Advertisement
subyduby

DriveCrypt Plus Pack v5.3.0 cracked version download

Mar 4th, 2015
585
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
ASP 5.75 KB | None | 0 0
  1.                                         DriveCrypt Plus Pack v5.3.0
  2.  
  3.  
  4.  
  5.  
  6.  
  7.  
  8.  
  9.  
  10.             This is the full cracked version of the software. Download, extract, install, enjoy.
  11.    Inside the archive there is "crack" folder wich contains everything you need to crack the software.
  12.                                                 Download link:
  13.                                     https://safelinking.net/p/623245f158
  14.  
  15.  
  16.  
  17.  
  18. DriveCrypt Plus Pack provides true real-time "on the fly" 256-bit disk encryption. Providing advanced FDE (Full disk encryption) as opposed to VDE (Virtual disk encryption) or "container" encryption, DCPP is an important evolutionary step in the field of transparent data protection.
  19.  
  20.  
  21. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm chosen by the National Institute of Standards and Technology (NIST) and stated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S. Government organizations (and others) to protect sensitive information.
  22.  
  23.  
  24. DCPP file encryption software is automatic and completely transparent to the user. Not only does this decrease user involvement and training requirements, but also it creates the foundation for enforceable security. The careful integration of boot protection and automatic encryption provides a high degree of security with minimal impact on users. Boot protection prevents subversion of the operating system (via floppy boot-up, for example) or the introduction of rogue programs while sector by sector encryption makes it impossible to copy individual files for brute force attacks. DCPP Windows encryption safeguards the operating system and the important system files (which often contain clues to passwords for Windows).
  25.  
  26. DCPP is the fastest and most feature-rich real-time full disk encryption system available, Special care has been taken to render all cryptographic parts as invisible & transparent as possible.
  27.  
  28.  
  29. £ top
  30.  
  31. Pre-Boot Authentication
  32.  
  33.  
  34. The user is authenticated by means of pre-boot authentication (PBA) before the system is started and therefore before the operating system is booted. This kind of authentication cannot be manipulated, PBA therefore guarantees maximum security. Neither keys nor passwords are stored on the PC's hard disk. All of the information required to boot the operating system is derived from the password. This makes the use of hard disk tools for analysing the hard disk completely ineffective. PBA in provided by a system call BootAuth and is a fully graphical login screen.
  35.  
  36.  
  37. £ top
  38.  
  39.  
  40.  
  41.  
  42. Full disk Encryption
  43.  
  44. Automatic & transparent Full disk encryption (FDE) offers several key advantages relative to file encryption. FDE secures the system and temp files that often contain sensitive data but are missed by file encryption. Even removing the drive itself does not give access to any file or directory structure. FDE is performed sector by sector without creating temp or backup files. As a result, large files will decrypt without delay whereas file encryption is normally much slower. Whole disk encryption also avoids such time consuming tasks as secure deletes of temp files or work files in clear text, and obviates the need to do a full delete on disks to be discarded.
  45.  
  46.  
  47. £ top
  48.  
  49. How does it work?
  50.  
  51.  
  52. As data is read from the hard disk, DCPP automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. This process is completely transparent to the user or any application programs, the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of their PC. In addition, only individual sectors are decrypted at any one time, not the whole hard disk. Other products that claim to be "on the fly" decrypt an entire file and load it into memory, creating significant security risks. DCPP is smarter and more secure because it decrypts only the specific sectors of a file that are in use. Unprotected data never resides on a DCPP encrypted disk.
  53.  
  54.  
  55. £ top
  56.  
  57.  
  58.  
  59.  
  60. Hidden Operating System:
  61.  
  62.  
  63. DCPP is the only disk encryption software on the market able to hide an entire operating system inside the free disk space of another operating system. You can practically define two passwords for your DCPP encrypted disk: One password is for the visible operating system, the other for the invisible one. The first "fake" password gives you access to a pre-configured operating system (outer OS), while the other gives you access to your real working operating system. This functionality is extremely useful if you fear that someone may force you to provide the DCPP password; in this case, you simply give away the first (fake) password so that your attacker will be able to boot your system, but only see the prepared information that you want him to find. The attacker will not be able to see any confidential and personal data and he will also not be able to understand that the machine is storing one more hidden operating system. On the other hand, if you enter your private password (for the invisible disk), your system will boot a different operating system (your working system) giving you the access to all your confidential data. The creation of a hidden operating system is not obligatory and as such, it is not possible for anyone who does not have the hidden OS password to know or find out if a hidden operating system exists or not.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement