Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
CyberSafe Top Secret Ultimate
#1
[Image: topsecret_en-174x200.png?9478]

is an information security program that uses modern encryption algorithms (RSA, AES, BlowFish, etc.). The assortment of tools and features provided by CyberSafe Top Secret are valuable in all fields that work with information: protecting confidential information, protecting E-mail correspondence, creating and validating digital signatures.

CyberSafe Top Secret supports encryption on the basis of Public Key Infrastructure, and allows you to encrypt computer hard drives partitions, create encrypted virtual drives of any size, and also hide logical disks and encrypted files and folders on the user’s computer.

Certificate-Based Encryption

CyberSafe Top Secret’s file encryption system is based on certificates, which are electronic digital identifiers containing a pair of public and private user keys for each of the relevant cryptoproviders (Open SSL, Open PGP, CryptoPRO), as well as certificates in the X.509 and PKC#12 formats, which are used for encrypting email.

Each personal user certificate is unique in that it is issued to a particular email address.

Hard Drive Encryption and Virtual Volume Creation

CyberSafe Top Secret allows you to protect all the data on a hard drive, whether that be from a computer, a laptop, an external hard drive, or a USB flash drive, as well as to create separate encrypted partitions of any size on these drives.

Using this, you can create virtual encrypted disks and store confidential information on them in an encrypted format, while at the same time all the other information on your computer will be unencrypted and available for use.

E-mail Encryption

CyberSafe Top Secret gives you the ability to protect electronic correspondence when working with any e-mail client (Microsoft Outlook, Thunderbird, The Bat!, etc.), and also when using mobile devices using iOS or Android. E-mail encryption is carried out on the basis of certificates in the X.509 and PKCS#12 formats. Step-by-step instructions on features of encryption control are provided in User’s Guide on the program site.

Hiding files and folders

CyberSafe Top Secret allows you to hide both separate folders with files and entire logical disks from the operating system. The hidden elements remain invisible when booting the computer in safe mode, when being viewed via a remote administration program, and also if CyberSafe is uninstalled from the computer. The hiding function is combined with encryption, providing the greatest possible protection for confidential information.

Flexibility

CyberSafe Top Secret gives you the ability to encrypt files and folders in different ways. When protecting files on a local computer, they can be placed in an encrypted partition of a logical disk, can be kept in a virtual encrypted volume, or can be stored in a folder protected by the transparent encryption feature.
When transferring files to other users, you can use Public Key Infrastructure, password encryption or encrypted self-extracting archives.

Supports Several Cryptoproviders

OpenSSL is an open-source cryptographic toolkit that allows you to create RSA, DH, and DSA keys, X.509 and PKCS#12 certificates, digital signatures, and form CSR and CRT.

OpenPGP is a Public Key Infrastructure-based email encryption protocol, which defines standard formats for encrypted messages, digital signatures, private keys, and also allows digital signature validation when exchanging public keys.

CryptoPro CSP is the Russian Federation certified cryptoprovider, providing support for the GOST 28147-89 and the GOST P34.10-2001 cryptostandards, which are necessary when working with any information system associated with the storing and processing of information that constitutes a state secret.

Two-Factor Authentication

CyberSafe Top Secret uses a two-factor authentication system. This means that you not only need to know the password to access encrypted files, but also you need to have the private key, which must be stored on a removable disk, not a personal computer .
In this way, even if an intruder somehow manages to figure out your password, they still won’t be able to get access to the encrypted files as the private key is exclusively in your possession.

The Trusted Applications System

The Trusted Applications System was added to CyberSafe Top Secret to strengthen its security. It creates a list of trusted programs that will be able to access protected files for the folder the files are kept in, while the files that are not trusted will not have access. This allows you to limit access to confidential information for spyware, malware and other unwanted applications.

Terms and Conditions:
  • This is a 2-computer lifetime license, for noncommercial use

  • No free updates; if you update the giveaway, you may lose it

  • No free tech support

  • Must be downloaded, installed, and registered before this offer has ended -- you cannot install / reinstall / register later, such as if you get a new computer

  • May not be resold

Technical Details:
  • Developed by CyberSafe

  • Version is v2.2.32

  • Download size is 22.1 MB

  • Supports Windows 7, 8/8.1, and 10 (32-bit and 64-bit)

Giveaway Page:

http://sharewareonsale.com/s/cybersafe-t...eaway-sale
Reply
#2
CyberSafe Top Secret Ultimate Giveaway.

CyberSafe Top Secret Ultimate is an information security program that uses modern encryption algorithms (RSA, AES, BlowFish, etc.). The assortment of tools and features provided by CyberSafe Top Secret are valuable in all fields that work with information: protecting confidential information, protecting E-mail correspondence, creating and validating digital signatures.
CyberSafe Top Secret supports encryption on the basis of Public Key Infrastructure, and allows you to encrypt computer hard drives partitions, create encrypted virtual drives of any size, and also hide logical disks and encrypted files and folders on the user’s computer.


Less than 24 hours left, so hurry.

For more information visit: https://dottech.org/giveaway/?sharewareo...sd=1086630
Reply
#3
Also available here: http://sales.promo2day.com/daily-free-giveaways/
Reply
#4
CyberSafe Top Secret Ultimate - free license

Free License CyberSafe Top Secret Ultimate

To receive a free license CyberSafe Top Secret Ultimate, follow these steps.

1. Скачайте CyberSafe Top Secret (19.2 MB, Windows 10/8.1/8/7/Vista/XP 32/64-bit, версия v2.2.27), распакуйте архив и установите программу на ваш компьютер.

2. In the menu "Help> Activate full version" enter the following license key:



In case of problems due to the activation server after entering the license key, select the "Activate without Internet connection (offline)" and follow the instructions in the program.

Terms of action
  • This is lifetime license for 2 PCs for home (personal) use.

  • No free upgrades. If you update the program, the license becomes invalid.

  • No free technical support.

  • The program must be installed and activated before the completion of this offering.

http://www.comss.info/page.php?al=CyberS...t_Ultimate
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)