is simple: specify the files or folders that need to encrypt, after which the program offers to enter the key. For greater reliability, the key can be selected not only on the keyboard, but also with the help of a special panel. This panel, going to the case, was stolen with MS Word (insertion
- symbol). By confirming the password entry, we will forced the program to encrypt the file by appropriating the extension * .shr.

Files Cipher is able to compress the encrypted files using the built-in archiving algorithm. Moreover, after encryption, the source file can be deleted from the hard disk without the possibility of recovery.
The program works with files of any types, and also supports files of more than 4 GB (for NTFS). Wherein system requirements The computer is very modest and resources, in contrast to the frontman, almost nothing.

In PGP, encryption is implemented both open and proven symmetrical
Keys: AES with encryption up to 256-bit, Cast, Tripledes, IDEA and TWOFISH2. To manage encryption keys, there is a PGP KEYS option, which displays the window with the display of user keys and added to the open key list. Module operations module for encryption discs PGP Disk ... mmmm ... how to say it? A, elementary. Again, creating a key storage file (I call it a key to myself), enter passwords. Moreover, when specifying the password, a special durability indicator (quality) is displayed, which, by the way, clearly demonstrates the relevance sophisticated passwords: So, the password resistance consisting of eight digits is approximately equal to the resistance of a six-letter or four-digit, in which there is one special (exclamation mark) and three letters.

I liked it very much that the creators thought about ICQ (who read the logs of Stalker after Defefea Mazaphle, he would understand ... Or were they not in Assi and I confuse something?). After installation in the ICQ window, a special icon appears, with which the session protection is turned on.

As for the most sick topic - leakage of information through a swap file - the authors themselves admitted that they could not block this channel leakage, they could not be able due to the characteristics of the operating system. On the other hand, measures have been taken to reduce this threat - all important data is stored in memory no longer than necessary. After completion of the operation, all critically important information From the memory is removed. Thus, this vulnerability takes place, and it is necessary to disable it for its liquidation. virtual memory (What can lead to a noticeable deterioration of OS), or take additional protection measures.

The main features of the Folder Lock program are as follows:
  • AES-encryption, key length 256 bits.
  • Hiding files and folders.
  • Encryption of files (by creating virtual disks - safes) "on the fly".
  • Backup online.
  • Creating secure USB / CD / DVDs.
  • Encryption attachments email.
  • Creating encrypted "wallets" storing information about credit cards, accounts, etc.

It would seem that the possibilities of the program is quite enough, especially for personal use. Now let's look at the program in work. When you first start, the program asks to install a master password that is used to authenticate the user in the program (Fig. 1). Imagine this situation: you hid files, and someone else launched the program, viewed which files are hidden and access to them. Agree, not very good. But if the program requests a password, then this "someone" does not exit anything already - in any case, until he picks up or does not recognize your password.


Fig. 1. Setting the master password when you first start

First of all, let's see how the program hides the files. Go to section Lock Files., then either drag files (Fig. 2) and folders to the main program area or use the button Add.. As shown in Fig. 3, the program allows you to hide files, folders and discs.


Fig. 2. Drag the file, highlight it and click Lock


Fig. 3. Button Add.

Let's see what happens when we press the button. Lock. I tried to hide the file C: \\ Users \\ Denis \\ Desktop \\ Cs.zip. The file disappeared from the conductor, Total Commander. and other file managers, even if the display of hidden files is enabled. The file hiding button is called Lock, and section Lock Files.. However, it would be necessary for these elements of the UI to name Hide and Hide Files, respectively. Because in fact, the program does not block access to the file, but simply "hides" it. Look in Fig. 4. I, knowing the exact name of the file, copied it to the CS2.Zip file. The file was calmly copied, there were no access errors, the file was not encrypted - he unpacked, as usual.


Fig. 4. Copying a hidden file

By itself, the function of the concealment is stupid and useless. However, if you use it with the file encryption function - to conceal the safes created by the program - then the efficiency of its use will increase.
In chapter Encrypt Files. You can create safes (Lockers). Safe is an encrypted container, which, after mounting, can be used as a regular disk - encryption is not easy, but transparent. The same technique is used by many other encryption programs, including TrueCrypt, Cybersafe Top Secret, etc.


Fig. 5. Section Encrypt Files

Press the button Create Locker, In the window that appears, enter the name and select the location of the safe (Fig. 6). Next, you need to enter a password to access the safe (Fig. 7). The next step is to select the file system and the size of the safe (Fig. 8). Safe size - dynamic, but you can set the maximum limit. This saves disk space if you do not use the Safety Deposit Browse. If you wish, you can create a fixed-size safe, which will be shown in the "Performance" section of this article.


Fig. 6. Title and location of the safe


Fig. 7. Password to access the safe


Fig. 8. File system and safes

After that, you will see the UAC window (if it is turned on), in which it will be necessary to click Yes, then a window will be displayed with information about the created safe. It is necessary to press the FINISH button, after which the conductor window will be opened, which displays a supported container (carrier), see Fig. nine.


Fig. 9. Virtual disk created by the program

Return to section Encrypt Files. And select the desired safe (Fig. 10). Button Open Locker Allows you to open a closed safe, Close Locker. - close open, button Edit Options. Calls a menu in which you are deleting / copying / renamed / change the safe password. Button Backup Online Allows you to retrieve the safe, and not somewhere, but in the cloud (Fig. 11). But first you have to create an account Secure Backup Account, After that, you will receive up to 2 TB of disk space, and your safes will be automatically synchronized with the online storage, which is especially useful if you need to work with the same safe on different computers.


Fig. 10. Safety operations


Fig. 11. Creating Secure Backup Account

Nothing is just like that. Rates for storing your safes can be found at Secure.NewsoftwareS.Net/signup?id\u003den. For 2 TB will have to put $ 400 per month. 500 GB will cost $ 100. To be honest, it is very expensive. For $ 50-60, you can rent a whole VPS from 500 GB "Onboard", which you can use as a repository for your safes and even create your own website on it.
Please note: the program knows how to create encrypted sections, but unlike the PGP Desktop program, it does not know how to encrypt all the disks. In chapter Protect USB / CD You can protect your USB / CD / DVDs, as well as email attachments (Fig. 12). However, this protection is carried out not by encrypting the carrier itself, but by recording to the appropriate carrier of the self-sewn safe. In other words, a trimmed portable version of the program will be recorded on the selected medium, which is allowed to "open" safe. As such support for postal customers, this program is also not. You can encrypt the attachment and attach it (already encrypted) to the letter. But the attachment is encrypted by the usual password, and not PKI. I think about reliability there is no point.


Fig. 12. Section Protect USB / CD

Section Make Wallets. Allows you to create wallets containing information about your credit cards, bank accounts, etc. (Fig. 13). All information, of course, is stored in encrypted form. I can say with all responsibility that this section is useless, since the function of exporting information from the wallet is not provided. Imagine that you have many bank accounts and you made information about each of them to the program - the account number, the name of the bank, the account owner, SWIFT code, etc. Then you need to provide information about the account of the third person to transfer you money. You will have to manually copy each field, insert it into a document or email. The presence of export functions would greatly facilitate this task. As for me, it is much easier to store all this information in one general document to be placed on the Virtual Disc - safe created by the program.


Fig. 13. Wallers

Advantages of the Folder Lock Program:

  • Attractive I. understandable interfacethat will enjoy novice users who speak English.
  • Transparent encryption "on the fly", the creation of virtual encrypted discs with which you can work with as with conventional discs.
  • Ability to back up online copying and synchronization of encrypted containers (safes).
  • The ability to create self-seeping containers on USB / CD / DVDs.

Disadvantages of the program:

  • There is no support for the Russian language, which will complicate work with the program of users who are not familiar with English.
  • The dubious functions of the Lock Files (which simply hides, and not "locks" files) and make wallets (ineffective without exporting information). Honestly, I thought that the Lock Files feature would provide transparent encryption folder / file on a disk, as did Cybersafe Top Secret or file system EFS.
  • Lack of file signing, digital signature checks.
  • When opening a safe, it does not allow you to select the drive letter, which will be assigned to a virtual disk that corresponds to the safe. In the program settings, you can only select the order in which the program will assign a drive letter - ascending (from A to Z) or descending (from Z to A).
  • There is no integration with postal customers, there is only the ability to encrypt the attachment.
  • High cost of cloud backup.

PGP Desktop.

The PGP Desktop program from Symantec is a set of encryption programs that provides flexible multi-level encryption. The program differs from Cybersafe Topsecret and Folder Lock close integration into the system shell. The program is embedded in the shell (conductor), and access to its functions is carried out through the context menu of the conductor (Fig. 14). As you can see, in the context menu there are encryption functions, file signatures, etc. Quite interesting is the function of creating a self-seeping archive - according to the principle of self-extracting archive, only instead of unpacking the archive also deciphered. However, the Folder Lock and Cybersafe programs also have a similar function.


Fig. fourteen. Context menu PGP Desktop.

Also, access to the functions of the program can be obtained through the system tray (Fig. 15). Team Open PGP Desktop. Opens the main program window (Fig. 16).


Fig. 15. The program in the system tray


Fig. 16. PGP Desktop window

Program sections:

  • PGP Keys. - Key management (both own and imported with Keyserver.pgp.com).
  • PGP Messaging - Management of messaging services. When installing the program automatically detects your accounts And automatically encrypts the AOL Instant Messenger communication.
  • PGP Zip. - Management of encrypted archives. The program supports transparent and opaque encryption. This section is just implementing opaque encryption. You can create an encrypted zip archive (PGP Zip) or a self-seeping archive (Fig. 17).
  • PGP DISK. - This is the implementation of a transparent encryption function. The program can, how to encrypt the entire partition of the hard disk (or even the entire disk) or create a new virtual disk (container). Here there is a SHRED FREE SPACE function that allows you to lose free space on the disk.
  • PGP Viewer. - Here you can decipher PGP messages and attachments.
  • PGP Netshare. - The "Sharing" tool for folders, and the "balls" are encrypted using PGP, and you have the opportunity to add / delete users (users are identified on the basis of certificates) that have access to the "ball".


Fig. 17. Self-resistant archive

As for the virtual disks, I especially liked the possibility of creating a virtual dynamic size disk (Fig. 18), as well as the choice of an algorithm other than AES. The program allows you to select the drive letter to which the virtual disk will be configured, and also allows you to automatically mount the disk when the system starts and unmounting with a simple (by default after 15 minutes of inaction).


Fig. 18. Creating a virtual disk

The program tries to encrypt everything and everything. It monitors POP / SMTP connections and offers them to protect them (Fig. 19). The same applies to customers for exchanging instant messages (Fig. 20). It is also possible to protect IMAP connections, but it is necessary to separately include in the program settings.


Fig. 19. SSL / TLS connection detected


Fig. 20. PGP Im in action

It is a pity that PGP Desktop does not support popular modern programs like Skype and Viber. Who is now using AOL im? I think there are some such.
Also, when using PGP Desktop, it is difficult to configure email encryption that only works in intercept mode. And what if the encrypted mail was already received, and PGP Desktop was launched after receiving an encrypted message. How to decipher it? You can, of course, but you have to do this manually. In addition, the already deciphered letters in the client are no longer protected. And if you configure the client to certificates, as is done in the Cybersafe Top Secret program, then the letters will always be encrypted.
Interception mode is also not very good, as mail protection message appears each time each new mail server, and Gmail has a lot of them. Mail protection window very quickly you get tired.
The program stability is also no different (Fig. 21).


Fig. 21. PGP Desktop hung ...

Also after its installation, the system worked slower (subjectively) ...

Advantages of the PGP Desktop program:

  • A full-fledged program used to encrypt files, signing files and checking electronic signatures, transparent encryption (virtual disks and encryption of the entire partition), email encryption.
  • Keyserver.pgp.com keys server support.
  • The ability to encrypt the system hard disk.
  • PGP Netshare feature.
  • The ability to rub free space.
  • Close integration with conductor.

Disadvantages of the program:

  • Lack of Russian support, which will complicate work with the program to users who do not know English.
  • Unstable program work.
  • Low program performance.
  • There is support for AOL IM, but no Skype and Viber support.
  • Already deciphered letters remain unprotected on the client.
  • Mail protection only works in the intercept mode, which is quickly tired, because the mail protection window will appear every time for each new server.

Cybersafe Top Secret.

As in the previous review, detailed description Cybersafe Top Secret will not be, because in our blog and so much has been written about it (Fig. 22).


Fig. 22. Cybersafe Top Secret

However, we still pay attention to some moments - the most important. The program contains key management tools and certificates, and the presence in the Cybersafe your own key server allows the user to publish its public key on it, as well as get the open keys of other employees of the company (Fig. 23).


Fig. 23. Key management

The program can be used to encrypt individual files, which has been shown in the article "Electronic Signature: Practical use at Cybersafe Enterprise software product. Part one" . As for encryption algorithms, the Cybersafe Top Secret program supports GOST algorithms and a Cryptopro Cryptoproider certified, which allows it to be used in state institutions and banks.
Also, the program can be used for transparent folder encryption (Fig. 24), which allows it to be used as a replacement for EFS. And, given that the Cybersafe program turned out to be more reliable and faster (in some scenarios) than EFS, it is not only possible to use it, but also needed.


Fig. 24. Transparent folder encryption C: \\ CS-Crypted

Cybersafe Top Secret features Reminds the PGP Desktop functionality - if you notice, the program can also be used to encrypt email messages, as well as for electronic signatures of files and checking this signature (section El. digital signatureSee fig. 25).


Fig. 25. Section El. digital signature

Like the PGP Desktop program, Cybersafe Top Secret is able to create virtual encrypted discs and encrypt the fully partitions of the hard disk. It should be noted that the Cybersafe Top Secret program can create virtual disks of fixed size only, as opposed to Folder Lock and PGP Desktop programs. However, this lack is neutralized by the possibility of transparent encryption of the folder, and the size of the folder is limited only by the size of the free space on the hard disk.
Unlike the PGP Desktop program, the Cybersafe Top Secret program cannot encrypt the system hard drive, it is limited only to the encryption of external and internal non-system drives.
But Cybersafe Top Secret has the possibility of a cloud backup, and, unlike the Folder Lock, this feature is absolutely free, you can more accurately, the cloud backup function can be configured to any service - both paid and free. You can read more about this feature in the "Cloud Service Encryption Encryption" article.
It also needs to be noted two important features of the program: two-factor authorization and system of trusted applications. In the program settings, you can or set the password authentication or two-factor authentication (Fig. 26).


Fig. 26. Programs settings

On the tab Allowed. Applications You can define trusted applications that are allowed to work with encrypted files. By default, all applications are trusted. But for greater security, you can specify applications that are allowed to work with encrypted files (Fig. 27).


Fig. 27. Trusted applications

Advantages of Cybersafe Top Secret:

  • Support for algorithms for encryption of GOST and certified cryptoproder cryptopro, which allows the program not only to individuals and commercial organizations, but also to government agencies.
  • Support for transparent folder encryption, which allows you to use the program as an EFS replacement. Given that the program provides the best level of productivity and safety, such a replacement is more than justified.
  • The ability to sign the electronic digital signature files and the ability to check the signature of the file.
  • Built-in keys server that allows you to publish keys and access other keys that have been published by other employees of the company.
  • The ability to create a virtual encrypted disk and the possibility of encrypting the entire partition.
  • The ability to create self-sewn archives.
  • The possibility of free cloud backup, which works with any service - both paid and free.
  • Two-factor user authentication.
  • The system of trusted applications allowing you to allow access to encrypted files to specific applications.
  • The Cybersafe application supports the AES-NI instruction set, which has a positive effect on the program performance (this fact will be demonstrated below).
  • The Cybersafe program driver allows you to work on the network, which makes it possible to organize corporate encryption.
  • Russian-language program interface. For English-speaking users there is a possibility of switching into English.

Now about the shortcomings of the program. There are no special flaws from the program, but since the task was to be honestly compare programs, then the shortcomings will still have to find. If you carefully find fault, sometimes in the program (very, very rarely) "slip" unlocked messages like "Password is weak". Also, while the program does not know how to encrypt the system disk, but such encryption is not always and not necessary. But all these are little things compared to the hanging PGP Desktop and its value (but you still do not know about it).

Performance

When working with PGP Desktop, I got an impression (already immediately after installing the program) that the computer began to work slower. If it were not for this "sixth sense", then this section was not in this article. It was decided to measure the performance of the CrystalDiskmark program. All tests are conducted on a real machine - no virtual. Laptop Configuration Next - Intel 1000m (1.8 GHz) / 4 GB RAM / WD WD5000LPVT (500 GB, SATA-300, 5400 RPM, Buffer 8 MB / Windows 7 64-Bit). The car is not very powerful, but what is it.
The test will be made as follows. Run one of the programs and create a virtual container. Container parameters are as follows:
  • Virtual disk size - 2048 MB.
  • File System - NTFS
  • Disc letter Z:
After that, the program closes (a clear case, the virtual disk is unmounted) - so that nothing has prevented the test of the next program. The following program is launched, it creates a similar container and a test is performed again. To make it clear to read the test results, you need to talk about what the results of CrystalDiskmark:
  1. SEQ is a sequential recording / sequential read test (block size \u003d 1024KB);
  2. 512K - Test of the random recording / random reading (block size \u003d 512kb);
  3. 4k - the same as 512k, but block size 4 KB;
  4. 4K QD32 - Test of the random recording / reading (block size \u003d 4kb, the depth of the queue \u003d 32) for NCQ & AHCI.
During the test, all programs except Crystaldiskmark were closed. I chose the size of the test 1000 MB and set 2 passages to once again not rape your hard disk (as a result of this experiment, it also increased the temperature from 37 to 40 degrees).

Let's start with a conventional hard disk to make it with what to compare. Disk performance C: (and this is the only partition on my computer) will be considered a reference. So, I received the following results (Fig. 28).


Fig. 28. Hard disk performance

Now proceed to testing the first program. Let it be Folder Lock. In fig. 29 shows the parameters of the created container. Note: I use a fixed size. The results of the program are shown in Fig. 30. As you can see, there is a significant reduction in performance compared to the benchmark. But this is a normal phenomenon - after all, the data is encrypted and decrypted on the fly. Performance should be lower, the question is as far as.


Fig. 29. FOLDER LOCK container settings


Fig. 30. Folder Lock Results

The following program is PGP Desktop. In fig. 31 - parameters of the created container, and in Fig. 32 - Results. My feelings were confirmed - the program really works more slowly, which confirmed the test. But only a virtual disk, and even the whole system, which was not observed when working with other programs was not only when the program was "braked."


Fig. 31. PGP Desktop Container Parameters


Fig. 32. PGP Desktop Program Results

It remains to test the Cybersafe Top Secret program. As usual, first - the parameters of the container (Fig. 33), and then the results of the program (Fig. 34).


Fig. 33. Cybersafe Top Secret Container Parameters


Fig. 34. Cybersafe Top Secret

I think comments will be superfluous. By productivity, it was distributed as follows:

  1. Cybersafe Top Secret.
  2. Folder Lock.
  3. PGP Desktop.

Price and conclusions

Since we tested proprietary software, you need to consider another important factor - the price. The Folder Lock application will cost $ 39.95 per unit and $ 259.70 for 10 installations. On the one hand, the price is not very high, but the functionality of the program, frankly, is small. As already noted, there are few sense of files and wallets. Secure Backup function requires an additional fee, therefore, give almost 40 dollars (if you put yourself in place regular user, not the company) only for the possibility of encrypting files and creating self-sewn safes - expensive.
The PGP Desktop program will cost 97 dollars. And notice - this is just the initial price. The full version with the set of all modules will cost approximately $ 180-250 and this is only a license for 12 months. In other words, every year for using the program will have to lay out $ 250. As for me, this is a bust.
Cybersafe Top Secret is the Golden Middle, both in terms of functionality and price. For a regular user, the program will cost only $ 50 (special anti-crisis price for Russia, for the rest of the countries full version cost $ 90). Please note, so much is the most complete version of the Ultimate program.
Table 1 contains a comparative table of functions of all three products that can help you choose exactly your product.

Table 1. Programs and functions

Function Folder Lock. PGP Desktop. Cybersafe Top Secret.
Virtual encrypted discs Yes Yes Yes
Encryption of the entire section Not Yes Yes
System disk encryption Not Yes Not
Convenient integration with postal customers Not Not Yes
Email Email Encryption Yes (limited) Yes Yes
File encryption Not Yes Yes
EDS signing Not Yes Yes
EDS, check Not Yes Yes
Transparent folder encryption Not Not Yes
Self-resistant archives Yes Yes Yes
Cloud backup Yes (charge) Not Yes (broist)
System of trusted applications Not Not Yes
Support certified cryptoprovidera Not Not Yes
Support Tokenov Not No (support is discontinued) Yes (when installing cryptopro)
Own server keys Not Yes Yes
Two-factor authentication Not Not Yes
Hiding individual files Yes Not Not
Hiding hard disk partitions Yes Not Yes
Payment information storage wallets Yes Not Not
Support for guest encryption Not Not Yes
Russian interface Not Not Yes
Sequential read / write (diskmark), MB / s 47/42 35/27 62/58
Cost 40$ 180-250$ 50$

Considering all the factors set out in this article (functionality, performance and price), the winner of this comparison is the Cybersafe Top Secret program. If you have any questions, we will gladly answer them in the comments.

Tags: Add Tags