Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Comodo disk encryption boot in Title/Summary

COMODO Disk Encryption

COMODO Disk Encryption

Comodo Disk Encryption is a security tool for encrypting your disks. It allows you to encrypt your hard drives or partitions so that no one but you can access them. The encryption of your disks can be carried out using several encryption algorithms. The whole process takes place on the fly, as opposed to a pre-OS encryption which requires a reboot.

Rohos Disk Encryption

Rohos Disk Encryption

Rohos Disk Encryption creates hidden and protected partitions on the computer or USB flash drive and password protects/locks access to your Internet applications. This application uses NIST approved AES encryption algorithm, 256 bit encryption key length.

  • Publisher: Tesline-service s.r.l.
  • Home page: www.rohos.com
  • Last updated: July 18th, 2023
Check Point - Full Disk Encryption Dynamic Mount Utility

Check Point - Full Disk Encryption Dynamic Mount Utility

Full Disk Encryption’s Dynamic Mount Utility is used you need to access information on the hard disk of a Full Disk Encryption - protected machine and do not want to access this information by performing a recovery, for example, if you need to access a disk for forensic reasons or because a failure of the operating system makes it impossible to retrieve data on a disk.

Comodo disk encryption boot in Description

BestCrypt Volume Encryption

BestCrypt Volume Encryption

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks.

  • Publisher: Jetico Inc. Oy
  • Home page: www.jetico.com
  • Last updated: February 4th, 2024
Pointsec for PC

Pointsec for PC

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.

  • Publisher: Check Point Software
  • Last updated: August 21st, 2008
Active@ Boot Disk Creator

Active@ Boot Disk Creator

Active@ Boot Disk is a complete and functioning computer operating system on CD, DVD, or USB drive. It includes a variety of tools to boot up a computer and fix startup, PC configuration, and system management issues. Useful tools such as Active@ Disk Image, KillDisk, File Recovery, Partition Recovery, and Password Changer.

  • Publisher: LSoft Technologies Inc.
  • Home page: www.boot-disk.com
  • Last updated: May 20th, 2022
R-Crypto

R-Crypto

To protect the data R-Crypto creates encrypted virtual disks (virtual data storage devices). These disks provide real time data encryption and decryption which are fully transparent to the user, it means that the data is being encrypted just before it is being written to the disk and is being decrypted right after it is being read from the disk without the need of user intervention.

  • Publisher: R-tools Technology, Inc.
  • Home page: www.r-tt.com
  • Last updated: July 23rd, 2009
GiliSoft Full Disk Encryption

GiliSoft Full Disk Encryption

GiliSoft Full Disk Encryption is a disk encryption software designed for laptops and other small computing devices that can be physically lost or stolen. Through password protecting a disk, disk partition or operating system launch, the program disables any unauthorized reading/writing activity on your disk or PC, restricts access and launch of specific disks and files.

  • Publisher: Gilisoft International LLC.
  • Last updated: February 2nd, 2023

Additional Comodo disk encryption boot selection

idoo Full Disk Encryption

idoo Full Disk Encryption

One thing is to encrypt your data, and another thing to encrypt your disks – idoo Full Disk Encryption does both. It can protect all your local and USB drives and the data they contain using a powerful 256-bit AES encryption algorithm plus a password of your choice. No one will be capable of accessing your disks once password-locked and encrypted, let alone the information stored in them.

  • Publisher: idoo Software
  • Last updated: October 20th, 2013
SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Client is a unified middleware client that manages Thales's SafeNet portfolio of Identity and Access Management Solutions, including certificate-based authenticators such as eToken, IDPrime smart cards, and USB and software-based devices.

TrueCrypt

TrueCrypt

TrueCrypt is a utility that enables users to encrypt a disk within a file in order to protect the information stored on that specific disk. The encryption process is a virtual one and it does not affect the functionality of the encrypted disk. You can automatically mount and dismount drives.

  • Publisher: TrueCrypt Foundation
  • Home page: www.truecrypt.org
  • Last updated: July 6th, 2020
Disk Password Protection

Disk Password Protection

You can set a password hint to ensure you don't forget your password. Disk Password Protection will display the hint when you deactivate protection. There are two types of partition table for drives: the old type (MBR) and the new (GPT). The software supports both.

  • Publisher: EXLADE, Inc.
  • Home page: www.exlade.com
  • Last updated: December 3rd, 2021
VeraCrypt

VeraCrypt

VeraCrypt is intended to protect sensitive data by creating encrypted volumes. The tool allows storing files in an encrypted container file, which you can mount as a virtual drive. Moreover, it can encrypt a partition or a drive, even if it stores system files. Since the tool supports on-the-fly-encryption, there will not be any leftovers after the volume is unmounted.

  • Publisher: IDRIX
  • Last updated: November 10th, 2023
GetDataBack Simple

GetDataBack Simple

GetDataBack Simple is a completely redesigned and rewritten Data Recovery solution for Windows and Linux file systems. Developers had combined decades of data recovery experience with the newest technologies. GetDataBack Simple's clean interface guides you to your lost data in no time. You are literally one click away from your files.

  • Publisher: Runtime Software
  • Home page: www.runtime.org
  • Last updated: June 6th, 2019
Privacy Drive

Privacy Drive

Privacy Drive is a program that provides you with a quick way to hide content from unauthorized users. This application enables you to create virtual drives where you can import the files and folders you wish to conceal and encrypt them using powerful encryption algorithms.

  • Publisher: Cybertron Software Co., Ltd.
  • Home page: www.cybertronsoft.com
  • Last updated: October 2nd, 2017
MiniTool Drive Copy

MiniTool Drive Copy

There are moments when a disk or a partition backup could prove an excellent idea to protect your data. MiniTool Drive Copy is designed as a solution for those situations, as it enables you to copy and clone FAT, NTFS partitions, IDE, SATA, SCSI and removable drives.

Active@ Boot Disk

Active@ Boot Disk

Active@ Boot Disk for Windows XP/Vista/7/8/10 provides a full range of disk utilities for data recovery, secure erasure, disk imaging. You can use it to boot up otherwise unworkable computers to access your data and troubleshoot problems with ease.

  • Publisher: LSoft Technologies Inc.
  • Home page: www.boot-disk.com
  • Last updated: February 29th, 2024
Cryptainer LE

Cryptainer LE

Cryptainer LE is a freeware utility that creates encrypted containers (vaults) of up to 100 MB each to store files. You can encrypt files and folders by simply dragging and dropping them into this vault. Additionally, it lets you create secure e-mail files that you can send to anyone.

  • Publisher: Cypherix
  • Home page: cypherix.com
  • Last updated: March 14th, 2022