Make your home page Add to your favorites  


Help Desk

Site Map


What's New

Search Software:
  MAC Software | Linux Software | Pocket PC | iPod Software

  Software Directories
PC Tools
DVD & Video
MP3 & Audio
Computer Games
Security & AntiVirus
File Compression
Backup Tools
System Optimizer
System Utilities
Registry Software
Desktop Tools
File Tools
Disk Tools
HTML Editors
Text Editors
Hex Editors
Font Tools
Password Manager
Password Recovery
Printers Tools
Website Tools
Mac Utilities
Data Recovery Tools

StrongDisk 2.8 Server (10 users)

StrongDisk Server protects sensitive data stored on a server. It is the easiest way to provide the strongest possible protection against criminals or competitor espionage. StrongDisk Server is indispensable when it comes to protecting sensitive data that is to be used by multiple users simultaneously.
4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks.
No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you.
The content of protected disk is physically stored in a common file, that enables to make easily backup copies.

Software Information System Requirements
Version: 2.8.0
  • Windows 8/7/XP/Vista
  • Pentium II CPU
  • 128 Mb of RAM
License:Free to try, $720.00 to buy
File Size: 1.00 MB
Rating :

How It Works

Sensitive data is stored on protected disks, which are mounted on the server and work as normal local disks. When this data is not used, i.e. protected disks are not mounted, the contents of each protected disk appears as a separate encrypted file.

To mount the disk a password and an external key are required. A password and an external key are required to decrypt the data, and not just to be verified. Without the appropriate password and external key, nobody can read the data even if he has physical access to it.

After the disk is mounted any data can be written to or read from it. Encryption and decryption is performed "on-the-fly" without storing the data in non-encrypted form. Protected disks can be accessed by any applications including database management systems such as MS-SQL or Oracle.

Key Features:
  • Sharing Encrypted Data
    Unless the whole protected disk or any folder on it is shared in the network, no one can access the encrypted data except users (usually only administrator) who have physical access to the server.
  • Encryption Keys Inaccessibility To Users
    A remote user works only with data, which is encrypted/decrypted on the server, not on user workstation. Therefore, all keys used for encryption are located only inside the server. In no instance may a remote user without administrative privileges gain access to those keys, even if he has full-access privileges to the sensitive data on shared resources.
  • Backup
    It is clear that backup copies of any important information must be made as often as possible. When StrongDisk Server is used to protect the data, then the process of backup copying is very simple. Protected disk image files can be easily copied to CD-ROMs or tape while the data still stays encrypted.
  • Sharing parameters are automatically restored on mounting protected disk
  • Protected disks can stay mounted when local user logs off
  • DBMS or any other applications or services can be started automatically on protected disk mounting

  • StrongDisk Pro
    protects sensitive data on your notebook or PC

  • Password Archive 2005
    Password Archive 2005 securely stores your passwords and all your personal confidential information

  • East-Tec-Eraser
    Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser.

  • Compact Locker: data encryption for Pocket PC
    is a Pocket PC data encryption, It's designed to provides the safest way to protect sensitive and and valuable data located on your mobile device.

  • ZoneAlarm Pro
    is a good security solution that combine Firewall, ID and Privacy Protection, E-mail Security, Wireless PC Protection

  • TreePad PLUS
    is a very intuitive and powerful Word Processor, PIM and personal database

  • InfoPro
    is an application to manage your bits and pieces of information without having to manage multiple files

  • statistiXL
    Advanced data and statistical analysis package that runs as an add-in to Windows versions of Microsoft Excel

  • Floppy Diskfix
    powerful and useful floppy disk data recovery software that repairs the bootsector of floppy disks giving you access to your lost data again

  • DiskInternals FAT Recovery
    It is a fully automatic utility that recovers data from damaged or formatted disks.

  • Flash Drive Crypto
    Removable storage is widely used all over the world. It is convenient, however the data is not secure.

  Submit Software | Privacy Policy | Terms of Use | Advertise with Us | Contact Us
 Copyright © All rights reserved.