Disk Password Protection 4.9.4
-
From: EXLADE, Inc.
Disk Password Protection 4.9: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc.
License: Shareware, $49.95 to buy Size: 2155 KB
No rating
Disk Password Protection 4.9: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc.
Disk Password Protection 4.9 offers users the option to choose what kind of protection they need.
First is the Boot Protection. When chosen, any unauthorized person will not be able to boot a computer without entering the correct password. The program also offers Partition Protection. Any person can chose to have one or several partitions where all confidential information is stored.
When protection is activated, the partition will be invisible to the operating system and the disk space taken up by sensitive data will appear as free disk space. The Low-Level Protection option allows users to blocks all attempts to read/write to/from the protected disk. The drive itself will appear as if it were just manufactured and is not formatted to perform any operations. This protection works only for ATA-compatible disks and must be activated in MS-DOS.
All EXLADE, Inc. Soft
- Cryptic Disk 2.7.0 - Protect your disks or disk partitions by encrypting them with Cryptic Disk 2.7
- Disk Password Protection 4.9.4 - Comprehensive suite of hard-drive protection/access restriction tools.
Latest Articles & Reviews
- How to unerase files?
- IPHost Network Monitor Review
- WLAN Visualization: A Picture Is Worth A Thousand Words
- GFI LANguard Network Security Scanner Review
- The Importance of Using Intrusion Detection Tools to Secure Your Business Network
- How to contact domain owner?
- Lansweeper Review
- PC Inventory Advisor Review
- Server Supervisor Review
- How to monitor other users' activities?
- Firewall and Intrusion Detection
- Network/Protocol Analyzer
- Network Scanner
- Privacy and Anonymity
- Whois and TraceRoute
- Network Utilities, Suits, Toolkits
- Network Monitor
- Network Traffic Accounting
- Network Inventory
- Remote Control
- File and Disk Encryption
- File and Password Recovery
- Keylogger and AntiKeylogger
- Email Tools
All Categories