Challenger 替代品
73我们整理了一个包含73个免费和付费的Challenger替代方案的列表。主要竞争对手包括:TrueCrypt, GnuPG。除了这些之外,用户还会将Challenger与Axcrypt, AES Crypt, Easy File Locker进行比较。此外,您还可以在这里查看其他类似的选项:安全和隐私软件。
我们整理了一个包含73个免费和付费的Challenger替代方案的列表。主要竞争对手包括:TrueCrypt, GnuPG。除了这些之外,用户还会将Challenger与Axcrypt, AES Crypt, Easy File Locker进行比较。此外,您还可以在这里查看其他类似的选项:安全和隐私软件。
Challenger is a software for the encoding of files, folders and drives.
Challenger is a software for the encoding of files, folders and drives.
Challenger is a software for the encoding of files, folders and drives. For the installation and for the execution simple user rights suffice. Thereby the program is mobil usable on an USB flash drive too. The software is conceived for the local protection of data privacy and for closed communication circles. A synchronous stream cipher, a development from Germany, delivers a fast encryption.
The program use a two key procedure. One of the keys represents a conventional memory phrase or password. The second key is created by an extensive list (3 MB) with real random numbers. It is generated individually also and can be handled like a material key (safe). The second key can be formed independent of the PC platform for high security requirements also. Attacks with keylogger remain ineffective because to spy out the passport phrases for a deciphering of your data does not suffice.
Mobile encoding, USB flash drive software
If the program is copied on an USB flash drive, you can use Challenger on every computer. For the execution simple user rights suffice. The USB flash drive can be carried at the bunch of keys access safe. Besides the possibility encrypting data on the hard disk, you can also realize a USB flash drive encoding. So the data remain protected, if the data carrier is lost.
High security application
Challenger can be integrated into a start capable mini-Windows CD in connection with Bart's PE-Builder. You work with a write-protected system. Thereby the key generator is safe from possible operating system offsets or Trojan Horses.
Further characteristics
A safe reference check recognize manipulations at the program
Corrupt cryptic grams are recognized
Original data are deleted for certain ( the safest method: German procedure, VSITR )
The phrase concept guarantees simple and sure dealing with the program
分享您对软件的看法,留下评论,帮助使其变得更好!
建議更改
你的反馈
Your vote has been counted.
Do you have experience using this software?