Monthly Archives: September 2023

By SecurStar DriveCrypt: Bulwark Against Online Search

Encryption of sensitive data at the highest security level Munich, 01 February 2008 as first State wants to Bayern in February 2008 a bill on the way bring, to allow informers to the secret online searches of PCs. Thus, the Bavarian authorities should be enabled in the situation, to take a close look at hard disks. If you are unsure how to proceed, check out Jacobs Dallas. For respectable PC users, there is however no reason to accept such monitoring measures. To protect against PC spy, the SecurStar GmbH offers a solution for simple encryption and secure central management of laptops and PCs: DriveCrypt. SecurStar offers a fast and convenient way with DriveCrypt, secure desktop and notebook computer from unauthorized external access. With numerous features, PC owners can effectively protect all secret data. So, the solution offers the encryption of an entire hard disk partition (the software DriveCrypt Plus Pack of the same product family goes a step further and encrypted the whole disk). Furthermore, the creation of a virtual container file for storing encrypted data is possible.

Also, hackers have no chance to get at sensitive information: because DriveCrypt shows intruders only useless, prepared data. Namely, the container files have no file header, which indicates that this file is an encrypted drive. The data is protected with a very fast, efficient real-time process: there remain unencrypted information on the hard disk at any time. As soon as data is read from the hard disk, they are automatically loaded into memory and decrypts. Are they written back to disk, DriveCrypt sets off automatically encrypted. The encryption and decryption process is done completely in the background and is not visible to the user of an application, and affects not the functioning.

Therefore, the system requires minimal administrators and user knowledge. Optimal access protection by Special features will prevent that passwords can be written with hacker programs such as Trojan horses. System administrators can grant restricted access rights by means of key files to specific users.