DriveCrypt 5.7
A data encryption program that employs steganography and enables you to hide encrypted data inside music files. DriveCrypt is a successor to the popular
ScramDisk program. As data is read from the hard disk, DriveCrypt automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the computer.
DriveCrypt features: 1344 Bit Military Strength disk encryption using the best and most proven cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des, Triple Des, Misty 1 and Square. DriveCrypt allows both the encryption of an entire hard disk partition, as well as the creation of a virtual container file that will store all the encrypted information. An encrypted volume may, with time, become too small or too big for the amount of data it has to contain. DriveCrypt offers you the Volume-Resize function, which will allow you to easily adapt a volume to your needs at any time, and optimize the hard disk space. The DriveCrypt Standard edition has the ability to create an invisible disk inside a container or partition. This way you define two passwords for a container. The invisible disks password gives you access to your working disk, which is hidden in the unused area of your "outer" disk, while another password gives you access to the pre-setup DriveCrypt volume in which you only store data that you would want others to believe is the only data in the container or partition. This is very useful in cases where an aggressor may force you to reveal the DriveCrypt disk's password: By revealing the password of the first or "outer" disk, the aggressor will only see the "prepared data": i.e. the data you put in there before creating the hidden disk, while they will not be able to see or get evidence that there is another invisible container that securely stores confidential data on the disk.