You are here: hacking technology > encryption decipher > Content
Hot Articles
Recommend Articles
New Articles
Briefly transparent encryption ideas
  Add date: 02/26/2011   Publishing date: 02/26/2011   Hits: 12
Total 4 pages, Current page:1, Jump to page:
 

In order to protect the privacy files or confidential documents that people will use some encryption software to file encrypt, they are the most common function is to a single file for encryption and decryption. This paper will introduce a paragraph of high performance encryption software, it can also TEFS to thousands of file encryption, and instantly miraculous transparent encryption functionality. If can through Word of encrypted Word doc of editing, through RealPlayer watch encrypted movie files, and, because of encryption is in memory, won't produce any file on the disk.

 

The latest version of the software for V1.1, download address for:

 

http://www.ecoresoft.com/chs/download/TEFS1.11 (done). Exe

 

Running the latest version of the integrated installation kits, according to screen hints for installation. After installation restart your computer.

 

Software has the following features:

 

1.the high safety. File data be cryptographically secure, anytime, only authorized users can use.

 

2. Use scope. Applicable to all Windows platforms and storage devices, can encrypt any type of file, folder and partitions, encryption engine can expand and self-developed.

 

3. Usage is convenient. Authorized users can use directly encrypted files and folders, without first conducts a troublesome decryption operation, like use ordinary files and folders are the same.

 

4. A friendly interface, occupies system resources small.

 

Transparent function and kernel function

 

In TEFS runtime, operating system and all applications by the primitive content for the standard, the process for operating system and application is transparent, so called transparent. TEFS or a kernel layer encryption software, with no decrypt can be directly editor features, but in memory, won't produce any file on the disk.

 

Use TEFS on transparent service, if a file encryption strategy also no configuration, want to undertake first strategy configuration. Firstly, starting TEFS, in the toolbar on selecting strategy, click the "configure" button, the popup dialog box, select the Encryption strategy. Default is SEAL (done) Encryption Software Encryption, and then fill in the strategy required password. When TEFS software runs in the background, a user can use text editor to edit, whether in editing before or after the show, file editor content is always right, and is encrypted.

 

The kernel is TEFS core, if temporarily need not use transparent function, can be closed kernel, so will temporarily lose transparent service functions. Right-click the icon in the system tray TEFS, in the pop-up menu, select close kernel. Need explanation is, dynamically switched core application scope is not confined to file copies, we can also send encrypted email, use WinRAR compression encrypted files.

 

Transparent encrypt or decrypt files

 

Browse through the column right view of choice should be encrypted files, if choose C: \ test. In toolbars, TXT in choose "encryption" button, pop-up "encrypt" dialog box. Then, select target location and encryption strategy, and enter the password, if have chosen to encrypt strategy, then don't need to input. Click the "ok" button, can on the document encryption.

 

Other pages: : 1 * 2 * 3 * 4 * Next>>
Prev:Detailing asp.net encrypt, decrypt skills Next:Shallow disk encryption and decryption technology

Comment:

Category: Home > encryption decipher