<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>encryption software Archives - Reactual</title>
	<atom:link href="https://reactual.com/tag/encryption-software/feed" rel="self" type="application/rss+xml" />
	<link>https://reactual.com/tag/encryption-software</link>
	<description>Useful Tools and Products</description>
	<lastBuildDate>Tue, 22 Nov 2011 11:39:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://reactual.com/wp-content/uploads/2022/10/cropped-D5LAqfLWwAIaiJG-1-32x32.jpeg</url>
	<title>encryption software Archives - Reactual</title>
	<link>https://reactual.com/tag/encryption-software</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Best Drive Encryption Solutions For Macs</title>
		<link>https://reactual.com/software/drive-encryption-solutions-macs.html</link>
					<comments>https://reactual.com/software/drive-encryption-solutions-macs.html#respond</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Fri, 29 Jul 2011 20:36:52 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[actually]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[ars technica]]></category>
		<category><![CDATA[best drive encryption]]></category>
		<category><![CDATA[best mac encryption]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[choice]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Direct]]></category>
		<category><![CDATA[disk encryption]]></category>
		<category><![CDATA[Drive]]></category>
		<category><![CDATA[drive encryption]]></category>
		<category><![CDATA[drive encryption mac]]></category>
		<category><![CDATA[Ear]]></category>
		<category><![CDATA[encrypted virtual drives]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[encryption software]]></category>
		<category><![CDATA[encryption software review]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[filevault 2]]></category>
		<category><![CDATA[free encryption mac]]></category>
		<category><![CDATA[hand]]></category>
		<category><![CDATA[Home]]></category>
		<category><![CDATA[hour]]></category>
		<category><![CDATA[hours]]></category>
		<category><![CDATA[Ice]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[LED]]></category>
		<category><![CDATA[Life]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[mac encryption software]]></category>
		<category><![CDATA[Macs]]></category>
		<category><![CDATA[Mag]]></category>
		<category><![CDATA[Magazine]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[Mini]]></category>
		<category><![CDATA[New]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[offer]]></category>
		<category><![CDATA[offers]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[pack]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[pgp whole disk encryption]]></category>
		<category><![CDATA[Power]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[rated]]></category>
		<category><![CDATA[recovery]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[reviews]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[screen]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[soft]]></category>
		<category><![CDATA[sound]]></category>
		<category><![CDATA[speed]]></category>
		<category><![CDATA[Step]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[Tightly]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[top rated]]></category>
		<category><![CDATA[Top Review Sources]]></category>
		<category><![CDATA[truecrypt]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[vers]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[Ware]]></category>
		<category><![CDATA[way]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[whole disk encryption]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[Works]]></category>
		<category><![CDATA[x]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=3523</guid>

					<description><![CDATA[<p>There are a growing number of options for Mac drive encryption software. Those interested in the security of drive encryption—which locks down the entire disk behind a nearly impenetrable passcode—are fortunate to have so many programs from which to choose. The best drive encryption solutions meet or exceeds industry-standard security while working transparently and with [&#8230;]</p>
<p>The post <a href="https://reactual.com/software/drive-encryption-solutions-macs.html">The Best Drive Encryption Solutions For Macs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There are a growing number of options for Mac drive encryption software. Those interested in the security of drive encryption—which locks down the entire disk behind a nearly impenetrable passcode—are fortunate to have so many programs from which to choose. The best drive encryption solutions meet or exceeds industry-standard security while working transparently and with little negative performance impact.</p>
<p>We’ve combed through reviews on websites such as SC Magazine, SecureMac.com, Computerworld, CNET, Techworld, Lifehacker, Ars Technica, The Mac Lawyer, and AnandTech in order to come up with the top rated encryption solutions:</p>
<p><a name="pgp"></a></p>
<figure id="attachment_3525" aria-describedby="caption-attachment-3525" style="width: 435px" class="wp-caption aligncenter"><a href="https://www.symantec.com/business/products/purchasing.jsp?pcid=pcat_info_risk_comp&amp;pvid=wd_encryption_1"><img fetchpriority="high" decoding="async" class="size-full wp-image-3525" src="https://reactual.com/wp-content/uploads/2011/07/PGP-Whole-Disk-Encryption.png" alt="PGP Whole Disk Encryption" width="435" height="233" srcset="https://reactual.com/wp-content/uploads/2011/07/PGP-Whole-Disk-Encryption.png 435w, https://reactual.com/wp-content/uploads/2011/07/PGP-Whole-Disk-Encryption-300x160.png 300w" sizes="(max-width: 435px) 100vw, 435px" /></a><figcaption id="caption-attachment-3525" class="wp-caption-text">PGP Whole Disk Encryption</figcaption></figure>
<h2>PGP Whole Disk Encryption ($140)</h2>
<p>Top Review Sources:</p>
<ul>
<li>SC Magazine: 5.0/5.0 “Best Buy”</li>
<li>SecureMac.com: 5.0/5.0 “After&#8230;installing the product you are a few clicks away from being fully encrypted. The decryption process is just as easy.”</li>
<li>Computerworld: “PGP Whole Disk Protection is a very good choice for protecting the data on a hard drive”</li>
</ul>
<p><a href="https://www.symantec.com/business/products/purchasing.jsp?pcid=pcat_info_risk_comp&amp;pvid=wd_encryption_1" target="_blank">Symantec’s PGP Whole Disk Encryption</a> is a robust full-disk encryption program targeted at business users. The initial encryption process can be lengthy—large drives with lots of files can take several hours to secure. The good news is that you’ll be able to continue your work as PGP Whole Disk Encryption performs its duties in the background. It is also nice that setting up the initial encryption takes just a few steps that are logically and simply presented. PGP Whole Disk Encryption is capable of using a handful of ciphers, including AES, CAST, TripleDES, IDEA, and TwoFish. After the initial encryption process is complete, PGP Whole Disk Encryption operates transparently, encrypting and decrypting files on the fly. Performance impact is negligible, and the only clear indication that the program is working is the authentication screen at startup. Extras include the ability to create encrypted self-extracting files and a file shredding tool for permanent deletion. PGP Whole Disk Encryption can create encrypted virtual drives on unencrypted volumes, plus it will encrypt removable media.</p>
<p>PGP Whole Disk Encryption can be purchased on the <a href="https://www.symantec.com/business/products/purchasing.jsp?pcid=pcat_info_risk_comp&amp;pvid=wd_encryption_1" target="_blank">official website</a>.</p>
<p><a name="truecrypt"></a></p>
<figure id="attachment_3526" aria-describedby="caption-attachment-3526" style="width: 512px" class="wp-caption aligncenter"><a href="https://www.truecrypt.org/downloads"><img decoding="async" class="size-full wp-image-3526" src="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1.jpg" alt="TrueCrypt" width="512" height="512" srcset="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1.jpg 512w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1-200x200.jpg 200w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1-300x300.jpg 300w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1-480x480.jpg 480w" sizes="(max-width: 512px) 100vw, 512px" /></a><figcaption id="caption-attachment-3526" class="wp-caption-text">TrueCrypt</figcaption></figure>
<h2>TrueCrypt (Free)</h2>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 4.5/5.0 “Loaded with powerful features”</li>
<li>Techworld: “TrueCrypt&#8230;offers a plethora of configuration settings, default options and operational choices”</li>
<li>Lifehacker: “Our favorite solution for keeping your private files safe, sound, and hidden”</li>
</ul>
<p><a href="https://www.truecrypt.org/downloads" target="_blank">TrueCrypt</a> is feature-packed and free. The program provides full disk encryption via an easy-to-use interface. You’ll be able to choose from three ciphers: AES, Serpent, and Twofish. Initial drive encryption can take many hours, but your Mac remains useable during that time. System performance will be affected during this process, but after it is done, TrueCrypt works seamlessly in the background. The only time you’ll be prompted by TrueCrypt is at the password screen at startup. Not only can you use TrueCrypt to lock down your entire hard drive, you can use it to secure removable drives and create encrypted virtual drives as well. TrueCrypt’s help files are comprehensive and well-written; patient beginners will have few problems learning how to get the most out of the program.</p>
<p>Download TrueCrypt for free on the <a href="https://www.truecrypt.org/downloads" target="_blank">publisher’s site</a>.</p>
<p><a name="filevault"></a></p>
<figure id="attachment_3527" aria-describedby="caption-attachment-3527" style="width: 512px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-3527" src="https://reactual.com/wp-content/uploads/2011/07/FileVault-2.jpg" alt="FileVault 2" width="512" height="512" srcset="https://reactual.com/wp-content/uploads/2011/07/FileVault-2.jpg 512w, https://reactual.com/wp-content/uploads/2011/07/FileVault-2-150x150.jpg 150w, https://reactual.com/wp-content/uploads/2011/07/FileVault-2-300x300.jpg 300w, https://reactual.com/wp-content/uploads/2011/07/FileVault-2-100x100.jpg 100w" sizes="(max-width: 512px) 100vw, 512px" /><figcaption id="caption-attachment-3527" class="wp-caption-text">FileVault 2</figcaption></figure>
<h2>FileVault 2 (Free)</h2>
<p>Pros:</p>
<ul>
<li>Seamless integration into OS X</li>
<li>Can store your recovery key with Apple</li>
</ul>
<p>Cons:</p>
<ul>
<li>OS X 10.7 Lion required</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>Ars Technica: “Disk encryption that actually works”</li>
<li>The Mac Lawyer: “Essentially a complete win-win for business users”</li>
<li>AnandTech: “The new FileVault is a pretty great deal for individuals”</li>
</ul>
<p>Starting with version 10.3 Panther, OS X has included an encryption tool called FileVault. FileVault is able to encrypt the home directory, but is unable to perform a full disk encryption. With version 10.7 Lion, FileVault 2 debuts. A big improvement of FileVault 2 is the ability to encrypt an entire disk. Like the original FileVault, FileVault 2 is tightly integrated into OS X, making it easy to use. During the setup process, FileVault 2 provides a recovery key—a string of characters essential to unlocking your drive if you forget the passcode. You have the option of sharing the recovery key with Apple; if you can’t remember your passcode or recovery key, your last line of defense is to call Apple and answer security questions that you create during the FileVault 2 setup process. After setup, FileVault 2 will restart your computer and begin the drive encryption process. System performance will be diminished, but you’ll be able to work on your computer if you need to. Once the initial encryption is complete, FileVault 2 will encrypt and decrypt files as you work and your system speed should not be significantly impacted. FileVault 2 employs XTS-AES 128-bit encryption.</p>
<p>The post <a href="https://reactual.com/software/drive-encryption-solutions-macs.html">The Best Drive Encryption Solutions For Macs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/drive-encryption-solutions-macs.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top Rated File Encryption Software For PCs</title>
		<link>https://reactual.com/software/top-rated-file-encryption-software-pcs.html</link>
					<comments>https://reactual.com/software/top-rated-file-encryption-software-pcs.html#comments</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Sat, 23 Jul 2011 15:38:02 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[Auto]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[axcrypt]]></category>
		<category><![CDATA[best encryption]]></category>
		<category><![CDATA[cell]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[creation]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Direct]]></category>
		<category><![CDATA[disk encryption]]></category>
		<category><![CDATA[Drive]]></category>
		<category><![CDATA[encrypted files]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[encryption algorithms]]></category>
		<category><![CDATA[encryption review]]></category>
		<category><![CDATA[encryption software]]></category>
		<category><![CDATA[External]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file encryption software]]></category>
		<category><![CDATA[free encryption]]></category>
		<category><![CDATA[Ice]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[kruptos 2]]></category>
		<category><![CDATA[kruptos 2 professional]]></category>
		<category><![CDATA[LED]]></category>
		<category><![CDATA[levels]]></category>
		<category><![CDATA[Life]]></category>
		<category><![CDATA[Los]]></category>
		<category><![CDATA[Low]]></category>
		<category><![CDATA[makes]]></category>
		<category><![CDATA[memory]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[meo]]></category>
		<category><![CDATA[New]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[offer]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[PC encryption]]></category>
		<category><![CDATA[pc world]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[Power]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[price]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[rated]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[reviewers]]></category>
		<category><![CDATA[reviews]]></category>
		<category><![CDATA[Rice]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[running]]></category>
		<category><![CDATA[safebit]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[soft]]></category>
		<category><![CDATA[speed]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[Tex]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[thin]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[top rated]]></category>
		<category><![CDATA[Top Review Sources]]></category>
		<category><![CDATA[usb]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[used]]></category>
		<category><![CDATA[Useful]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[Ware]]></category>
		<category><![CDATA[way]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[x]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=3425</guid>

					<description><![CDATA[<ul>
<li><a href="https://reactual.com/?p=3425#kruptos">Kruptos 2 Professional ($15)</a></li>
<li><a href="https://reactual.com/?p=3425#meo">MEO (Free)</a></li>
<li><a href="https://reactual.com/?p=3425#axcrypt">AxCrypt (Free)</a></li>
<li><a href="https://reactual.com/?p=3425#safebit">SafeBit ($40)</a></li>
</ul>
<p>The post <a href="https://reactual.com/software/top-rated-file-encryption-software-pcs.html">Top Rated File Encryption Software For PCs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>File encryption software allows you to secure individual files and folders by associating a key with the data you wish to protect. Only by entering the key will a user have access to the encrypted files. Unlike disk encryption—where a master key is used to lock down all the data on a volume—file encryption allows you to selectively encrypt data while employing different encryption algorithms and keys for different files. We’ve taken a close look at professional and user reviews on sites such as CNET, PC Advisor, Dowload.com, Softpedia, Lifehacker, PC World, digZIP, and rbytes in order to bring you the top rated file encryption software for PCs:</p>
<p><a name="kruptos"></a></p>
<figure id="attachment_3429" aria-describedby="caption-attachment-3429" style="width: 212px" class="wp-caption aligncenter"><a href="https://www.kruptos2.co.uk/order.html"><img loading="lazy" decoding="async" class="size-full wp-image-3429" src="https://reactual.com/wp-content/uploads/2011/07/Kruptos-2-Professional.gif" alt="Kruptos 2 Professional" width="212" height="262" /></a><figcaption id="caption-attachment-3429" class="wp-caption-text">Kruptos 2 Professional</figcaption></figure>
<h2>Kruptos 2 Professional ($15)</h2>
<p>Pros:</p>
<ul>
<li>Easy to use</li>
<li>Can mask file names</li>
<li>Includes secure deletion and self-extracting file creator tools</li>
</ul>
<p>Cons:</p>
<ul>
<li>Limited functionality without payment</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 5.0/5.0 “Kruptos 2, with all its features, is what every user needing simple file encryption desires”</li>
<li>PC Advisor: “Simple and effective file and folder encryption at an excellent price point”</li>
<li>Download.com User Reviews: 4.0/5.0 (130+ reviews)</li>
</ul>
<p><a href="https://www.kruptos2.co.uk/order.html" target="_blank">Kruptos 2 Professional</a> provides an easy way to password protect any number of files, with the option of masking even the file names themselves. Part of what makes Kruptos 2 Professional easy to use is its tight integration with Windows; right-click a file and you are only one more click away from encrypting it. You can also drag and drop files and folders onto the Kruptos user interface in order to encrypt them. After decrypting a file for editing, Kruptos will automatically re-encrypt it upon close. The program uses the 256-bit Blowfish algorithm to encrypt files. Kruptos also includes a secure file deletion tool, self-extracting file creator, and the ability to encrypt a USB flash drive.</p>
<p>Kruptos 2 Professional is available for purchase on the <a href="https://www.kruptos2.co.uk/order.html" target="_blank">manufacturer’s website</a>.</p>
<p><a name="meo"></a></p>
<figure id="attachment_3430" aria-describedby="caption-attachment-3430" style="width: 150px" class="wp-caption aligncenter"><a href="https://www.nchsoftware.com/encrypt/index.html"><img loading="lazy" decoding="async" class="size-full wp-image-3430" src="https://reactual.com/wp-content/uploads/2011/07/MEO.jpg" alt="MEO" width="150" height="198" srcset="https://reactual.com/wp-content/uploads/2011/07/MEO.jpg 150w, https://reactual.com/wp-content/uploads/2011/07/MEO-100x132.jpg 100w" sizes="auto, (max-width: 150px) 100vw, 150px" /></a><figcaption id="caption-attachment-3430" class="wp-caption-text">MEO</figcaption></figure>
<h2>MEO (Free)</h2>
<p>Pros:</p>
<ul>
<li>Free</li>
<li>Interface is as simple as it gets</li>
<li>Tiny installation footprint</li>
</ul>
<p>Cons:</p>
<ul>
<li>Advertisements</li>
<li>Email encryption isn’t as straightforward as file encryption</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 4.0/5.0 “As far as free file encryption programs go, this is one of the better ones we&#8217;ve seen”</li>
<li>Softpedia User Reviews: 3.8/5.0 (25+ reviews)</li>
<li>Download.com User Reviews: 4.5/5.0 (5+ reviews)</li>
</ul>
<p><a href="https://www.nchsoftware.com/encrypt/index.html" target="_blank">MEO</a> has a bare-bones interface that puts those new to the encryption game at ease. Encryption and decryption are simple processes that take only a couple of clicks, either from the MEO interface or from a Windows context menu. MEO allows you to create self-extracting encrypted folders. The program provides the option to encrypt an email, though novices may find MEO’s method of doing this hard to follow. The product’s main demerit is its advertising; MEO will prompt you to install additional software during installation (though you can opt out). MEO employs the Triple DES 256-bit algorithm.</p>
<p>MEO can be downloaded directly from the <a href="https://www.nchsoftware.com/encrypt/index.html" target="_blank">publisher</a>.</p>
<p><a name="axcrypt"></a></p>
<figure id="attachment_3432" aria-describedby="caption-attachment-3432" style="width: 312px" class="wp-caption aligncenter"><a href="https://www.axantum.com/axcrypt/"><img loading="lazy" decoding="async" class="size-full wp-image-3432" src="https://reactual.com/wp-content/uploads/2011/07/AxCrypt.jpg" alt="AxCrypt" width="312" height="51" srcset="https://reactual.com/wp-content/uploads/2011/07/AxCrypt.jpg 312w, https://reactual.com/wp-content/uploads/2011/07/AxCrypt-300x49.jpg 300w" sizes="auto, (max-width: 312px) 100vw, 312px" /></a><figcaption id="caption-attachment-3432" class="wp-caption-text">AxCrypt</figcaption></figure>
<h2>AxCrypt (Free)</h2>
<p>Pros:</p>
<ul>
<li>Free</li>
<li>Fully integrated into Windows</li>
<li>Includes file shredder and self-extracting file creator</li>
</ul>
<p>Cons:</p>
<ul>
<li>No support for 256-bit encryption</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 5.0/5.0 “AxCrypt is both powerful and easy to use, and we think that it&#8217;s a great way to keep files secure for users of all experience levels”</li>
<li>Lifehacker: One of the “Five Best File Encryption Tools”</li>
<li>PC World: “A simple, free way to encrypt individual files”</li>
</ul>
<p><a href="https://www.axantum.com/axcrypt/" target="_blank">Axantum’s AxCrypt</a> provides a free and easy way to deploy AES-128 encryption on your PC. Fully integrated with Windows, AxCrypt is operated exclusively via the context menu—there is no other user interface. The program supports the creation of self-extracting files, plus includes a file shredder for secure deletion. You can set a passcode on encrypted files, or you can create a key file. A key file is typically stored on removable media such as a USB flash drive. When you insert the drive into the computer, it will allow decryption. AxCrypt’s online help file is thorough and quite useful for both new and experienced users.</p>
<p>You can download AxCrypt from the <a href="https://www.axantum.com/axcrypt/" target="_blank">publisher’s site</a>.</p>
<p><a name="safebit"></a></p>
<figure id="attachment_3433" aria-describedby="caption-attachment-3433" style="width: 250px" class="wp-caption aligncenter"><a href="https://www.safebit.net/order.html"><img loading="lazy" decoding="async" class="size-full wp-image-3433" src="https://reactual.com/wp-content/uploads/2011/07/SafeBit.jpg" alt="SafeBit" width="250" height="373" srcset="https://reactual.com/wp-content/uploads/2011/07/SafeBit.jpg 250w, https://reactual.com/wp-content/uploads/2011/07/SafeBit-201x300.jpg 201w" sizes="auto, (max-width: 250px) 100vw, 250px" /></a><figcaption id="caption-attachment-3433" class="wp-caption-text">SafeBit</figcaption></figure>
<h2>SafeBit ($40)</h2>
<p>Pros:</p>
<ul>
<li>Easy-to-use interface</li>
<li>Strong, flexible encryption</li>
</ul>
<p>Cons:</p>
<ul>
<li>Cost</li>
<li>Only one encryption algorithm</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>Softpedia: 4.5/5.0 “Very Good”</li>
<li>digZIP: “SafeBit Disk Encryption is uncomplicated software with an attractive interface that securely converts files unnoticed”</li>
<li>rbytes User Rating: 3.5/5.0</li>
</ul>
<p><a href="https://www.safebit.net/order.html" target="_blank">NeoByte Solutions’ SafeBit</a> employs an intuitive, clean interface, helping make file encryption tasks go quickly and smoothly. Advanced users will appreciate the plethora of customization options. To encrypt your data, SafeBit requires you to create a password-protected virtual drive (called a “safe”). You may create as many safes as you’d like. Users are able to save their passwords on external memory—such as a flash drive—to create a key they can use to unlock and lock their safes. The program operates transparently, encrypting your files automatically as you work within a virtual drive. In the process, SafeBit will not drag down the speed and responsiveness of your system. SafeBit makes use of a single encryption algorithm: AES-256. AES-256 is an effective algorithm, but some reviewers express disappointment in it being the only one offered, given the cost of the program. SafeBit includes a virtual keyboard as a safeguard against keyloggers. The help files are robust, and allow a beginner to get up and running quickly.</p>
<p>You can purchase SafeBit on the <a href="https://www.safebit.net/order.html" target="_blank">official website</a>.</p>
<p>The post <a href="https://reactual.com/software/top-rated-file-encryption-software-pcs.html">Top Rated File Encryption Software For PCs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/top-rated-file-encryption-software-pcs.html/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>The Top Rated Drive Encryption Software For PCs</title>
		<link>https://reactual.com/software/drive-encryption-software-pcs.html</link>
					<comments>https://reactual.com/software/drive-encryption-software-pcs.html#respond</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Sat, 23 Jul 2011 15:37:26 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[200]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[Arc]]></category>
		<category><![CDATA[Auto]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[battery]]></category>
		<category><![CDATA[best drive encryption]]></category>
		<category><![CDATA[bitlocker]]></category>
		<category><![CDATA[boot]]></category>
		<category><![CDATA[cell]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[comes]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[disk encryption]]></category>
		<category><![CDATA[Drive]]></category>
		<category><![CDATA[drive encryption]]></category>
		<category><![CDATA[Ear]]></category>
		<category><![CDATA[edge]]></category>
		<category><![CDATA[edition]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[encryption algorithms]]></category>
		<category><![CDATA[encryption review]]></category>
		<category><![CDATA[encryption software]]></category>
		<category><![CDATA[External]]></category>
		<category><![CDATA[external drive]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file encryption software]]></category>
		<category><![CDATA[free zonealarm]]></category>
		<category><![CDATA[hard drives]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[hour]]></category>
		<category><![CDATA[hours]]></category>
		<category><![CDATA[Ice]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[Laptop]]></category>
		<category><![CDATA[learning curve]]></category>
		<category><![CDATA[LED]]></category>
		<category><![CDATA[levels]]></category>
		<category><![CDATA[light]]></category>
		<category><![CDATA[Low]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[Machine]]></category>
		<category><![CDATA[Mag]]></category>
		<category><![CDATA[Magazine]]></category>
		<category><![CDATA[maker]]></category>
		<category><![CDATA[Mate]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[microsoft bitlocker]]></category>
		<category><![CDATA[mode]]></category>
		<category><![CDATA[Money]]></category>
		<category><![CDATA[Multi]]></category>
		<category><![CDATA[New]]></category>
		<category><![CDATA[offer]]></category>
		<category><![CDATA[offers]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[pack]]></category>
		<category><![CDATA[PC encryption]]></category>
		<category><![CDATA[PC Magazine]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[pot]]></category>
		<category><![CDATA[price]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[rated]]></category>
		<category><![CDATA[recovery]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[reliable]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[Rice]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[running]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[soft]]></category>
		<category><![CDATA[speed]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[tee]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[Tightly]]></category>
		<category><![CDATA[tom s hardware]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[top rated]]></category>
		<category><![CDATA[Top Review Sources]]></category>
		<category><![CDATA[truecrypt]]></category>
		<category><![CDATA[Ultimate]]></category>
		<category><![CDATA[usb]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[used]]></category>
		<category><![CDATA[vers]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[Ware]]></category>
		<category><![CDATA[way]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[Works]]></category>
		<category><![CDATA[x]]></category>
		<category><![CDATA[ZoneAlarm]]></category>
		<category><![CDATA[zonealarm datalock]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=3407</guid>

					<description><![CDATA[<ul>
<li><a href="https://reactual.com/?p=3407#truecrypt">TrueCrypt (Free)</a></li>
<li><a href="https://reactual.com/?p=3407#zonealarm">ZoneAlarm DataLock ($37)</a></li>
<li><a href="https://reactual.com/?p=3407#microsoft">Microsoft BitLocker (Free)</a></li>
</ul>
<p>The post <a href="https://reactual.com/software/drive-encryption-software-pcs.html">The Top Rated Drive Encryption Software For PCs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Commercial drive encryption software is a popular way to encrypt the contents of a disk drive and prevent unauthorized access. Information is encrypted via algorithms that vary in formula but function in similar ways. Most commonly, the encrypted information is accessed via a passcode. As its name suggests, drive encryption protects an entire volume; those looking to encrypt only select folders or files, to have different passcodes, to have varying levels of encryption across a drive should consider file encryption software instead.</p>
<p>After researching expert and user opinions on sites such as CNET, Tom’s Hardware, Techworld, PC Magazine, ITPRO, V3.co.uk, Computerworld, and 4sysops, we’ve compiled a list of the top rated drive encryption software for PCs:</p>
<p><a name="truecrypt"></a></p>
<figure id="attachment_3408" aria-describedby="caption-attachment-3408" style="width: 512px" class="wp-caption aligncenter"><a href="https://www.truecrypt.org/downloads"><img loading="lazy" decoding="async" class="size-full wp-image-3408" src="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt.jpg" alt="TrueCrypt" width="512" height="512" srcset="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt.jpg 512w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt-150x150.jpg 150w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt-300x300.jpg 300w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt-100x100.jpg 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></a><figcaption id="caption-attachment-3408" class="wp-caption-text">TrueCrypt</figcaption></figure>
<h2>TrueCrypt (Free)</h2>
<p>Pros:</p>
<ul>
<li>Free</li>
<li>Low performance impact</li>
<li>Works across platforms</li>
</ul>
<p>Cons:</p>
<ul>
<li>Learning curve can be steep</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 4.5/5.0 “The ultimate freeware encryption program”</li>
<li>Tom’s Hardware: “We recommend downloading and trying TrueCrypt even if you are not looking for a security solution”</li>
<li>Techworld: “TrueCrypt is a real winner and comes at a price that can&#8217;t be beat”</li>
</ul>
<p><a href="https://www.truecrypt.org/downloads" target="_blank">TrueCrypt</a> is a major name in drive encryption software. Once installed, this free software allows the user to encrypt his or her entire drive, a process that initially can take several hours (the computer remains useable during the process). The user can select from three different encryption algorithms (AES, Serpent, and Twofish) or a combination of the three. Once fully encrypted, TrueCrypt continues to automatically protect new information in real time; a single master passcode is all that you need to boot your computer and go about your normal activities. TrueCrypt’s automatic encryption feature is likely to have little noticeable impact on system performance unless you have an older system or are using multi-level encryption—an extra security measure unnecessary for most users. In the event you need to remove TrueCrypt, the decryption process is clean and hassle-free.</p>
<p>TrueCrypt provides the option of partial drive and external drive (including USB flash) encryption. Additionally, TrueCrypt works across platforms, which is great for those who also use Macintosh or Linux. The learning curve for beginners can be steep; the user interface isn’t fully intuitive and there are dangers in using the software without adequate knowledge. However, TrueCrypt’s online documentation is excellent and provides adequate instruction for those willing to invest the time.</p>
<p>TrueCrypt is available for download on the <a href="https://www.truecrypt.org/downloads" target="_blank">manufacturer’s website</a>.</p>
<p><a name="zonealarm"></a></p>
<figure id="attachment_3409" aria-describedby="caption-attachment-3409" style="width: 250px" class="wp-caption aligncenter"><a href="https://www.amazon.com/Zone-Labs-101239-Zonealarm-Datalock/dp/B0041RXTOM?tag=reactual-20"><img loading="lazy" decoding="async" class="size-full wp-image-3409" src="https://reactual.com/wp-content/uploads/2011/07/ZoneAlarm-DataLock.jpg" alt="ZoneAlarm DataLock" width="250" height="378" srcset="https://reactual.com/wp-content/uploads/2011/07/ZoneAlarm-DataLock.jpg 250w, https://reactual.com/wp-content/uploads/2011/07/ZoneAlarm-DataLock-198x300.jpg 198w" sizes="auto, (max-width: 250px) 100vw, 250px" /></a><figcaption id="caption-attachment-3409" class="wp-caption-text">ZoneAlarm DataLock</figcaption></figure>
<h2>ZoneAlarm DataLock ($37)</h2>
<p>Pros:</p>
<ul>
<li>Solid protection from an established brand</li>
<li>24/7 password recovery hotline</li>
<li>Simple encryption process</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>PC Magazine: 4.5/5.0 “Its makers have considered just about every possible eventuality to ensure that you don&#8217;t lock yourself out of the encrypted data”</li>
<li>ITPRO: 5.0/6.0 “Using DataLock is about as simple as it comes”</li>
<li>V3.co.uk: 4.0/5.0 “Good value for money”</li>
</ul>
<p>ZoneAlarm is a familiar and reliable name in internet security. The company’s <a href="https://www.amazon.com/Zone-Labs-101239-Zonealarm-Datalock/dp/B0041RXTOM?tag=reactual-20" target="_blank">DataLock</a> software offers full-disk protection by means of 256-bit AES encryption and a password prompt at startup. A stand-out feature of ZoneAlarm DataLock is the 24-hours-a-day, seven-days-a-week hotline for password recovery. While forgetting your master passcode should be avoided at all costs when using any software encryption program, it is good to know that DataLock provides a convenient means of unlocking your system should you need it. As part of the quick and straightforward setup process, you will create security questions and answers that you’ll have to know in order to recover your password via DataLock’s hotline.</p>
<p>Initial encryption can take hours for hard drives packed with information, but your computer remains useable and subsequent encryption is performed on-the-fly with negligible performance impact. The clean user interface will be familiar to anyone used to using other ZoneAlarm products. Encryption with DataLock is largely set-it-and-forget-it. Note that DataLock is for laptops only; if the software does not find a battery connected to your computer, it will not install.</p>
<p>ZoneAlarm DataLock can be purchased through <a href="https://www.amazon.com/Zone-Labs-101239-Zonealarm-Datalock/dp/B0041RXTOM?tag=reactual-20" target="_blank">Amazon</a>.</p>
<p><a name="microsoft"></a></p>
<figure id="attachment_3411" aria-describedby="caption-attachment-3411" style="width: 264px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-3411" src="https://reactual.com/wp-content/uploads/2011/07/Microsoft-BitLocker.png" alt="Microsoft BitLocker" width="264" height="256" /><figcaption id="caption-attachment-3411" class="wp-caption-text">Microsoft BitLocker</figcaption></figure>
<h2>Microsoft BitLocker (Free)</h2>
<p>Pros:</p>
<ul>
<li>Free</li>
<li>Transparent operation</li>
<li>Seamless incorporation with Windows</li>
</ul>
<p>Cons:</p>
<ul>
<li>Only available for certain editions of Windows</li>
<li>Not as feature-rich as other disk encryption utilities</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>Computerworld: “Encryption is difficult to implement properly&#8230;and Microsoft deserves kudos for making it possible to do this in such a tightly integrated way in Windows”</li>
<li>4sysops: “It greatly simplifies the encryption of a system drive”</li>
<li>PC Magazine: “BitLocker reaches its full potential on computers that include&#8230;a Trusted Platform Module (TPM)”</li>
</ul>
<p>Microsoft’s BitLocker is a free drive encryption utility available for the Enterprise and Ultimate editions of Windows Vista and 7, as well as Windows Server 2008 and Server 2008 R2. Though BitLocker is free, users running versions of Windows other than those listed above are not able to install it. For those using compatible versions of Windows, BitLocker is a strong-performing disk encryption utility. It employs 128-bit AES encryption and several modes of authentication, including entering a PIN at startup, using a passcode saved on a USB flash drive, or utilizing your computer’s Trusted Platform Module (TPM). TPM is an emerging, hardware-based technology that uses a special microchip to verify system integrity before bootup. The TPM stores a key used to unlock the system; if an attacker removes your hard drive, he or she will be unable to read its contents because the drive has been separated from the TPM. Likewise, if the Windows startup process is altered, the TPM will prevent the operating system from loading.</p>
<p>Once activated, BitLocker encrypts new files on-the-fly with very little performance impact. While all disk encryption software takes a slight edge off a computer’s overall speed, BitLocker is one of the least cumbersome. On Windows 7 machines, you also have access to BitLocker To Go, a utility that allows you to encrypt removable media.</p>
<p>The post <a href="https://reactual.com/software/drive-encryption-software-pcs.html">The Top Rated Drive Encryption Software For PCs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/drive-encryption-software-pcs.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: reactual.com @ 2026-04-11 23:12:07 by W3 Total Cache
-->