Free Virtual Drive Downloads

BestCrypt protects your sensitive data

BestCrypt
 

Jetico, Inc.
 

BestCrypt is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with

aes hot key gost bestcrypt windows xp encryption algorithms

 
Protect your sensitive data.

Paragon Encrypted Disk Personal
 

Paragon Software Group
 

Protect private and sensitive data from potential unauthorized access. No matter what is your particular needs, protecting your data on computer, sharing one computer between several persons or secured transfer of data to friend, co-worker or boss

encryption algorithms paragon binary file triple des disk contents protecting your data

 
Virtual encrypted hard drive

CryptoExpert 2004 PE
 

SecureAction Research, LLC
 

CryptoExpert mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to file.

relevant data encrypted instantaneously encrypt absolutely unencrypted data

 
CD DVD Burning, and emulation software

Alcohol 120%
 

Alcohol Software
 

Supports: Windows 95 / 98 / Me / NT / 2000 / XP Can handle up to 31 virtual CD & DVD-ROM drives, all at once! So you can run several CD & DVD programs simultaneously. 200X CD-ROM reading speed

reading methods cd rw virtual cd rom reading method session cd dvd rw

Windows backup and disk imaging software.

Macrium Reflect
 

Paramount Software UK Ltd
 

Award winning Windows backup and disk imaging software. Backup files and folders into a single compressed archive file or create a browse able image of your hard disk for easy hard disk upgrade or recovery.

disk space management backup drive linux operating system partition image rescue cd disaster recovery solution

Virtual encrypted hard drive

CryptoExpert 2004 Lite
 

SecureAction Research, LLC
 

CryptoExpert mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to file.

phrase relevant data conversely unencrypted data encryption system free encryption software

Free Disk Imaging and Restore Software

Macrium Reflect Free Edition
 

Paramount Software UK Ltd
 

The fastest disk imaging software is now available as a free edition. A complete disaster recovery solution for your home and office. Protect your personal documents, photos, music and emails. Upgrade your hard disk or try new operating systems.

local network imaging solution usb drives personal documents compact version disaster recovery solution

Virtual encrypted hard drive

CryptoExpert 2008 Lite
 

SecureAction Research, LLC
 

CryptoExpert mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to file.

relevant data encrypted traces virtual drive free encryption software fly

Virtual encrypted hard drive

CryptoExpert 2005 Lite
 

SecureAction Research, LLC
 

CryptoExpert mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to file.

relevant data decrypt free encryption software encryption system unencrypted data instantaneously

Encrypted virtual hard drive

CryptoExpert 2004 Professional
 

SecureAction Research, LLC
 

CryptoExpert mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to file.

absolutely relevant data conversely encryption system password authentication phrase

 

Page 1 out of 4    1 2 3 4

 

Copyright © 2003-2012 TverSoft Software