BCWipe was originally built as the data wiping utility contained within BestCrypt, Jetico’s encryption software, in order to deliver a complete data protection system to protect sensitive information throughout the lifecycle. BCWipe has been made available as its own software product, but BCWipe is also still included in BestCrypt.


BestCrypt Data Encryption System allows users to keep any form of data (files, letters, pictures, databases) in encrypted form on the hard disk, networks disks, removable disks, CD-ROM’s and floppies. BestCrypt then lets user access it from any application.


Using BestCrypt you can create a container file (for example, you may create a 5Mbyte container file called LETTERS.jbc). Then you can mount this container as an additional logical drive: it will show up in Windows as an additional 5Mbyte virtual disk. When mounted, this logical drive looks and operates just like an ordinary disk drive: you can store your files on it. All files stored on the disk are automatically encrypted. Every read operation, which addresses the drive, causes decryption of the data, and every write operation causes encryption of data to be written. This approach is called transparent encryption. Using this system, your data is always stored in a safe encrypted form and appear decrypted only in the application you use to process them, and only while they are processed.


The following picture shows the BestCrypt Control Panel, used to perform all control operations (creating and mounting containers, setting BestCrypt options and so on):



BestCrypt uses encrypted logical disks technology to provide transparent encryption of your data. You only need to choose a drive letter and a password for your new BestCrypt logical drive. After password verification, access and use of encrypted data become transparent for any application.

To achieve maximum security BestCrypt utilizes the well-known encryption algorithms:

  • Blowfish, in Cipher Block Chaining mode (256-bit key size);
  • Twofish, in Cipher Block Chaining mode (256-bit key size);
  • GOST 28147-89, in Cipher Feedback mode (256-bit key size);
  • Rijndael, in Cipher Block Chaining mode (256-bit key size).

BestCrypt system has a number of additional utilities:

  • Wiping utility (BCWipe)
  • Container’s Guard Utility
  • Swap File Encryption
  • BestCrypt Volume Encryption


We offer you a fully functional trial version of BestCrypt: https://www.jetico.com/download/bestcrypt-container-encryption