Table of contents Up Previous Next Glossary Home   Welcome to BestCrypt  

Welcome to BestCrypt data encryption system.

BestCrypt is an effective, powerful and easy-to-use data encryption system. BestCrypt provides the most comprehensive level of data security for the personal computers today. After being installed on your computer, BestCrypt keeps your confidential data private in encrypted form to prevent unauthorized access and information leaks. BestCrypt software has been developed to simplify all control procedures as well as satisfy all security requirements.

BestCrypt is oriented to a wide range of users. If you are in business and work with an accounts database, or you are a developer designing a new product or you just keep your private correspondence on your computer - you will appreciate a security system providing restricted data access.

With the advent of mass storage systems a tremendous amount of information can be carried conveniently on even a small notebook computer. What happens to all this information if the computer is stolen at an airport?

Suppose someone gains access to your computer without your knowledge, how do you even know if your data has been copied and given to someone else? What about the information retained on floppy disks? On portable hard drives? On network drives, where at least the administrator could read all files? Of course, there are a number of security systems offered for computers, but here is the most important point.

The main advantage of BestCrypt is that it is the most powerful, proven protection tool, based on cutting-edge technology and available now for public use. Its mathematical basis was developed by outstanding United States and Russian scientists to keep all kinds of classified governmental documents and letters in deep secrecy.

It is the widely known fact that none of the popular applications has an unbreakable encryption option. A company in USA, called AccessData (87 East 600 South, Orem, Utah 84058, phone 1-800-658-5199) sells a package that cracks the built-in encryption schemes used by WordPerfect, Lotus 1-2-3, MS Excel, Symphony, Quattro Pro, Paradox, and MS Word. It does not simply guess passwords - it does real cryptographic analysis. Some people buy it when they forget their password for their own files... The encryption option in Zip and Arj file compressors can be broken by a number of freeware programs.

In contrast, BestCrypt has a strong, built-in encryption scheme and contains no "trap door". Many commercial and government-certified systems contain them. But not BestCrypt. The only way to access the data secured by BestCrypt is to have the appropriate password.

  Table of contents Up Previous Next Glossary Home   Top