abylon CRYPTDRIVE Icon

abylon CRYPTDRIVE Full Description

Container-based, encrypted drive to protect your files and programs

Full Description

1, November 2013
16874 Kb
$38  -  Buy full version


Product Info

Unencrypted data is an easy target for unauthorized persons or spies and only the encryption protect your data really. The software abylon CRYPTDRIVE offer an effective shield for your documents, videos, photos and programs. Therefore create the software encrypted container, using the international algorithm standards AES and Blowfish with an key-length from 256 or 448 bit. An even greater protection offer the combination of these both procedures. The software abylon CRYPTDRIVE is easy to use. To open your encrypted drive you can enter a password via the keyboard, or use a smart card, CD/DVD or a removable media (e. g. memory stick). Only with correct validation the CRYPTDRIVE is displayed in the File Explorer as drive and the access to the encrypted data is possible. The encryption and decryption of your files works automatically in the background. In a company environment the access authorizations can be also administered using X.509-certificates, whereas a lot of certificates, smart cards or token are supported by abylon CRYPTDRIVE. As additional protection against keylogger the software abylon CRYPTDRIVE offer a password scrambler and image objects to mask the password input over the keyboard.

What's new in current version
Windows 7, Windows 8 and 8.1 ready

Pentium oder vergleichbar; 256MB RAM

Please contact abylon CRYPTDRIVE publisher, abylonsoft - Dr. Thomas Klabunde if you have questions or issues regarding this product.
Kaspersky Anti-Virus 2011 scan report
Scanned files: 129 Threats detected: 0 Time: 11s
Clean and Safe Certified
Download version 9.50.7
was tested on www.softarea51.com
with Kaspersky Anti-Virus
on 1, February 2012
ESET NOD32 Antivirus 5.0 scan report
Scanned files: 1 Threats detected: 0 Time: 0s
Clean and Safe Certified
Download version 9.50.7
was tested on www.softarea51.com
with ESET NOD32 Antivirus
on 1, February 2012
Share abylon CRYPTDRIVE Review, Container-based, encrypted drive Page  Share
Page URL: 
Buy abylon CRYPTDRIVE license key or activation code online from ShareIt! using one of these payment methods: Credit Card, PayPal, Bank/Wire Transfer, Check/Money Order, Open Invoice (European). The order process is protected via secure connection using VeriSign Secure Socket Layer (SSL) technology.

Using a crack or a pirated serial or key generator to activate abylon CRYPTDRIVE full version without buying a license key is against the law.

Exclusive Giveaway for Softarea51.com users
Featured downloads
Firefox Review The award-winning Firefox Web browser has security, speed and new features that will change the way you use the Web. Don t settle for anything less
Adobe Flash Player Review Flash Player is a cross-platform browser plug-in that delivers breakthrough Web experiences to over 98% of Internet users
Ad-Aware 2008 Free Review The bottom line: Ad-Aware is your best option for keeping spyware and adware under control on your PC
Related downloads
Protect your files against illegal access on an encrypted file clipboard on local or network computer. The complete integration into the Explorer environment on desktop level simplify using and allow the simultaneous access by several users.
abylon KEYSAFE abylon KEYSAFE
The abylon KEYSAFE is an easy to use password manager. Open the KEYSAFE with password, chip card, memory stick or X.509 certificate. The software supports Drag&Drop, offer a random key generator and encrypt with Blowfish- or AES-algorithm.
abylon LOGON SSO Home abylon LOGON SSO Home
Login once during the Windows logon with your smart card, CD or USB stick and an optional password. The software abylon LOGON SSO Home will insert the passwords and user names of all further application automatically.
abylon LOGON SSO Pro abylon LOGON SSO Pro
The great numbers of the required passwords make many users big trouble. With abylon LOGON SSO Pro, the user only authenticate once at the Windows login and all password protected programs start automatically.
The protection of the computer and stored files against undesirable access is more and more important. This Security-Suite offers innovative and professional security and encryption modules for private and business use.
abylon BASIC abylon BASIC
abylon BASIC is a collection to encrypt, sign, compress, search, copy, mail or move files and folders, full integrated into the context menu of the File Explorer. The encryption supports passwords, smart cards, certificates, CDs or memory sticks.
USB Safeguard USB Safeguard
USB Safeguard is a portable software program to encrypt and protect data with a password on your removable pen drives using the AES 256 bits encryption. Also, a useful feature that allows you to enter your email or phone if you lose the pen drive.
claviscom DATA DRIVE claviscom DATA DRIVE
Why do you need claviscom DATA DRIVE? If you still think, no one can mess with your saved files. Then you don t need to encode this. Nowadays information is very delicately handled, wheather it be email addresses or company secrets.
Photo Recover-Center Photo Recover-Center
Recover deleted or lost photos from any digital photo camera or flash card. Features innovative recovery algorithms and contains advanced data recovery capabilities that allow you to recovery all file types.
Related Press Releases
Memory Stick Undelete Tool
Doctor Memory stick recovery utility is non-destructivetool which is use to restore formatted pen drive files folders. Restoration utilityrestore corrupted pen drive audio, video, mp3 music songs. Retrieval tool retrieveerased word, excel, power point, access documents from thumb drive. Utility is easyto use to recover previously saved jpeg, jpg, bmp, gif, png, tiff, riff picturefiles missing...
USB Memory Stick Data Recovery Software
drive deleted data recovery software file restore utilityto retrieve, revive and undelete all your damaged, corrupted, formatted memory stickfiles and folders including MDB database Excel XLS DOC word Documents jpg jpeg tifgif riff tiff avi png bmp mpeg mov wav midi audio video digital pictures songs mp3music.This utility restores backup overwritten missing lost compressed and...
Memory Geek Drive Recovery Tool
drive lost data recovery software is a quick solution ofdata loss from pocket drive. Retrieval tool supports restoration of corrupted files,folders, subfolders, system files, encrypted text file, TXT , DOC, MS Word file,XLS, MS Excel sheet, PPT, MS power point slides, MS-Access, MDB and Outlook PSTfile. Compact flash pen drive retrieval utility provides recovery of undetected,inaccessible,...
Giveaway of Wondershare USB Drive Encryption: Protect your data from prying eyes
May 13, 2010 - Wondershare Software will be together with Giveawayoftheday.com to provide free Wondershare USB Drive Encryption. This would be good news to those who intend to encrypt USB drives for their confidential personal and company data in case of data leakage over lost or stolen USB flash drives. Priced at $24.95 originally, Wondershare USB Drive Encryption is free on...
Free USB Stick competition launched by RBOffers
A new competition was launched at RBoffers.com where users canwin a USB memory stick by answering one question.The first person with the right answer wins the USB memory stick. The offer isavailable for all UK residents. These competitions have already proved popular withmembers.For more information visit the RBoffers competition website athttp://www.RBoffers.com. What does RBoffers.com offer?...
FarStone Releases New Version of Virtual Hard Drive RAM Disk Software
tone Technology has released Virtual Hard Drive 2 Pro(www.farstone.com/software/ virtual-hard-drive.htm), a RAM disk utility that improvesthe performance of sluggish Vista systems equipped with a surplus of system memory.The newest version of Virtual Hard Drive Pro includes a total redesign of theinterface and enhancements to the RAM disk building and mounting functionality ofthe software.HOW...
Related software and technology conferences
Digital copyright: What your organisation needs to know to protect itself
Do you often wonder how laws that predate the current range of technologies can be applied to them? Copyright law is slow to change, and with the digital age now in full roar there is no inopportune time to get to grips with how digital copyright should be handled correctly. Emily Goodhand, Copyright and Compliance Officer at the University of Reading and @copyrightgirl (7669) of Twitter fame,...
Using Data Mining to Drive Development
You collect information from all your shop activities, including everything from gift size to gift timing to volunteer participation to event attendance. By enhancing your current data mining efforts, you can finally marshal your database to find the patterns that will focus your advancement strategy on the most promising prospects. Join Academic Impressions for the Using Data Mining to...
Strategies for Planning and Leading Innovative Adult Programs
Economic issues are forcing many adults to rethink their career pathways and to seek postsecondary programs in more promising sectors of the economy. The US Department of Education projects that over the next eight years enrollment of adult students in higher education will climb at more than double the rate of traditional students. Becoming more competitive in the adult market means schools...
Special Session on Component-Based Software Engineering
Component-Based Software Engineering (CBSE) is concerned with designing, selectiong and composing components. Software systems are build by assembling components already developed and prepared for integration. The main objective of CBSE is to obtain a more efficient development with shorter development times and better quality products: using an existing component, rather then developing a new...
CBMI 2014 Content Based Multimedia Indexing workshop
Following the eleven successful previous events of CBMI (Toulouse 1999, Brescia 2001, Rennes 2003, Riga 2005, Bordeaux 2007, London 2008, Chania 2009, Grenoble 2010, Madrid 2011, Annecy 2012, and Veszprem 2013), the 12th International Content Based Multimedia Indexing Workshop aims to bring together communities involved in all aspects of content-based multimedia indexing, retrieval, browsing...
Special Session on Cognitive-based Text Understanding and Web Wisdom (CTUW12)
Call for Papers Special Session on Cognitive-based Text Understanding and Web Wisdom (CTUW'12) August 22-24, 2012, Kyoto, Japan http://iic.shu.edu.cn/huiyi/CTUW4thCFP.html in conjunction with 11th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC 2012) http://www.ucalgary.ca/icci_cc/ICCICC2012/ Recent years, many new theories and technologies for...