Menu
Is free
check in
the main  /  Multimedia / Program for encryption disk in Windows 7. Programs for encryption folders and files

A program for encryption disk in Windows 7. Programs for encryption folders and files

The main features of the program Folder Lock. Next:
  • AES-encryption, key length 256 bits.
  • Hiding files and folders.
  • Encryption of files (by creating virtual disks - safes) "on the fly".
  • Backup online.
  • Creating secure USB / CD / DVDs.
  • Encryption attachments email.
  • Creating encrypted "wallets" storing information about credit cards, accounts, etc.

It would seem that the possibilities of the program is quite enough, especially for personal use. Now let's look at the program in work. When you first start, the program asks to install a master password that is used to authenticate the user in the program (Fig. 1). Imagine this situation: you hid files, and someone else launched the program, viewed which files are hidden and access to them. Agree, not very good. But if the program requests a password, then this "someone" does not exit anything already - in any case, until he picks up or does not recognize your password.


Fig. 1. Setting the master password when you first start

First of all, let's see how the program hides the files. Go to section Lock Files., then either drag files (Fig. 2) and folders to the main program area or use the button Add.. As shown in Fig. 3, the program allows you to hide files, folders and discs.


Fig. 2. Drag the file, highlight it and click Lock


Fig. 3. Button Add.

Let's see what happens when we press the button. Lock. I tried to hide the file C: \\ Users \\ Denis \\ Desktop \\ Cs.zip. The file disappeared from the conductor, Total Commander. And the rest file managersEven if the display is enabled hidden files. The file hiding button is called Lock, and section Lock Files.. However, it would be necessary for these elements of the UI to name Hide and Hide Files, respectively. Because in fact, the program does not block access to the file, but simply "hides" it. Look at Fig. 4. I, knowing the exact name of the file, copied it to the CS2.Zip file. The file was calmly copied, there were no access errors, the file was not encrypted - he unpacked, as usual.


Fig. 4. Copying a hidden file

By itself, the function of the concealment is stupid and useless. However, if you use it with the file encryption function - to conceal the safes created by the program - then the efficiency of its use will increase.
In chapter Encrypt Files. You can create safes (Lockers). Safe is an encrypted container, which, after mounting, can be used as a regular disk - encryption is not easy, but transparent. The same technique is used by many other encryption programs, including TrueCrypt, Cybersafe Top Secret, etc.


Fig. 5. Section Encrypt Files

Press the button Create Locker, In the window that appears, enter the name and select the location of the safe (Fig. 6). Next, you need to enter a password to access the safe (Fig. 7). The next step is the choice file System and the size of the safe (Fig. 8). Safe size - dynamic, but you can set the maximum limit. This saves disk space if you do not use the Safety Deposit Browse. If you wish, you can create a fixed-size safe, which will be shown in the "Performance" section of this article.


Fig. 6. Title and location of the safe


Fig. 7. Password to access the safe


Fig. 8. File system and safes

After that, you will see the UAC window (if it is turned on), in which it will be necessary to click Yes, then a window will be displayed with information about the created safe. It is necessary to press the FINISH button, after which the conductor window will be opened, which displays a supported container (carrier), see Fig. nine.


Fig. 9. Virtual disk created by the program

Return to section Encrypt Files. And select the desired safe (Fig. 10). Button Open Locker Allows you to open a closed safe, Close Locker - close open, button Edit Options. Calls a menu in which you are deleting / copying / renamed / change the safe password. Button Backup Online Allows you to execute backup Safe, and not somewhere, but in a cloud (Fig. 11). But first you have to create an account Secure Backup Account., After that, you will receive up to 2 TB of disk space, and your safes will be automatically synchronized with the online storage, which is especially useful if you need to work with the same safe on different computers.


Fig. 10. Safety operations


Fig. 11. Creating Secure Backup Account

Nothing is just like that. Rates for storing your safes can be found at Secure.NewsoftwareS.Net/signup?id\u003den. For 2 TB will have to put $ 400 per month. 500 GB will cost $ 100. To be honest, it is very expensive. For $ 50-60, you can rent a whole VPS from 500 GB "Onboard", which you can use as a repository for your safes and even create your own website on it.
Please note: the program knows how to create encrypted sections, but unlike the PGP Desktop program, it does not know how to encrypt all the disks. In chapter Protect USB / CD You can protect your USB / CD / DVDs, as well as email attachments (Fig. 12). However, this protection is carried out not by encrypting the carrier itself, but by recording to the appropriate carrier of the self-sewn safe. In other words, a trimmed portable version of the program will be recorded on the selected medium, which is allowed to "open" safe. As such support for postal customers, this program is also not. You can encrypt the attachment and attach it (already encrypted) to the letter. But the attachment is encrypted by the usual password, and not PKI. I think about reliability there is no point.


Fig. 12. Section Protect USB / CD

Section Make Wallets. Allows you to create wallets containing information about your credit cards, bank accounts, etc. (Fig. 13). All information, of course, is stored in encrypted form. I can say with all responsibility that this section is useless, since the function of exporting information from the wallet is not provided. Imagine that you have many bank accounts and you made information about each of them to the program - the account number, the name of the bank, the account owner, SWIFT code, etc. Then you need to provide information about the account of the third person to transfer you money. You will have to manually copy each field, insert it into a document or email. The presence of export functions would greatly facilitate this task. As for me, it is much easier to store all this information in one general document to be placed on the created program. virtual disk - Safe.


Fig. 13. Wallers

Advantages of the Folder Lock Program:

  • Attractive I. understandable interfacethat will enjoy novice users who speak English.
  • Transparent encryption "on the fly", the creation of virtual encrypted discs with which you can work with as with conventional discs.
  • Ability to back up online copying and synchronization of encrypted containers (safes).
  • The ability to create self-seeping containers on USB / CD / DVDs.

Disadvantages of the program:

  • There is no support for the Russian language, which will complicate work with the program of users who are not familiar with English.
  • The dubious functions of the Lock Files (which simply hides, and not "locks" files) and make wallets (ineffective without exporting information). Honestly, I thought that the Lock Files feature would provide transparent encryption folder / disk file, as does the Cybersafe Top Secret or file system.
  • Lack of file signing, digital signature checks.
  • When opening a safe, it does not allow you to select the drive letter, which will be assigned to a virtual disk that corresponds to the safe. In the program settings, you can only select the order in which the program will assign a drive letter - ascending (from A to Z) or descending (from Z to A).
  • No integration S. postal clients, There is only the ability to encrypt the attachment.
  • High cost of cloud backup.

PGP Desktop.

The PGP Desktop program from Symantec is a set of encryption programs that provides flexible multi-level encryption. The program differs from Cybersafe Topsecret and Folder Lock close integration into the system shell. The program is embedded in the shell (conductor), and access to its functions is carried out through the context menu of the conductor (Fig. 14). As you can see, in the context menu there are encryption functions, file signatures, etc. Quite interesting is the function of creating a self-seeping archive - according to the principle of self-extracting archive, only instead of unpacking the archive also deciphered. However, the Folder Lock and Cybersafe programs also have a similar function.


Fig. 14. Context Menu PGP Desktop

Also, access to the functions of the program can be obtained through the system tray (Fig. 15). Team Open PGP Desktop. Opens the main program window (Fig. 16).


Fig. 15. The program in the system tray


Fig. 16. PGP Desktop window

Program sections:

  • PGP Keys. - Key management (both own and imported with Keyserver.pgp.com).
  • PGP Messaging - Management of messaging services. When installing the program automatically detects your accounts And automatically encrypts the AOL Instant Messenger communication.
  • PGP Zip. - Management of encrypted archives. The program supports transparent and opaque encryption. This section is just implementing opaque encryption. You can create an encrypted zip archive (PGP Zip) or a self-seeping archive (Fig. 17).
  • PGP DISK. - This is the implementation of a transparent encryption function. The program can how to encrypt the entire section hard disk (or even the entire disk) or create a new virtual disk (container). Here there is a SHRED FREE SPACE function that allows you to lose free space on the disk.
  • PGP Viewer. - Here you can decipher PGP messages and attachments.
  • PGP Netshare. - The "Sharing" tool for folders, and the "balls" are encrypted using PGP, and you have the opportunity to add / delete users (users are identified on the basis of certificates) that have access to the "ball".


Fig. 17. Self-resistant archive

As for the virtual disks, I especially liked the possibility of creating a virtual dynamic size disk (Fig. 18), as well as the choice of an algorithm other than AES. The program allows you to select the drive letter to which the virtual disk will be configured, and also allows you to automatically mount the disk when the system starts and unmounting with a simple (by default after 15 minutes of inaction).


Fig. 18. Creating a virtual disk

The program tries to encrypt everything and everything. It monitors POP / SMTP connections and offers them to protect them (Fig. 19). The same applies to customers for exchanging instant messages (Fig. 20). It is also possible to protect IMAP connections, but it is necessary to separately include in the program settings.


Fig. 19. SSL / TLS connection detected


Fig. 20. PGP Im in action

It is a pity that PGP Desktop does not support popular modern programs like Skype and Viber. Who is now using AOL im? I think there are some such.
Also, when using PGP Desktop, it is difficult to configure email encryption that only works in intercept mode. And what if the encrypted mail was already received, and PGP Desktop was launched after receiving an encrypted message. How to decipher it? You can, of course, but you have to do this manually. In addition, the already deciphered letters in the client are no longer protected. And if you configure the client to certificates, as is done in the Cybersafe Top Secret program, then the letters will always be encrypted.
Interception mode is also not very good, as mail protection message appears each time each new mail server, and gmail is a lot of them. Mail protection window very quickly you get tired.
The program stability is also no different (Fig. 21).


Fig. 21. PGP Desktop hung ...

Also after its installation, the system worked slower (subjectively) ...

Advantages of the PGP Desktop program:

  • A full-fledged program used to encrypt files, signing files and checks electronic signature, transparent encryption (virtual disks and encryption of the entire partition), email encryption.
  • Keyserver.pgp.com keys server support.
  • The ability to encrypt the system hard disk.
  • PGP Netshare feature.
  • The ability to rub free space.
  • Close integration with conductor.

Disadvantages of the program:

  • Lack of Russian support, which will complicate work with the program to users who do not know English.
  • Unstable program work.
  • Low program performance.
  • There is support for AOL IM, but no Skype and Viber support.
  • Already deciphered letters remain unprotected on the client.
  • Mail protection only works in the intercept mode, which is quickly tired, because the mail protection window will appear every time for each new server.

Cybersafe Top Secret.

As in , detailed description Cybersafe Top Secret will not be, because in our blog and so much has been written about it (Fig. 22).


Fig. 22. Cybersafe Top Secret

However, we still pay attention to some moments - the most important. The program contains key management tools and certificates, and the presence in the Cybersafe its own key server allows the user to publish its own open key, as well as get the open keys of other employees of the company (Fig. 23).


Fig. 23. Key management

The program can be used for encryption. individual filesWhat was shown in the article. As for encryption algorithms, the Cybersafe Top Secret program supports GOST algorithms and a Cryptopro Cryptoproider certified, which allows it to be used in state institutions and banks.
Also, the program can be used for transparent folder encryption (Fig. 24), which allows it to be used as a replacement for EFS. And, given that the Cybersafe program turned out to be more reliable and faster (in some scenarios) than EFS, it is not only possible to use it, but also needed.


Fig. 24. Transparent folder encryption C: \\ CS-Crypted

Cybersafe Top Secret features Reminds the PGP Desktop functionality - if you notice, the program can also be used to encrypt email messages, as well as for electronic signatures of files and checking this signature (section El. digital signatureSee fig. 25).


Fig. 25. Section El. digital signature

Like the PGP Desktop program, Cybersafe Top Secret is able to create virtual encrypted discs and encrypt completely. It should be noted that the Cybersafe Top Secret program can create virtual disks of fixed size only, as opposed to Folder Lock and PGP Desktop programs. However, this lack is neutralized by the possibility of transparent encryption of the folder, and the size of the folder is limited only by the size of the free space on the hard disk.
Unlike PGP Desktop, Cybersafe Top Secret does not know how to encrypt systemic hDDIt is limited only to the encryption of external and internal non-system drives.
But Cybersafe Top Secret has the possibility of cloud backup, and, unlike the Folder Lock, this feature Absolutely free, more precisely, the cloud backup function can be configured to any service - both paid and free. You can read more about this feature in the article.
It also needs to be noted two important features of the program: two-factor authorization and system of trusted applications. In the program settings, you can or set the password authentication or two-factor authentication (Fig. 26).


Fig. 26. Programs settings

On the tab Allowed. Applications You can define trusted applications that are allowed to work with encrypted files. By default, all applications are trusted. But for greater security, you can specify applications that are allowed to work with encrypted files (Fig. 27).


Fig. 27. Trusted applications

Advantages of Cybersafe Top Secret:

  • Support for algorithms for encryption of GOST and certified cryptoproder cryptopro, which allows the program not only to individuals and commercial organizations, but also to government agencies.
  • Support for transparent folder encryption, which allows you to use the program as an EFS replacement. Given that the program provides, such a replacement is more than justified.
  • The ability to sign the electronic digital signature files and the ability to check the signature of the file.
  • Built-in keys server that allows you to publish keys and access other keys that have been published by other employees of the company.
  • The ability to create a virtual encrypted disk and the possibility of encrypting the entire partition.
  • The ability to create self-sewn archives.
  • The possibility of free cloud backup, which works with any service - both paid and free.
  • Two-factor user authentication.
  • The system of trusted applications allowing you to allow access to encrypted files to specific applications.
  • The Cybersafe application supports the AES-NI instruction set, which has a positive effect on the program performance (this fact will be demonstrated below).
  • The Cybersafe program driver allows you to work on the network, which makes it possible to organize.
  • Russian-language program interface. For English-speaking users there is a possibility of switching into English.

Now about the shortcomings of the program. There are no special flaws from the program, but since the task was to be honestly compare programs, then the shortcomings will still have to find. If you carefully find fault, sometimes in the program (very, very rarely) "slip" unlocked messages like "Password is weak". Also while the program does not know how to encrypt system DiskBut such encryption is not always and not necessary. But all these are little things compared to the hanging PGP Desktop and its value (but you still do not know about it).

Performance

When working with PGP Desktop, I got an impression (already immediately after installing the program) that the computer began to work slower. If it were not for this "sixth sense", then this section was not in this article. It was decided to measure the performance of the CrystalDiskmark program. All tests are conducted on a real machine - no virtual. Laptop Configuration Next - Intel 1000m (1.8 GHz) / 4 GB RAM / WD WD5000LPVT (500 GB, SATA-300, 5400 RPM, Buffer 8 MB / Windows 7 64-Bit). The car is not very powerful, but what is it.
The test will be made as follows. Run one of the programs and create a virtual container. Container parameters are as follows:
  • Virtual disk size - 2048 MB.
  • File System - NTFS
  • Disc letter Z:
After that, the program closes (a clear case, the virtual disk is unmounted) - so that nothing has prevented the test of the next program. Running next programIt creates a similar container and the test is performed again. To make it clear to read the test results, you need to talk about what the results of CrystalDiskmark:
  1. SEQ is a sequential recording / sequential read test (block size \u003d 1024KB);
  2. 512K - Test of the random recording / random reading (block size \u003d 512kb);
  3. 4k - the same as 512k, but block size 4 KB;
  4. 4K QD32 - Test of the random recording / reading (block size \u003d 4kb, the depth of the queue \u003d 32) for NCQ & AHCI.
During the test, all programs except Crystaldiskmark were closed. I chose the size of the test 1000 MB and set 2 passages to once again not rape your hard disk (as a result of this experiment, it also increased the temperature from 37 to 40 degrees).

Let's start with a conventional hard disk to make it with what to compare. Disk performance C: (and this is the only partition on my computer) will be considered a reference. So, I got the following results (Fig. 28).


Fig. 28. Hard disk performance

Now proceed to testing the first program. Let it be Folder Lock. In fig. 29 shows the parameters of the created container. Note: I use a fixed size. The results of the program are shown in Fig. 30. As you can see, there is a significant reduction in performance compared to the benchmark. But this is a normal phenomenon - after all, the data is encrypted and decrypted on the fly. Performance should be lower, the question is as far as.


Fig. 29. FOLDER LOCK container settings


Fig. 30. Folder Lock Results

The following program is PGP Desktop. In fig. 31 - parameters of the created container, and in Fig. 32 - Results. My feelings were confirmed - the program really works more slowly, which confirmed the test. But only a virtual disk, but even the whole system, which was not observed when working with other programs was not only when it was "braked."


Fig. 31. PGP Desktop Container Parameters


Fig. 32. PGP Desktop Program Results

It remains to test the Cybersafe Top Secret program. As usual, first - the parameters of the container (Fig. 33), and then the results of the program (Fig. 34).


Fig. 33. Cybersafe Top Secret Container Parameters


Fig. 34. Cybersafe Top Secret

I think comments will be superfluous. By productivity, it was distributed as follows:

  1. Cybersafe Top Secret.
  2. Folder Lock.
  3. PGP Desktop.

Price and conclusions

Since we tested proprietary software, you need to consider another important factor - the price. The Folder Lock application will cost $ 39.95 per unit and $ 259.70 for 10 installations. On the one hand, the price is not very high, but the functionality of the program, frankly, is small. As already noted, there are few sense of files and wallets. The Secure Backup feature requires an additional fee, therefore, to give almost $ 40 (if you put yourself in place of the usual user, not the company) only for the possibility of encrypting files and create self-seated safes - expensive.
The PGP Desktop program will cost 97 dollars. And notice - this is just the initial price. Full version With a set of all modules, it will cost about $ 180-250 and this is only a license for 12 months. In other words, every year for using the program will have to lay out $ 250. As for me, this is a bust.
Cybersafe Top Secret is the Golden Middle, both in terms of functionality and price. For a regular user, the program will cost only $ 50 (special anti-crisis price for Russia, for the rest of the countries the full version will cost $ 90). Please note, so much is the most complete version of the Ultimate program.
Table 1 contains a comparative table of functions of all three products that can help you choose exactly your product.

Table 1. Programs and functions

Function Folder Lock. PGP Desktop. Cybersafe Top Secret.
Virtual encrypted discs Yes Yes Yes
Encryption of the entire section Not Yes Yes
System disk encryption Not Yes Not
Convenient integration with postal customers Not Not Yes
Email Email Encryption Yes (limited) Yes Yes
File encryption Not Yes Yes
EDS signing Not Yes Yes
EDS, check Not Yes Yes
Transparent folder encryption Not Not Yes
Self-resistant archives Yes Yes Yes
Cloud backup Yes (charge) Not Yes (broist)
System of trusted applications Not Not Yes
Support certified cryptoprovidera Not Not Yes
Support Tokenov Not No (support is discontinued) Yes (when installing cryptopro)
Own server keys Not Yes Yes
Two-factor authentication Not Not Yes
Hiding individual files Yes Not Not
Hiding hard disk partitions Yes Not Yes
Payment information storage wallets Yes Not Not
Support for guest encryption Not Not Yes
Russian interface Not Not Yes
Sequential read / write (diskmark), MB / s 47/42 35/27 62/58
Cost 40$ 180-250$ 50$

Considering all the factors set out in this article (functionality, performance and price), winner this comparison Is Cybersafe Top Secret. If you have any questions, we will gladly answer them in the comments.

Tags:

  • data encryption
  • protection of information
Add Tags

Editor's Choice

Programs encryption files

Encrypt everything!

Every time the information about the scandal associated with the fact that important documents leaked somewhere were leaked, I ask myself why they were not encrypted? Document protection should be everywhere in the end.

Encryption algorithms

The encryption algorithm is similar to a black box. Dump document, images or other file that you download to it, you get back. But what you see seems to be nonsense.

You can turn this plate back to a normal document through a window with the same password that you entered when encrypted. Only so you get the original.

The US government recognized the advanced encryption standard (AES) as a standard, and all products that are assembled here, support AES encryption standard.

Even those who support other algorithms are usually recommended to use AES.

If you are an encryption expert, you may prefer another algorithm, blowfish, and perhaps even the algorithm of the Soviet government for GOST.

But it is already completely for lovers of extreme entertainment. For an ordinary user AES is just an excellent solution.

Open key cryptography and exchange

Passwords are important and you must keep them secret, right? Well, not when using open key infrastructure (PKI), which is used in cryptography.

If I want to send you a secret document, I just encrypt it using an open key. When you get it, you can use it to decipher the document. All simple!

Using this system in the opposite direction, you can create a digital signature that confirms that your document came from you and was not changed. How? Just encrypt it with your closed key.

The fact that your public key decrypts it is proof that you have the right to edit it.

PKI support is less common than support for traditional symmetric algorithms.

Many products allow the creation of self-seeping executable files.

You may also find that the recipient can use a free definite tool for decryption only.

What's better?

Now there is a huge selection of products available in the encryption area.

Everyone simply has to choose the solution that will be convenient for functionality, practical and stylish from the point of view of the primary program interface.

Digital CertainSafe Safe passes through a multistage security algorithm that identifies you on the site. You will have to pass several authentication.

Your files are encrypted if they are trying to hack, they crumple themselves, and no one can recreate them. In this case, there is a certain risk, but at the same time, the level of reliability is very worthy.

Then each piece of file is stored on another server. A hacker who was able to hack one of the servers will not be able to do anything useful.

Lock can encrypt files or just lock them so that no one can open them. It also offers encrypted lockers for safe storage personal confidential.

Among many others useful features It is possible to note the possibility of grinding, binding of free space, secure network backup and self-seeping files.

Veracrypt (Windows / OS X / Linux)

Veracrypt supports encryption on TrueCrypt, which has ceased to develop last year.

The developer team argues that they have already considered the issue raised during the initial TrueCrypt audit, and believe that it can still be used as an accessible version for, OS X and.

If you are looking for a file encryption tool that really works, then it is it. Veracrypt supports AES (most frequently used algorithm).

It also supports TWOFISH and Serpent Encryption Ciphers, supports both hidden encrypted volumes.

The program code is open, most of the code base consists of TrueCrypt.

The program is also constantly developing, regular security updates and independent audit at the planning stage (according to developers).

Those of you who have already tried it, praised it for the fact that the encryption tool works perfectly on the fly, and in your files are decrypted only when they are needed. So the rest of the time they are stored in an encrypted form.

Especially users note that the program is a powerful tool that is easy to use and always to the place. Yes, he lacks a pretty interface or tons of bells.

AXCRYPT (Windows)

AxCrypt is a free program, open source code GNU licenses.

The GPL-licensed encryption tool for Windows, which is proud to be simple, efficient and reliable to use.

It is perfectly integrated with the Windows shell, so you can right-click on the file that you want to encrypt and give the command.

Or you can simply configure the executable code, so the file will be blocked if it is not used for a certain period of time. It can be decrypted later, or when the recipient will notify about receipt.

Files with AxCrypt can be decrypted on request or keep them decrypted while they are used, and then automatically they will be encrypted.

It supports 128-bit AES encryption, provides protection against hacking attempts. It is very light (less than 1 MB.)

Everyone himself decides which program to use, but if your data is at least worth something for you, be sure to think about what you need a program for encryption.

Encryption of files and folders in Windows

Programs for encryption files: what better to choose?

Encryption is the process of encoding information in such a way that it cannot be accessible to other people if they do not have the necessary key for decoding. Encryption is usually used to protect important documents, but it is also good way Stop people who are trying to steal your personal data.

Why use categories? To smash a huge variety of information encryption programs for simpler and understandable sets of programs, i.e. structure. This article is limited to a set of utilities for encrypting files and folders.

  1. File and folder encryption utilities - these utilities are discussed in this article.These encryption utilities operate directly with files and folders, in contrast to utilities that encrypt and storing files in volumes (archives, that is, in file containers). These encryption utilities can operate in "on demand" mode or in the "on the fly" mode.
  2. Virtual disk encryption utilities. Such utilities work using volume creation tools (encrypted containers / archives), which are submitted in the file system as virtual disks with their letter, for example, "L:". These discs can contain both files and folders. The file system of the computer can read, write and create documents in real time, i.e. in open video. Such utilities work in "on the fly" mode.
  3. Full-Drive encryption utilities - encrypt all storage devices, for example, themselves hard drives, disk sections and USB devices. Some of the utilities in this category can also encrypt the disk on which the operating system is installed.
  4. Client encryption utilities in the "cloud": New category encryption utilities. These file encryption utilities are used before downloading or sync with the "cloud". Files are in encrypted form when transmitted and while stored in the cloud. The encryption utilities in the "cloud" use various virtualization forms to provide access to the source text on the client side. At the same time, all work occurs in "on the fly" mode.

Cautions

    Operating systems are vicious: Echo of your personal data - paging files, temporary files, power saving mode files ("sleep system"), remote files, browser artifacts, etc. - Most likely, will remain on any computer that you use to access the data. This is a nontrivial task - to highlight it echo of your personal data. If you need a hard disk data protection during their move or receipt from the outside, then this is a rather complicated task. For example, when you create an encrypted file archive or unzipping such an archive, then, accordingly, the original version of files or copies of the original files from this archive remain on the hard disk. They can also stay in the places of temporary file storage (aka TEMP folders, etc.). And it turns out that the task of deleting these original versions becomes the task not simple removal These files using the "Delete" command.

  1. The fact that the encryption program "works" does not mean that it is safe. New encryption utilities often appear after "someone" reads applied cryptography, choose the algorithm and takes on the development. Maybe even "someone" uses the proven opensis code. Implements user interface. Make sure that it works. And thinks that this is all finished. But it is not. Such a program is probably filled with fatal bugs. "Functionality does not mean quality, and no beta testing will uncover the security problems. Most of the products are a beautiful word" observed ". They use cryptography algorithms, but they themselves are not safe." (Free translation) - Bruce Schneier, from Security Pitfalls in Cryptography. (Source phrase: "Functionality Does not Equal Quality, and No Amount of Beta Testing Will Ever Reveal A Security Flaw. Too Many Products Are Merely Buzzword Complent; They Use Secure Cryptography, But The Are Not Secure. ").
  2. Using encryption is not sufficient to ensure the security of your data. There are many ways to circumvent protection, so if your data is "very secret", then it is also necessary to think about other protection paths. As "Start" for additional searching, you can use an article risks to use cryptographic software.

Overview of file encryption programs and folders

TrueCrypt. once was the most best Program In this category. And so far is one of the best, but no longer corresponds to this category, as it is based on the use of virtual disks.

Most, if not all programs described below are exposed to non-obvious threats, which are described above in paragraph No. 1 from the listredoxeons . TrueCrypt, which is based on working with sections, and not at work with files and folders - does not expose users of this vulnerability.

Sophos Free Encryption - no longer available.

Related Products and Links

Related Products:

Alternative products:

  • Safehouse Explorer is a simple, free program that weighs enough, which allows it to easily use USB drives. You can also find well-prepared video materials and user manual on their website.
  • Rohos Mini Drive is a portable (Portable) program that creates a hidden, encrypted partition on a USB drive.
  • Freeotfe (From the review of the Virtual Disk Encryption Utilities) is a program for the encryption of the disk "on the fly". It can be adapted for portable (portable) use.
  • Freeotfe Explorer is a simple version of Freeotfe. It does not require administrator rights.
  • Pismo File Mount Audit Package is a file system extension that provides access to special encrypted files (through the context menu. windows Explorer) In turn, which provide access to encrypted folders. Applications can write directly to these folders, which makes it possible to ensure that text copies of the original document will not remain on the hard disk.
  • 7-ZIP is a powerful utility to create file archives that provides 256-bit AES encryption for * .7z and * .zip formats. However, the Pismo program is a better solution, since it avoids the problem of storing unencrypted file versions.

Quick Selection Guide (download programs for encryption files and folders)

AxCrypt.

Integration S. context menu Windows Explorer. AxCrypt allows you to easily open, edit and save encrypted files as if you work with unencrypted files. Use this product if you need to work often with encrypted files.
The program uses Open Candy (installed in an additional third-party kit. software). If you want, you can not install it, but then you need to register on the site.

Many users are waiting for a long time by Microsoft add a native function to Windows, which will protect certain password folders (for example, which contain confidential information). So far, this has not happened, and therefore, we have only one thing - use programs created by third-party developers. However, even though there are many such programs, most of them do not differ in particular quality. We tested more than 20 tools of this type and selected 5 of the best.

Lock-A-Folder is the perfect solution for the most demanding users. The program uses only one master password and has a very simple user interface. Moreover, the program does not offer any settings at all.

After selecting folders that require protection, all you need to do is close the application. Instead of using encryption, this program simply hides folders from any user who can try to access them. To restore access to secure folders, you will have to open the lock-a-folder again and use the Unlock button (UNLOCK).

This program is available completely free.

This is one of the best programs we tested. It has many functions, and they all work very well. With Folder Guard, you can protect files and folders using individual passwords, or just hide and block them. The interface looks great - it is well structured and very easy to use. The folders you want to protect can be selected in the tree list, or simply drag them into the program window.

Really useful feature of the program is to create filters for different types Files so that they will be protected automatically. In addition, you can selectively assign access rights for user accounts on your computer.

This program is paid, but there is a trial version that works within 30 days. The full version costs $ 59.95. Having bought it, you will receive updates to any new version During the first year of use. In addition, one license can be used on 2 computers. However, after the first year, if you want to receive further updates, you will have to pay for a new license.

To protect the folders, this program uses encryption. Folder Protector does not require installation. Thus, all you need to do is run the executable file, select the folder, enter the password twice and click "Protect". All files inside the encrypted folder will be hidden, and you will detect there only a small executable file that you will need when you want to unlock the folder.

The program works for free with some restrictions. You can configure it to use 256-bit encryption only if you get a Pro version that costs $ 22.95.

FOLDER LOCK LITE is another solid program that allows you to protect folders, files and even entirely discs. When you first start, you will be prompted to enter a master password. This password will be used for each folder or file that you decide to block. You can then simply drag the items that you want to protect, to the main program interface. All folders selected for protection will be immediately blocked and hidden. No one can get access to them without your password.

Trial version Allows you to use this program for 30 days. For further use you will have to pay $ 39.95.

This program is easy to use and has a pleasant and understandable user interface. It uses a single master password for all the folders you choose to protect.

To add folders, use the Add button, but you can simply drag them into the program interface. Protected Folder offers several options, including ways that you can overlap access to users who do not have a password.

It is also worth mentioning that you will not be able to delete this program without prior to the master password. During deletion, all your secure folders will be automatically unlocked. Thus, the risk of data loss is eliminated.

20 Programs launches are free without any restrictions. One year license costs 600 rubles.

What we learned during testing

No need to set more than one program of this type. We encountered a problem when programs blocked each other, and we could not have access to folders protected by one program after installing the other.

Another problem is that most of the programs of this type forget to unlock the folders protected by them when you delete them. Thus, you can easily lose access to your data. However, the programs described above do not have this shortage, so after their removal you will not be blocked or hidden folders.

Excellent day!

On our carriers in huge quantities Personal I. important information, Documents and Media Files. They must be protected. Cryptographic methods like AES. and TwofishStandardly offered in encryption programs belong to about one generation and provide a relatively high level of security.

In practice, the usual user will not be able to make a mistake in choosing. Instead, it is worth deciding to determine the specialized program depending on the intentions: often the encryption of the hard disk uses a different operating mode than encrypting files.

For a long time the best choice There was a utility TrueCrypt.If it came about the full encryption of the hard disk or save data in an encrypted container. Now this project is closed. An open source program was his worthy receiver Veracrypt.. The TrueCrypt code was put in its foundation, but it was finalized, thanks to which the encryption quality increased.

For example, in VeraCrypt improved password key generation. For encryption hard disks not such a common mode as CBC., but XTS.. In this mode, blocks are encrypted by type ECB.However, the sector number is added and insegoment displacement.

Random numbers and strong passwords

To protect individual files enough free program from simple interface, eg, Maxa Crypt Portable or AxCrypt.. We recommend AxCrypt because it is an open source project. However, when it is installed, you should pay attention to the fact that unnecessary additions are in the package with the application, so they need to withdraw flags.

The utility is run by right-clicking on a file or folder and password input (for example, when opening an encrypted file). This program uses the AES algorithm. 128 bits with CBC mode. To create a reliable initialization vector (IV) AX-CRYPT embeds the generator of pseudo-random numbers.

If IV is not a true random number, then the CBC mode weakens it. Maxa Crypt Portable works in a similar way, but encryption occurs with the key 256 bits long. If you download personal information in cloud storageIt is necessary to proceed from the fact that their owners, such as Google and Dropbox, scan content.

BOXCRYPTOR is embedded in the process as virtual hard Disc and click right-clicking encrypts all files there are even before downloading to the cloud. It is important to get a password manager, such as Password Depot.. He creates sophisticated passwordswho will not be able to remember not one person. Need to only not to lose Master password to this program.

Use encrypted discs

Like TrueCrypt, Master Utilities Veracrypt. Will a user through all the stages of creating an encrypted disc. You can also protect the existing partition.

Encryption with one click

Free program Maxa Crypt Portable It offers all the necessary options for quick encryption of individual files according to the AES algorithm. Pressing the button you start generating a secure password.

We associate a cloud with a private life

Boxcryptor One click encrypts important files before downloading to the Dropbox or Google storage. Default applies AES encryption with a key length of 256 bits.

Crowded Stone - Password Manager

Long passwords enhance safety. Program Password Depot. Generates and applies them, including for encrypting files and working with web services that transmits data to access an account.

Photo: Manufacturers companies