Software encrypts files, folders, or drives.
September 14, 2007 -
Using Rijndael, Twofish, or Blowfish encryption algorithms, Bluest CryptShield v1.5 scrambles data and creates secure file-based virtual drives or entire storage drives. Once encrypted drive is created, it is completely untraceable until it is mounted. Hidden drive can be mounted manually or automatically with password authentication, and can be shared with other network machines. After copying file to encrypted USB drive, user can shred original document by overwriting it by 0x00.
(Archive News Story - Products mentioned in this Archive News Story may or may not be available from the manufacturer.)
|Original Press release |
2102 Business Center Dr., Suite 130
Irvine, CA, 92612
Protect Documents in Your USB Drive before They Say Bye-Bye to You
Imagine searching through the pocket for your USB thumb drive one day only to find that you lost it and all confidential documents you've saved to it are gone! If you feel queasy just thinking about it, then why not use the encryption software like Bluest CryptShield and protect your important files from getting into someone's hands.
IRVINE, California - September 6, 2007: BluestSoft today introduces Bluest CryptShield 1.5 that can encrypt files, folders or drives from unwanted access. CryptShield uses one of the three types of encryption algorithms, such as Rijndael (AES), Twofish (AES finalist), or Blowfish (448 bit) to scramble the data and create secure file-based virtual drives or entire storage drives.
Using the CryptShield application, you create a file-based virtual drive or entire physical disk such as a hard drive or a removable device as encrypted drives. Once the encrypted drive is created, it gets completely untraceable for other people until it is mounted.
The hidden drive can be mounted either manually or automatically (with password authentication) and can even be shared with other network machines. In the automatic mode, the drive can be set to mount when you log in and unmount when you log off, or when the application is closed or after certain minutes of inactivity. Since the encryption is on-the-fly and has almost no impact on system resources, you can go about whatever it is you normally do with your files without ever noticing the encryption.
Another cool feature in CryptShield is an opportunity to restrict the connection of removable devices like USB drives and optical disks by registering only accepted devices. Let's say, for example, someone is attempting to plug his USB drive into your office computer to copy some of your documents out. The CryptShield application verifies the validity of the drive and if it sees it's a non-registered device, the USB is not detected by the system.
You can use encrypted removable devices in another computer even if it has no Bluest CryptShield installed. Thanks to Dynamic Detection, you can create an encrypted volume and put it, along with a small application, into a removable device. Once you plug the device into another computer, you are automatically prompted to enter in the password and then, if the check is passed, the encrypted volume is mounted and you can get your documents.
There is another layer of security for documents you create on public computers. After copying an important file to the encrypted USB drive, you can shred the original document completely by overwriting it by 0x00. You can do it with a right click. CryptShield renders the file completely unrecoverable even for the most advanced recovery software.
Bluest CryptShield 1.5 is available today.
Pricing and Availability
Bluest CryptShield 1.5 runs under Microsoft Windows 2000/XP/Vista and sells for $39.95 (US) for a single-user license. Additional information on the product, as well as its free evaluation copy is available from http://www.bluestsoft.com.
BluestSoft is a privately-held technology company, specializing in computer security software. The company has developed a wide range of software products to protect the security and privacy of home and corporate users alike from identity theft and divulging of information. Its veteran engineers are proud to stand behind such leading-edge products as DiskDeleter Pro, DiskDeleter CD, DiskDeleter Floppy, DiskDeleter ASP, and DiskDeleter USB The company is located in Irvine, California. For more information, visit http://www.bluestsoft.com.
Product page link: http://www.bluestsoft.com/en/products/cryptshield.html
Download link: http://www.bluestsoft.com/en/download/downloadrequest.html
Company website: http://www.bluestsoft.com
Postal address: 2102 Business Center Dr., Suite 130, Irvine, California 92612