![]() ![]() If you suspect that a keylogger or password sniffer has been placed on your computer, Kryptel has an encrypted on-screen keyboard that can keep your passwords secret. You can choose to have it do between one and nine passes. Like the others, Kryptel’s shredder uses the DoD 5220.22M algorithm that randomizes the underlying data. It’s on a par with CryptoForge in the variety of algorithms available, but the 576-bit key option is potentially the most secure of all the software reviewed here. Kryptel’s default setting is for 256-bit AES encryption, but it also offers Blowfish (576-bit key), Twofish (256-bit key), Serpent (256-bit key) or Triple DES (168-bit key). The program doesn’t have its own extension for encrypted files and can’t recover a lost password. In my case, the same password that got a green rating by CryptoForge was judged mediocre by Kryptel. ![]() Kryptel encrypts files and folders, but not full drives or disk volumes.Įvery time you enter a password, Kryptel gives you its opinion of how secure that password is with a color code (red to green) and also rates it weak, mediocre or good if you need one, there’s a primer on passwords in the Help section. You can select items from Kryptel’s built-in browser window, or you can right-click on anything in the Windows File Explorer and then select encrypt, decrypt or shred. There are actually two ways to use Kryptel. Other users can dive right into the program. These step-by-step sequences are ideal for those who have never used encryption before and want the process simplified. ![]() When I started it up, it asked if I wanted to use any of its wizards for encrypting, decrypting or shredding files and folders. The Enterprise Edition ($40) adds a command line interface and 64-bit operations, if your computer supports it.ĭownloading and installing the program took me about two minutes. In addition to a free version that just shreds and encrypts files, the Standard Edition ($30), which was the one reviewed, can save encrypted backups and be run from a USB drive. Kryptel can be used on systems with Windows Vista and later. Inv Softworks’ Kryptel not only provides four different encryption methods but has wizards that make it easier to encrypt files or make them vanish. Pros: Choice of four encryption techniques includes free decryption app shredding can use up to 99 passesĬons: Works only via File Explorer uses four separate apps Inv Softworks Kryptel At a Glance CryptoForge Encryption Software In addition, a little more speed wouldn’t hurt. On the other hand, I would have preferred it to allow you to encrypt files within its interface rather than just using the File Explorer. I applaud CryptoForge for the freedom of choice it offers: Four encryption techniques and the ability to pick how many shredding passes the software makes. Finally, CryptoForge took 59.9 seconds to shred the video file with five passes. It encrypted the 1.3GB video file in one minute, 31.4 seconds and decrypted it in 16.6 seconds. Using a USB thumb drive, it took 2 minutes, 23.4 seconds to encrypt and 1 minute, 7.7 seconds to decrypt the files. Using 256-bit AES encryption, the program was the slowest of the five reviewed here, taking 21.9 seconds to encrypt the batch of ten files from the desktop and 5.3 seconds to decrypt them. Test resultsĭon’t get CryptoForge if you’re in a hurry. The program warns you that the items will be permanently deleted. You can adjust it for between one and 99 passes. The underlying data remains intact until that part of the drive is overwritten with a new file.ĬryptoForge uses the DoD 5220.22M technique for shredding data. As most computer-savvy users know, when you delete a file, all that is actually removed is the File Allocation Table (FAT) entry that the computer uses to track of what’s on the drive. It’s not enough to simply reformat the hard drive. You also need to be especially careful when you get rid of a system or a hard drive. Use the wrong password and you get nothing. Once encrypted, there’s only one way to get the original file back: Enter the correct password and the file reappears several seconds (sometimes minutes) later. These days, the accepted standard for encryption is the Advanced Encryption Standard (AES) algorithm with a 256-bit key. To be safer, encryption is the way to go. And if your computer is lost or stolen, its hard drive can be removed and connected to a new computer, revealing its secrets. Even with password protection, anything on your computer can potentially be viewed by an enterprising hacker. People are starting to realize that passwords alone aren’t enough. While safeguarding personal and business data has always been important, the necessity for maintaining digital privacy has become even more vital as more of our records are digitized. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |