Make your home page Add to your favorites  


Help Desk

Site Map


What's New

Search Software:
  MAC Software | Linux Software | Pocket PC | iPod Software | Zune Software
  Software Directories
PC Tools
DVD & Video
MP3 & Audio
Computer Games
Security & AntiVirus
AntiSpy Software
AntiVirus Software
Tracks Eraser
PC Monitoring
Personal Firewall
Small Business Firewall
Password Recovery
Password Manager
Encryption Tools
TurboCrypt: Disk Encryption Software

TurboCrypt: Disk Encryption Software TurboCrypt is an OTFE (On-the-Fly Encryption) disk encryption software that makes ultra-secure encrypted file hosted volumes available to users of all levels.
TurboCrypt: Disk Encryption Software encrypted logical volumes are fast, seamless, integrated, and come with ultra-high security 1024 PMC encryption or alternatively FIPS-197 compliant AES encryption using four separate 256 bit AES engines.
TurboCrypt: Disk Encryption Software is the only commercially available disk encryption software that is immune to Mount Control Code Attack and Backup Attack. It is further the only commercially available disk encryption software that allows for totally secure password entry. The built-in Trojan-Horse-proof Virtual Keyboard prevents malicious software like Trojan Horses and Computer Viruses from reconstructing user entry from mouse movements and screen logs.

Software Information System Requirements
Version: 2008
  • Windows Vista 32-bit,XP and 2000
  • 300 MHz CPU or faster
  • 256 MB RAM
  • 150 MB of free hard disk space
File Size: 9.75 MB
License:Free to try, $34.95 to buy
Screenshot:View Screenshot
Rating :

TurboCrypt: Disk Encryption Software Main Features:
  • Ultra-secure On-the-Fly Disk Encryption for Windows operating systems
  • ‘Type 1’ 1024 bit Polymorphic Cipher with giant crypto context and extra-long crypto context setup running natively on 32 bit and 64 bit microprocessors.
  • Additional AES Rijndael implementation if reduced data security is tolerated by the user
  • Design hardened against attacks from malicious software that might even have infected the operating system (e.g. Mount Control Code Attack, Trojan-Horse-proof Virtual Keyboard)
  • Trojan-Horse-proof Virtual Keyboard that prevents malicious software from logging password information
  • Provision of two TurboCrypt drives that encrypted volumes are mounted to and that act as ramdisks in idle state
  • Secure wipe of unused disk space using three different methods: Fast wipe, DoD 5220.22-M and Gutmann.
  • Up to 500 encrypted virtual volumes with up to 256Gb image size
  • Full NTFS / FAT12 / FAT16 / FAT32 support
  • Truly deniable encrypted volumes


  Submit Software | Privacy Policy | Terms of Use | Advertise with Us | Contact Us
 Copyright © All rights reserved.