Table of Contents
  • Introduction
    • Why do you need BestCrypt?
    • Benefits of BestCrypt
    • How It Works
    • Requirenments
  • Quick Start Guide
  • Basic concepts
    • Main system components
    • Container file
    • Virtual encrypted disk
    • Mounting and ejecting
  • BestCrypt Control Panel
    • General overview
    • Creating new container
    • Managing container passwords
    • Advanced container operations
  • BestCrypt Settings
  • Additional BestCrypt utilities
  • Key files
  • Appendix A: Encryption algorithms and modes
  • Appendix B: Strong password guidelines
  • Appendix C: Windows compatibility notes