Have chicks and a lock: how to ensure information, how can you save in chmarny services? Boxcryptor - encryption of tributes at hmarni furry Yak encrypt files at hmari

Most of the providers

Guests are welcomed

Such as Google Drive, Dropbox, Box and Microsoft OneDrive, you can understand a good deal of encryption - one by one, scramble the files you have added. The encryption key is required for the encryption. A large number of providers in cold stores save the encryption key themselves, in lieu of the fact that you need to give it to those who need it and, with such a rank, you can be sure that the company doesn’t allow the company to access your files for access from the state authorities. Besides, whether you have physical access to your phone or a laptop, you can easily use a file from a computer, so a lot of these services for requests will leave you logged in to the system.

Dekilka companies of a dark backup copy, such as iDrive, allow keystones to release their power encryption key, encrypt the data on their local computer before being locked up by the person. Hey, please, there is a possibility to reserve for a more expensive package of business services, and not for an individual victorian. In this hour, iDrive will offer a 75% discount on its 2TB package, so it is practical to use the available options for everyone who wants to buy it.

As soon as you do it, seriously, you will ask about the confidentiality of your donations, if you don’t want to buy more expensive packages, we have an alternative solution. In some programs, you can encrypt your tributes in front of the hmaru, you can guarantee that only you can decode your files. In fact, whether it’s a clerk, it’s a protest in the main, there is a supplement to be provided to accountants, lawyers, professionals and other professionals, who are able to maintain a high level of confidentiality.

We have put together a list of such encryption programs for your viewing. Know those that best meet your needs, please, please, if you ever lose the secret encryption key, the data will be consumed for you as soon as possible.

nCrypted Cloud

Guests are welcomed

Change your Google Drive, Dropbox, and editable folders of your existing providers to the nCrypted Cloud folder. Win does not encrypt everything for the umovchannyam; guilty clacking on the files in the folders with the right button of the Misc, encrypt or encrypt them. The pictogram of the blue lock is assigned from the pictogram to the file or folders in the case of those with the encoding and encryption of the current 256-bit AES standard.

Win is also a great portal, access to any kind of browser, which allows you to remove access to all of your cool tributes in one instant. The portal is to revenge reports on journals about those who powered the files that were revised, as well as the history of encryption. You can find out if you want to know more about specific topics.

NCrypted Cloud will be added to the list of providers of cold stores. In the Danish hour, there is a lot of money from Dropbox, Google Drive, Box and Egnyte.

NCrypted Cloud is available for Windows, Mac, iOS and Android. Business is also available for a monthly subscription fee.

Encrypto

In the center of uvagi

Guests are welcomed

It is possible to manage the same file encrypted files, but it can also be used for local and dark encrypted files. Just drag and drop any file from the window with programs, set the password and give the necessary power supply code, you will see it on the screen as soon as you see it. We can encrypt the file and save it to your computer and / or send e-mail via Dropbox or simply send it to a USB drive. Encrypto is a 256-bit AES encryption. Yak vіdpravnik, і got the responsibility of the mother in the same way of the Encrypto rulings in the fact that the function of the special file vikorstannya was correct.

Guests are welcomed

Encrypto is available for Windows and Mac OSX.

Boxcryptor

Guests are welcomed

Allows you to open a folder in whatever your computer is, and everything in the folder is encrypted beyond the 256-bit AES standard. Then look at the files in the folder, start the Boxcryptor program, go to the required file and enter the password / key. As soon as you vikoristovyte service hmarny skhovish, yak-from Google Drive or Dropbox, the folder may be located at the top of the folder for synchronization programs.

In the place of the file, the names of the files and their extensions are still visible.

In a short time, Boxcryptor has to navigate to a large list of programs - those files that cannot be viewed or, say, in Google Docs. If you want to look at your computer or your smartphone, you will have to install Boxcryptor and add files for viewing locally.

Boxcryptor is available without a box for Windows, Mac, Android, iOS and Windows RT.

Cryptomator

Guests are welcomed

Zberig the files from the encrypted daddies are here on your computer. The name of the files can be rendered as a virtual hard disk, so do not remember the names of the robots with your files, because the process itself is up to robots with files, which are located on a USB drive. All files are individually encrypted.

You can open the treasures in any place of your computer, for example, at the Google Drive or Dropbox. Then just drag the files into the vault, encrypt them. A password is required to unlock the storage. Files are encrypted behind AES, and passwords are stolen by Scrypt.

Cryptomator є pay-what-you-want (pay-what-you-want) with a readable code for Windows, MacOS, iOS and Android. The reconstruction is not required.

Sookasa

Guests are welcomed

Pratsyuє is even similar to BoxCryptor, ale von is surrounded by Google Drive and Dropbox. The special Sookasa folder is located in the middle of the Google Drive synchronization folders or Dropbox, and everything in the middle of the folder is encrypted in the 256-bit AES windows. If you look at the file, you need to encrypt it and encrypt it locally with the help of Sookasa programs.

Sookasa allows koristuvachams to share files and folders with everything for everything with the help of a simple click of the right button of the Misha. Set a password, set up access rights to the real time mode, and set the terms for encryption keys, and you can exchange data through secure communication.

Sookasa is available for Windows, Mac, Android and iOS.

EncFSMP

Guests are welcomed

A simple, hiring tool from the list. Win a lot of things in a practical way the same code is used as a BoxCryptor, and in a similar rank. I will create an encrypted folder in any place on your local disk, and everything that you change into a folder will be automatically encrypted. You can open, redaguvati and export passwords for qix folders.

EncFSMP є absolutely bezel-less, without any cunning or necessary additional information. Vin is not a great function for a spilny vikorstannya or keruvannya files.

Corrupt Linux will be familiar with the EncFSMP system, as well as Windows and Mac. Android add-ons can use EncFSMP via the program

Guests are welcomed

(Updated: Cryptonite is no longer available on Google Play, but you can link it from GitHub), alas, unfortunately, EncFSMP is not uncommon with iOS.

Odrive

Guests are welcomed

Both as a real, and as a web-tool, which allows you to link all your regional records of a gloomy schema. You can share an encrypted folder in any place, for example, in your Google Drive or Dropbox directories. If files are distributed in these folders, they will be automatically encrypted behind the additional SHA256 hashes.

Files are encrypted without the help of a gloomy file, and not on a local computer. Tse means that the stink is not stolen from the hard disk.

Odrive can also boast of syncronization and spielding functions, which allow unimportant files to be copied like local files.

Odrive has a policy of encryption of "zero knowledge", so that the company does not know or not zberigє your encryption key. Lishe koristuvach can decipher files.

Kotless Odrive is available on Windows, Mac and Linux.

Cloudfogger

Updated: The Cloudfogger boot trim has been pinned.

Cloudfogger allows you to select any existing encrypted folders to replace the new ones. It’s often done by hand, especially for quiet, who have a lot of files, which need to be encrypted, but I don’t want to change the stench. It's also okay if you want to encrypt everything in your Dropbox sync or Google Drive.

Cloudfogger said that you can restore access to your files from the local system, as if, I will hand over them without the need to encrypt them. We can boast of a number of exchange functions, including an electronic USB port.

Cloudfogger is available for Windows, Mac, iOS and Android.

Viivo

Updated: PKWARE, Viivo's Batkivska company, announced that the Viivo project will be closed on the 1st day of 2018.

Viivo opens two folders on computers. Persha is just a special folder that can be saved locally if you change the files. Another folder to rob a copy of all instead of the first folder and encrypted. Another folder - tse that, yaku vi zavanazhuvatite in hmara. For example, її can be placed in the Dropbox folder or Google Drive. It allows you to easily peek, shoot and redirect files from local unencrypted versions and on-line encrypted versions without the need to encrypt files, if you know the stench.

Viivo vimagає reєstratsії through its own program for the victories of the working addresses of the electronic mail. Win vikoristovu 256-bit encryption standard AES. Viivo is also a file for economy and bandwidth.

Viivo is available without koshtovno for Windows, Mac, iOS and Android.

Encrypt the tributes before the hired ones at Khmaru

If you are introducing the data in the storehouse - photographs, documents, commercial documents, the data of the promulgation, then, you can see it more singularly to ensure the confidentiality. It’s quite an obvious fact that those people are not guilty of backing up your information, they’re browsing if you want to go to the dark server. It's a pity that not all providers of bad luck can guarantee you a great deal of importance.

If you want to take privacy information from your hand, encrypt your files with one of the protected programs before uploading them to Google Drive, OneDrive, Dropbox or Box.

Viivo software is available for Windows, Mac, iOS and Android.

It is a pity that the distributors of cold services are not particularly borrowed from bake-free tributes. Navigating the most popular of them (Dropbox, Google Drive) cannot boast of "old" encryption. Happily, even to find utilities, to allow you to secure encryption in hmari, moreover, it smells on the client's side, such a rank allows you to secure files every hour of transmission. Singingly, the most popular tool for encrypting tributes from hmari is Boxcryptor.

Boxcryptor - the whole program for ciphering money is specially optimized for the dull victorian. Vona allows you to infinitely transfer that zberigati tribute from the cold skins. Boxcryptor will adapt all of the popular hotspots: Dropbox, Google Drive, OneDrive, etc.

Boxcryptor robot principle

Boxcryptor is a virtual disk on a computer that allows you to locally encrypt data in front of security users. When the file is added, or the folders before the storehouse, they will be encrypted "for a favor" after an hour of copying. Boxcryptor uses AES-256 and RSA algorithms for efficient retrieval of information.

In short, such encryption є those who have received data from a person become inaccessible when locked through a browser. Ale dealers vrahuvali tse, and added the ability to swap encryption for any files that can be delivered to the hmara, for those who need (don’t forget the key to Boxcryptor) access to the tributes. There is also the possibility of a safe access through the keys of the keystroke.

Tariff plans

There is a set of tariff plans Boxcryptor: Free, Unlimited Personal, Unlimited Business. More detailed information about them can be found on the website of the retailer (see statistics on the cob). Ale function of the bezel-less version of the special victorian is quite enough.

Pidtrimuvani OS

Boxcryptor can be used as a desktop and mobile operating system. Explore versions of Windows, Android, iOS, Mac OS X, Linux.

Vikoristannya Boxcryptor

Installing Boxcryptor

Before the installation of the programs bazhano, the clientele of the dark store (Dropbox, Google Drive too) has already been installed. For such a Boxcryptor vipad, it will automatically assign and add a folder with data from hmari.

Installing Boxcryptor does not appear to be installed by any specific software. During the installation process, you will need to vibrate the checkbox for re-installing the system and after completing the installation of the programs, the installer will see a pardon.

It will also be necessary to allow the installation of the driver of the virtual attachment.

Nalashtuvannya Boxcryptor

After the program has been installed and re-secured, you will start to step up.

Boxcryptor allows you to open both remote and local recordings. For another, the security of the future will remain, but the key will not be transferred as far as the bottom line, but for the sake of which you will be able to see it, if you do not lose the date, you will not be able to renew it.

For the root of the local regional record, it is necessary to draw three specks (picture). For the "Local account" field, you need to read "Setup account".

A tick is put on, so that such a rank is used to ensure that the "Create key file" button is pressed for the access to the key file.

At the offensive vіknі vigaduєmo password and put a tick for the sake of the minds of the victorious and the policy of confidentiality.

I know for a while, because of the reason that it is our responsibility to assume that the password has been secured.

In the offensive window, the data of the local regional record will be shown. Press the "Next" button, confirming with such a rite of tribute.

The offensive wins need to vibrate the tariff plan. Click on "Free", then click on the "Next" button.

Remaining familiar with the success of the regional recording. Press "OK" and swipe the form in the input to the local regional record. Enter a password to come up with a password.

Be guilty of being the visitor of the victoriannya - "Tutorial" (you can immediately close it) and the Windows provider will also be connected with a bloody cache (Dropbox in my vipadku).

At the provider of small logical disks, you can still hit a virtual disk, at whom there is a folder, as a result of a folder in the storehouse of khmari.

To encrypt the file, click the right mouse button and select "Boxcryptor> Encrypt".

Writing encryption in the papacy of the Boxcryptor virtual disk from the file can be edited as default. Ale in the catalog of the encryption on the server.

Likewise, when trying to add the file to the schema, it will be fed into the encrypted file.

If you have installed a number of clientele of dark skins, you can see them in the settings (the icon of Boxcryptor in the Windows> Settings) on the "Locations" tab.

I have also repeatedly talked about the complexity of the situation with business and bad technologies (that is, in essence, and not only with business, but be a kind of customer, who secure the confidentiality of information). On one side - the efficiency and economy, which will give you an edge over competitors. From the bottom - the "ability" of algorithms and mechanisms for obtaining information, as a material, having gone through one round of money for a few rocky, can be used in such beggars, as in material meaning, as well as for the reputation of all.

However, if you go to food all the time, then the possibility of realizing the greatest option can be significantly reduced. Sreshtoyu, the order of the drowning ones - to the right of the hands of the drowning ones. Only the encryption of files from the client side and the addition of an additional important bar'єr to the reader - even on the server, the stench will not be encrypted. The first option is to pick up more stolen services.

Encryption is a more efficient method, moreover, it is applied to the robot with files. Once encrypted files cannot be viewed online, it is more difficult to transfer them to other criminals - if they look at the encrypted file, they will know the minimum password, but there are some other programs for decryption.

(Before you start reading the details, I recommend consulting the previously published article (), assigned to the information security for those hilarious technologies, you should be aware of the two that you need to auth to use the password alone wicked your obl_kovogo writing is practical without any zusil from your side). And now - a lecture about the current theme.

Create container from TrueCrypt

- tse open-source cryptographic software secured, like opening a cryptographic container on a hard disk, in which you put files, or folders with files. The container is displayed like a folder or okremiy pidrozdil on a hard disk and "calls" can be seen like a great array of binaries, to which, without a program, that knowledge of the code phrase would be difficult to deny access. With the help of TrueCrypt programs, you can look at the data in the middle of the encrypted archive, like a folder. The operation of encryption / decryption is displayed "on advantage". With such an archive, you can spontaneously try not to be afraid, but there are third-party access to important data, but for greater security (by the way, the loss of information through a technical security is also a wider archive of yours).

Why Dropbox? Causes of the spout. For the first time, Dropbox doesn’t have enough space for the size of the file, which allows the cryptocontainer to be rooted like a great one. In other words, Dropbox can see changes in the structure of files to synchronize and copy only. In practical terms, it means that when a change is made to a great archive, Dropbox will synchronize only a small part of the data, as it has been modified, and not the entire file, as it will rob a large number of services.

Create archives for Khmari for additional help BoxCryptor

Since all is one vicoristovuvati like a storehouse service, why wouldn’t they install the cryptoarchives all at once there? Mabut, this is how the creators of popular programs used to think about it, in spite of what you might think about it, just be a bad service. BoxCryptor opens the daddy vibrating service of cryptoarchives, so all files can be saved if you can do it and change it through the virtual disk, which can be opened by the program. Also є programs for mobile platforms to allow you to access the cryptoarchive from your tablet / phone. Use programs for Android (useful with crypto archives, which can be downloaded to Dropbox / Google Drive), if you are looking for Skydrive from the nearest person) and iOS (only available from archives, which can be downloaded to Dropbox, see Google Drive) The box-free version of BoxCryptor can only be used with one archive and not encrypted file names, in which it is not possible. Similar services provide competing services CloudFogger and SecretSync.

Vikoristovuvati hmarny service from a cipher on the side of the client

Do you need to know about something else to get information from the side of the client, as you need to work on your own. Protect є y hmarni servants, children automation processes. Tse zokrema, SpiderOak і Wuala. The principle of robotic clients is such that, before the information is transferred to the server, the client is encrypted locally by the client, as the result is that it’s safe to use these servers. The process of establishing and adjusting the SpiderOak client is slightly folding down to Dropbox, but it is uniquely possible, for example, password-setting files to be distributed, etc.

Encrypt okremi files

If you do not have so many files, or you need not to send the files from the encrypted viewer, then є sense just zapakuvat the necessary files to the encrypted archive. For such companies, the popular archivator 7zip should be used - just wrap the encryption option when opening the archive and specify a password.

On disk encryption

I will understand the opposite situation - you will be able to consistently process the confidential information of a significant exchange. The solution for single-disk encryption on FileVault for OS X, BitLocker for Windows or EncFS for Linux is at the top of the list. This solution can be used to encrypt the encryption on a hard disk or to encrypt the entire disk. In the remainder of the unencrypted version, there is a small part of the file that can be used to remove the encrypted files of the system, and both the authorization methods can be stored like passwords, so also the folding methods of authentication on USB and authorization keys, on the key attachment. Such methods will help the robot to rely on the system to update files that are even more problematic for anyone, or to make sure the most secure ones are concerned. Zrozumilo, all the data that are stored in the dark services will also be encrypted, so as the stench will be encrypted in the dark, however, it will not be a matter of access to them through the web client.

It will remain an hour that all people are mobile, the servants of freelancers are required, and the company will switch to the last working mission. Cich minds have a great deal of the important availability of gifts, whether I’m sure I’ll attach something (both stationary and mobile). At the same time, the grown-up will drink on the cheerleading service of the danikh, both from the side of the koristuvachiv and the company.

Vikoristannya khmarnykh skhovisch allows you to publish your files, redaguvati їkh and share them with friends and colleagues. For additional services, you can not only save the files themselves, but also the history of the changes, also synchronize the data on the outbuildings.

On the smallest growth-minded person I am interested in the wicked skins of the winners and the needs of the dwellers, who are in the dwellers. Those providers of cold storage services provide the possibility of redundancy and encryption of the data, or even know the new self-service services, so that they will not be able to save the money when they are distributed in a cold storage. As a matter of fact, one of these services, which can be attributed to a large number of providers in cold stores, is the Boxcryptor service, which is available in the latest statistics. The whole service was implemented by the German company Secomba GmbH (Werner-von-Siemens-Str. 6, 86159 Augsburg).

System vimogi Boxcryptor

The Boxcryptor service for virobnik views in the following formats:

  • Plugin for Google Chrome browser.
  • Portable version.
  • Version that will require local installation.

The statty has a version that will require a local installation. Servіs pіdtrimu rozgortannya on offensive platforms:

  • Windows XP SP3 and vishche (for obviousness .NET Framework 4.0).
  • macOS X 10.7.5 is the same.
  • iOS 7 for Android (iPhone / iPad / iPod).
  • Android 4.0.3 is that vische.
  • Windows Phone.
  • Windows RT.
  • Blackberry 10.

For the interoperability of the local version of the service with the smallest skins, the following is required:

  • Oblіkovі records koristuvach for hmarnykh skhvish, which plan to trim and encrypted versions of files.
  • There is a great deal on the local storehouse in the volume, where the files are taken from the dark files that are ciphered. Zagalom, vilne mice on a local disk, but sometimes a lot of mischiefs, you can get some bad luck, for example:
    • Yandex.Disk nadaє 10GB;
    • Dropbox - 2GB;
    • Google Drive - 15GB;
    • Box - 10GB;
    • OneDrive - 15GB;
    • Amazon S3 - 5GB;
    • CloudMe - 3GB;
    • iCloud Drive - 5GB;
    • Telekom - 25GB, etc.

Functional possibilities

The warehouse of the available functionalities for the service can be deposited according to the type of payment (license).

Table1 ... Functional possibilitiesBoxcryptor is deposited in front of payment type

Functional possibilities Short description Availability at the warehouse before payment
FreeUnlimited PersonalUnlimited BusinessCompany Package
Vikoristannya algorithms for encryption AES-256 and RSAEncrypted in the place of files, distributed in the darkSoSoSoSo
Secure accessGiving third-party access to their encrypted filesSoSoSoSo
Welcome to mobile appsPossibility of progression of programs on mobile annexesSoSoSoSo
Encryption of name of filesMasking the name of the file, how to grow up at the gloomy skhovischНіSoSoSo
Pidtrimka non-interconnected set of cold platformsThe ability to get a tribute is not on one, but on a few dumb treasuresНіSoSoSo
Visibility of the main annexesPossibility of opening the service more low on two outbuildingsНіSoSoSo
Technical supportThe presence of non-interconnected technical support from the side of the virobnikНіSoSoSo
Group of koristuvachivPossibility of exchanging koristuvachіv from a group for a small exchange of files with a group as a wholeНіНіSoSo
Komertsiyne vikoristannyaPossibility of victorious service for corporate purposesНіНіSoSo
Personally vikoristannyaPossibility of a vicious leash with one koristuvachSoSoSoНі
Vikoristannya before paying more than one koristuvachThere is no possibility to add a number of registrations for the registration of one license (license).НіНіНіSo
Meister KeyPossibility of decrypting company files available to the spy workers without knowing the passwordsНіНіНіSo
Clearing passwords for the companyThe ability to skip and change the passwords of the company's encrypted files, so that you can use encryption, without losing access to the encrypted files of the company.НіНіНіSo
Pidtrimka Active DirectorySynchronization of Boxcryptor corystuvach with corystuvachi from the company's Active DirectoryНіНіНіSo
Visa policyImplementation of security policies for the purpose of communicating internal and calling vimogs (additional password, encryption of file names, etc.)НіНіНіSo
Keruvannya koristuvachami and outbuildingsCentralized keruvannya with corystuvachi and configurable parametersНіНіНіSo
AuditKeeping an eye out for the behavior of criminals with the sign of the appearance of an age of safety (uncharacteristic for a corystuvach try to enter, the failure of the established politicians is too small) and reacting to themНіНіНіSo
Two-factor authenticationStagnation of two-factor authentification of corystuvachiv for the additional solution of Duo SecurityНіНіНіSo

Payment before payment on Boxcryptor

The part to pay for Boxcryptor is as follows:

  • Free - bezkoshtovno.
  • Unlimited Personal - 36 € ($ 48) per pik.
  • Unlimited Business - 72 € ($ 96) per pik.
  • Company Package:
    • 8 € for one koristuvach per month - if added for 1 rik.
    • 6.4 € for one koristuvach per month - if you add 3 rocks.

The additional payment for a special vikoristannya (Unlimited Personal) vyrobnik is given a discount for students at the size of 25%.

The letters "Free", "Unlimited Personal" and "Unlimited Business" are designated as deprivation for one koristuvach:

  • Free and Unlimited Personal - storing only for special purposes (zahist special information) deprived of one koristuvach. Tsi registrations for okremikh physical persons;
  • Unlimited Business is not just for a special person, but for corporate information, alas, it’s not just for a special person. The overpayment is ordered, as a rule, for legal entities, or for individual individuals. I'll just look at those who have their own license (license) for the skin specialist.

On the display of personal lists, the "Company Package" sub-list is allowed for one license to add no number of coristas.

Robot with Boxcryptor

Installing the desktop version of the Boxcryptor service

Service to achieve simplicity at Vikoristan, especially in the interconnected warehouse of functions, which can be found within the framework of the prepayment of Free and Unlimited Personal types. I want two types of them to be the most popular among Russian koristuvachiv. To speed up the promoted functions, it is necessary to link the distribution kit from the virobnik website for all platforms.

Within the framework of the statistic, the robot has been shown a service on the distribution kit for the most popular platforms in the Russian koristuvach: Microsoft Windows and Android. At the time of preparation of the material, the version of Boxcryptor 2.3 is available on the virobnik website for the Microsoft Windows operating system, and version 2.1 for Android (and also Beta version 2.49.559). For other platforms, the warehouse of functions is analogous - a lecture description of the functions of the service for skin platforms is directed by the virobnik to his site at the leading users of the corystuvach.

After the hour of installation, the product will become aware of the fact that it will accept the "License to please", that will be settled between the virobnik Secomba GmbH and the kintsev koristuvach, as well as the Policy for the acquisition of Danikh.

If the launch is established, it will need to be authenticated, for the obviousness of the Boxcryptor record, or to open such a regional record.

Malunok1 ... Restoration of the desktop versionBoxcryptor onWindows

When the field record (profile) is opened, you will be prompted for those that you need to remember the password, and access to all encrypted files will be lost. Only after waiting for a while and having received the information about saving the password, you can proceed with the restoration.

Immediately, within the framework of the profile, it will be necessary to use the type of subscription (license).

Malunok2 ... Vibir type in front of payment in the desktop versionBoxcryptor onWindows

Vibrations are provided only for three types, quarters and the newest type of Company Package subscription is available for selection only on the site (it is also possible to add a profile for a specific type). Vyrobniki proponyuyut usually for the type "Company Package" and "Unlimited Business" start probnі period:

  • Company Package - 30 days trial period for learning about functional possibilities.
  • Unlimited Business - bezkostovne dough with a stretch of 1 dough.

Activation of these features is available only through the web interface from the Boxcryptor cloud record.

As soon as the payment of Unlimited Personal or Unlimited Business types is vibrated, the browser is launched, and the payment bar is displayed in a new way.

In addition, as you proceed with the selection and payment of the Viconan, the service itself will start.

The version installed on smartphones with the Android operating system will also need to be authenticated.

Malunok3 ... Authentication inBoxcryptor onAndroid

When you start it for the first time:

  • At the lower right corner of the screen in the area of ​​\ u200b \ u200bwind there is a view of the icon.
  • See "Pidruchnik" for robots with a service.
  • The service is automatically generated by the shitty skins that are tied from the attachment, so that every time you see it, you can see it right there.
  • The "Provider" has a virtual disk opening, which is used to encrypt files and synchronize with hmarny schemas.

Malunok4 ... First launch of the desktop versionBoxcryptor onWindows

As soon as Windows is already connected, whether it’s okay, you’ll be in the Boxcryptor Provider in the area of ​​the virtual disk.

Malunok5 ... Vmist virtual diskBoxcryptor for desktop versionWindows

The submission of the robot from encryption and decryption of files (directories) is available within the framework of the first Boxryptor virtual disk from the installation of hmarny files (for example, Dropbox).

The first launch on an add-on with an Android operating system is also visible in the boxcryptor.

Malunok6 ... First launchBoxcryptor onAndroid

Nalashtuvannya Boxcryptor

If you want to adjust the parameters in the service, you need to vibrate the item ("Adjust") in the context menu to click on the end in the area of ​​assistance (div. Baby 4). Effortlessly to expand the settings to be displayed within the window "Parameters Boxcryptor".

Malunok7 ... Nalashtuvannya desktop versionBoxcryptor onWindows

The appointment of local catalogs, as vikoristoyu to collect important information, to be encrypted for the help of Boxcryptor, vikonnya onslaught "Dodati" on the contribution of "Roztashuvannya" and start vibrating catalog.

In order to tie the hmarna skhovische, indicated on the deposit "Roztashuvannya", to Boxcryptor enough to cling to the word "Possilannya" and memorize the given configuration forms.

Malunok8 ... Attaching a gloomy skhovishcha in the desktop versionBoxcryptor onWindows

As a result, the addition of the local catalog and the linking of the gloomy schema of the given location will appear in the list.

Malunok9 ... Catalog that hmarne skhovische, connected to the desktop versionBoxcryptor onWindows

Parameters of the field record, for which the prepayment for the service is fixed, can be scored on the "Profile" deposit. Parameters that can be edited ("Ім'я", "Prizvische", "Email" і "Password"), denoted by a symbol. In addition, the tab is needed:

  • About the type of payment.
  • Possibility of generating a master key, which is necessary for renewal of access to encrypted data from a company, for example, for a manager who is responsible for a given data. This power is available only for subscription to the Company Package.
  • Possibility of exporting keys for securing robots with a service for the duration of the netting (in offline mode).

Malunok10 ... Configurative parameters of the field record in the working versionBoxcryptor onWindows

In order to gain access to the encrypted file, to be able to secure access to, for example, colleagues in robots, you need to formulate a group and add to the whole group. However, there is one caveat: adding to groups can be less quiet, but also using Boxcryptor (with this very type of subscription). Within the framework of the qikh nalashtuvan it is possible to:

  • Dodavati and viklyuchati members of the group.
  • Take the group.
  • Re-assign (show) the new owner of the group to the member of the group (the member of the group who vibrated and clicked on the new context menu).

Malunok11 ... Groupies at the desktop versionBoxcryptor onWindows

More precisely, you can adjust the settings for additional configuration parameters, the "Dodatkovo" tab. The main set of parameters allows you to quickly change the name of the Boxcryptor virtual disk that was opened by the service and the same as the one given to the letter, and you can also set up the possibility of one-hour launch of the service with the operating system, rewrite and update the encrypted file. Activation of encryption of names of files should be recommended by the virobniks for that matter, if they really need it, because it is a type of encryption injected into the productivity of the system (especially with a large number of files). For more fine adjustment, it is necessary to vibrate the item "Greater adjustment".

Malunok12 ... Expanded desktop versionBoxcryptor onWindows

In warehouses with extended adjustments, you can enable / disable the following parameters:

  • "Include the cat's victorious" - for seeing files and catalogs for cats, the smell of the stench may be updated.
  • "Connect as hard disk" - Boxcryptor when installing a virtual disk for encrypting files and directories, and the option allows you to set the disk to the status of physical from the point of view of the system.
  • "Switches for all criminals" - indicates the availability / inaccessibility of the Boxcryptor disk to all criminals, if they are recording their presence on the work machine, de-fire the service.
  • "Turn on the picture of all the way" - allows you to get / set up to the file of 256 symbols. However, there can be problems within systems that do not have a lot of potential.
  • "Add to Windows Volume Manager" - allows you to add the Boxcryptor virtual drive to the Windows Volume Manager.
  • "Do not show files and folders that can be repaired from a point" - allows you to enable / disable from the store of visible files, which can be repaired from a point. Such files are molded, as a rule, with services of cold stores, and the encryption can lead to irreparable inheritance.
  • "Prikhovuvati files those folders, as it is uncomfortable to decipher the names" - the option allows you to prikhovuti the files from the encrypted names, which koristuvach has no rights to decrypt.
  • "Do not show the OneDrive upgrade" - allows you to turn on the prerequisite, which is formed when robots with the services of the OneDrive dark store, and in the whole dark file, you can save files without encrypting files from the local box or encrypting files.
  • "Automatically start recognizable disks" - allows you to start recognizable information, which can be connected, like a location, to come to Boxcryptor.
  • "Automatically start grated discs" - allows you to start grated discs as a location, before joining the Boxcryptor.

Boxcryptor on Android has a very modest warehouse of configuration parameters. Automatically activates є: encryption of the file names, resetting the service setting to zero after three attempts to authenticate, as well as reviewing the files. Cycling function є "Install a lock with a PIN-code" - you will allow the service to be cleared from unauthorized access and by entering a PIN-code, as a result of which the service is triggered at the moment of its operation in the background mode.

Malunok13 ... Warehouse nalashtuvanBoxcryptor onAndroid

Having set up the service for the needs of the customer, it is possible to repair the service without prior ciphering and decoding.

Encryption and decryption of files and directories from Boxcryptor

The zagalny principle of encryption, the implementation of the whole service, the nagadu clue about Koschiy Bezsmertny: Koschiy's death in the head, the head in the egg, the egg in the roll, the roll in the hare and the same. At a number of services, such components are presented with a number of cryptographic keys, which are encrypted (encrypted). You can use a zagal to see a decal of cryptographic meanings (keys / passwords), so that you can use it:

  • Password.
  • AES key.
  • RSA key pair:
    • View key.
    • Close the key.

Already in the presence of the initiator of the cryptographic conversion of the AES and RSA keys, they start for:

  • Koristuvach.
  • Company (Group of koristuvachiv).

The keys are formed without the need for the middle on the attachment of the koristuvach before the hour of the opening of the account of the koristuvach or the company (group of koristuvachiv). All keys are superimposed on the Boxcryptor server, except for the password of the koristuvach, but all the stinks are encrypted (behind a single RSA key).

Malunok14 ... The general principle of encrypting files, implementingBoxcryptor

Effort of operations from encryption / decryption of files in order to get rid of locally on computers of koristuvachiv, and also later to display synchronization with a bad file. The procedure for encrypting the field fileє in:

  • Forming an individual key to a file (AES key).
  • Encrypted file on the whole key.
  • Encryption of the key to the file on the encrypted key of the RSA keystore. You will be given access to the file, the style of development and presentation of the operation, and you will formulate your secret for the skin.
  • The addition of encrypted keys to the file for the skin corystuvach in the end of the encrypted vmistu - this is how to enter the encryption of the file.
  • Encryption of encrypted RSA keys based on the password of the keystore.
  • Keeping all secrets on the Boxcryptor servers.

When the file is encrypted, it will be returned to the last message, only when the open RSA key is replaced with encryption. However, the mustache and the reincarnation of the prikhovani from the eyes of the koristuvach.

Tsei service pidkupovuє by simplicity yogo vikorystannya for encryption and decryption. Effort of the operations to win in one click. It is necessary for the help of the "Provider" within the framework of the Boxcryptor virtual disk, vibrate the file, place the file in the dark box, click on the context menu and click on the "encrypt" or "decrypt" (in lieu of the targets). If the file is encrypted, the green square and the lock appear in the file, which means the fact of the encryption.

Malunok15 ... File encryption in robotic versionBoxcryptor onWindows

Bezposeredno at the most gloomy skhovischі file will be renamed for the additional extension to the new extension ".bc". Change the look and feel of the look at the gloomy skhovisch, just hit the encrypted file, the context menu and select the item "Show the dropbox code". When an encrypted file is opened without the help of a middle one, the user will be notified about the need for its revision and vibration of the code. A fragment of such a view is shown below.

Malunok16 ... Displaying an encrypted file in a robotic versionBoxcryptor onWindows thatDropbox

A similar rank is used to encrypt catalogs. When the catalog is encrypted, the suffix "_encrypted" is supplied to the name of the catalog, and the green square and the lock on the designated catalog in the "Provider".

Another way to encrypt a file is to change / copy to a previously encrypted directory. This rank is automatically encrypted.

Malunok17 ... Automatically encrypt the file in the desktop versionBoxcryptor onWindows

Yak zgaduvalosya earlier, the whole service can be encrypted yak for dark skins, and you can get locally distributed files. Analogous diy. Encrypted and encrypted files are stored in the dark grocery stores, locally on the attachment of the corystuvach (when locally deleted files are stored) and in the Boxcryptor virtual disk. Files cannot be sent to the Boxcryptor server from the client's viewer. The file encryption can be viewed from the reader only within the framework of the Boxcryptor virtual disk or copying from the disk. The file will be displayed in the unreadable view of the current encryption messages (for information about the need to rewrite and vibrate the code).

Whenever a blank file is displayed, it can be encrypted within the Boxcryptor virtual disk, and the synchronization icon "" is displayed on the image displayed, and when a blank appears, it will be displayed as a synchronization.

Decryption zd_desnyuєt go to the choice of the item "Decryptor" and to produce the output file before decryption. If the encrypted file is locked to the directory, then all files will be automatically encrypted, as in the new one.

Malunok18 ... Deciphering the file in the desktop versionBoxcryptor onWindows

When the service on the outbuildings is victorious with the Android operating system, it is easy to get encrypted. It is necessary, within the framework of the service, to go to the directory of the dark store, to click, and for the help of the "" button, vibrate the file on the attachment to add it to the dark. At the moment when the service is secured, you will be aware of the need for visibility - that is, it’s encrypted.

Malunok19 ... File encryptionBoxcryptor onAndroid

Managing access rights to an encrypted file / directory in Boxcryptor

To gain access to the encrypted directory, go through the context menu, like clicking on the encrypted file. Access can be given to groups of koristuvachiv (before giving at the stage of setting up the service) or by some koristuvachev (depending on the address of the e-mail address). I know, there is a nuance - access can only be done by a team, but by a Boxcryptor;

Malunok20 ... Management of access rights to an encrypted object in the desktop versionBoxcryptor onWindows

When restoring in the operating system with the same regional recording, access to the Boxcryptor virtual disk will be interconnected. Apparently, one of the most important ones, for the duration of the day, in the new necessary conditions, including those installed when the service is set up (the parameter "Switches for all the corystuvachi" - div. Fig. 12), not in the framework of the just don’t give such a resource. In fact, the files on the same disk are encrypted for some kind of distraction from the remote control (and on the virtual disk itself, the stink is taken from the open view).

Give an encrypted file to a person who doesn’t use Boxcryptor

If it is necessary to transfer the encryptions of a person's file, as it is not using Boxcryptor, it is possible to create the functions of integrating the product with the Whisply service. This transfer can be realized by speeding up the context menu item, like clicking on the encrypted file from the Provider.

Malunok21 ... Safe transmission of encrypted files in the desktop versionBoxcryptor onWindows via serviceWhisply

The message from the browser is to see a link to the Whisply service, linked to the file transfer. To complete the transfer, you will need to go through the following steps:

  1. Revision whether the file was transferred correctly.
  2. Specify parameters for accessing the file: hour, when the file becomes inaccessible to anyone; The possibility of a file will be captured once or twice.
  3. Set password.
  4. Send messages to the addressee (including the way of sending: to the e-mail address, SMS messages, if they were copied to the buffer for submission to the addressee).
  5. Provide a password (for an analogy with a confirmation message for a download).

Malunok22 ... Robot with serviceWhisply on the transfer of a file encrypted inBoxcryptor

As a result, the recipient of the encryption file is removed from the file with the ability to read it. In addition, if the encrypted file is changed in hmari, the addressee will have the opportunity to revise the actual version of the file, but only by holding out the term for doing so.

Encryption of names of files from Boxcryptor

Encrypted names of files, like encryption / decryption of a file, can be accessed through the context menu. As a result of the encryption of the name - the file in the gloomy schema will be represented by the sukupnistu of the ".bc" extension.

Malunok23 ... Encrypting the name of the file in the desktop versionBoxcryptor onWindows

You can rotate the normal file using the context menu.

Boxcryptor Koristuvach Meister Key

This function allows you to revert the encrypted files of the company, if you forget your password, or if you are angry, without giving your more important ones to the others. If you want to generate such a key, you need to go to the "Profile" tab next to the Boxcryptor settings and next to the "Meister-key" row to "Generate". At the window, you need to enter passwords for the new key and generate the key itself. For the formation of the key, it is necessary to enter the key through the web interface of the applicable policy.

Malunok24 ... Generation of the koristuvach meister key for the desktop versionBoxcryptoronWindows

When you use the master key, you just need to unblock it by entering the default password on the "Profile" deposit at the set up service. Do not allow public access to all encrypted files in our companies.

Visnovki

We looked at the main functions of the Boxcryptor service, which was designated for capturing the dwellers of koristuvachiv and the company for cleansing their distribution at the wicked shopkeepers. For okremikh koristuvachіv three types of pre-payment are passed:

  • bezkoshtovna - Free - with functional;
  • paid - Unlimited Personal - extensions from free warehouse functions;
  • Paid - Unlimited Business - the most common warehouse of functions, intended for the acquisition of not only special, but business information about special people, small companies and private entrepreneurs.

The companies propose an okreem type of subscription, which is the most common and independent business package - Company Package.

The peculiarity of the Company Package є the manifestation of the functions that are organized by the company itself, for example:

  • Formation of the meister-key of a koristuvach and deletion of passwords of koristuvach, so that you will not be able to encrypt the files of the company if you lose the passwords, for the rest of which they are encrypted.
  • Active Directory support, which allows you to synchronize the area records of Boxcryptor users with the area records of users from the company's Active Directory, which allows the system administrator to keep track of life.
  • Management of coristas and outbuildings, as well as for centralized management of all coristas of the company and parameters of configuring services on corporate outbuildings.
  • Possibility of conducting an audit (monitoring), as well as detecting uncharacteristic behavior of a koristuvach.
  • Two-factor authentication, which will preserve the authentication of criminals for the additional storage of the company Duo Security.

The main passages for the service є:

  • Platform versatility that can be accepted: Windows XP SP3 for Windows, macOS X 10.7.5 for Windows, iOS 7 for iPhone (iPhone / iPad / iPod), Android 4.0.3 for Windows, Windows Phone, Windows RT, Blackberry 10.
  • Availability of portable versions (for Windows, macOS, Linux platforms).
  • There is a great number of services of hmarish treasures that can be viewed: Yandex.Disk, Dropbox, Google Drive, Box, OneDrive, Amazon Cloud Drive, Amazon S3, CloudMe, Cloudwatt, Cubby, Egnyte, GMX, iCloud Drive, Liverive, Orange, SDS, SpiderOak, storegate, Strato HiDrive, SygarSync, Telekom, WEB.
  • Viconu encryption / decryption of files in the local storage (Local Storage).
  • Intuitively intelligent interface.
  • Cash-free payment before payment.
  • Victory over the overhaul of the encryption algorithms - RSA and AES.
  • Possibility of robots in offline mode and subtle synchronization with a dumb skewer.
  • Viconuє encryption / decryption in one click of the bear.
  • Vykonannya encryption / decryption "on advantage".
  • Automatic encryption of files when they are distributed in encrypted catalog.
  • The ability to securely access the file.
  • Renewal of access to encrypted company files for an additional master key.
  • Expansion for Chrome browser.
  • Detection of unauthorized access When starting the service, you need to enter the password for the boxcryptor account. Access to the service can be interconnected by a regional record of the operating system.
  • Technical support for feeder types in front of payment.

To minus in the service you can bring:

  • Minimal set of functionality at a non-standard registration.
  • Decrease in productivity of the system and for the hour of registration of encryption of imen files (especially in the case of great number of files).
  • Visits at warehouses of mobile suppliers of one of the most popular in Russia - Mail.ru. However, the virobniks proponyuyut call with them, as long as the list of provided providers doesn’t know what is needed, the stench is to make a change.
  • The impossibility of verifying operations without the need for a locally installed version of the service (requires a web interface), for example:
    • Vibrate the type of Company Package subscription and activate the trial period for 30 days.
    • Submit the policy, tied from the generated master key.
  • The duration of the automatic connection of the mobile devices, associated with the boxcryptor's regional recording, before the hour of launching on the mobile outbuildings from this very clear recording. That is, on new outbuildings, the Boxcryptor is de-installed, the service provider of the dark groceries is guilty of but automatically detected, but on the mobile outbuildings it will be submitted manually.

Shhorazu, if I read about a black-haired dolt, who are in the dropboxes themselves with google drives important to document, I am amazed that our people are not turbulent. Lame the account, fight, and vikoristvoyut at their obscene purposes. And tell me later, that the honest people have nothing to do with it! To that, the stike is simpler for the victorian cipher, it is simply necessary for the horror.

The most important information is EncFS, a cryptographic file system that uses AES and Blowfish algorithms. A whole lot of it is not only from the villainy, but from the even tsikavi people at the shoulder straps (for the mind, as the stench does not look to you especially).

The oversights are obvious here:


  • Simplicity is victorious. The software inserts allow you to encrypt the file in a couple of clicks.

  • Possibility of remote robots. Used with other tools, you can encrypt files on your machines.

  • Construction of encrypted files. Do not expect a pass, but for our manager it is more beautiful, not a Veracrypt cryptocontainer or analogs, which doesn’t take a busy day in Khmara.

  • Vіdkritі dzherela. The number of bookmarks is guaranteed.
For a short time, I can easily guess the problem of installing EncFS on Windows. Ale here, I'll try to help. Go strictly for the instructions, and everything you see!

So, for the ear, we need to install the Visual C ++ 2013 system. Marvel at the list of installed programs: if you already have a package of installations, go to the advance point. Yaksho ni, robimo like this:

I will install it in a zychayaya order. Okay, if you can get it to install Visual C ++ 2013 for Windows. Our library has already been established. In the last view, we wikin in the browser, on the side of the linked library library.

Well, the axis, they were pleased with the deposits. Directly not Windows, but Slackware go :) Everything was handled by hand. And now you can install the software itself.

Rozpakovuєmo archives have a folder on your vibir. I take a bubo and a kamlaєm minyaєmo right to file, how to win. In the files encfs.exe and encfsw.exe, the tab "Summity" is selected, and for a few dozen of them the summarization mode is enabled for Windows 7, and for all - the robot mode from the administrator. Everything, startєmo encfsw.exe! Do not mix it up!

Everything is fine, such a key is to blame. Yaksho ni, marvel at, de vie have blessed.

Also, the installation was successful. Now, how can we use a miracle of engineering thoughts to make a mistake. Do not be fooled, it’s simpler, lower it. If you want to use Daemon Tools or Alcohol 120%, you will be able to get it right. For a cob to wonder how we have nalashtuvannyah. Embossed on the key icon, and embossed on Preferences.

Nalashtuvannya is absolutely simple. The top checkmark is for adding auto-zoomed-in, the bottom checkbox is for automatically opening the assembled folders.

And now I will encrypt the folder in the middle of your Dropbox. Vzagal, the program is vidminno pratsyuє be-like dumb, abi stench you have imagined at the provider, like a folder. I viprobuvani buli Google Drive, Yandex Disk and Khmara Mail.ru. Zrozumіlo, with amplified Owncloud and Webdav pracyuvatime, like a Swiss year.

Otzhe, in front of our Dropbox folder Private. You can not open, but just encrypt the entire folder.

Uwaga! The program absolutely does not send Russian letters on the way to the required folder! To that, either rename all folders on the way to shukano or change it in the first place. For umovchannyam folder khmar is set at the profile of the koristuvach, and it’s not easy to take revenge on the Cyrillic. Vtik to the author for Russophobia buv messages :)

Now it is embossed on the icon with the key, and the top item is selected - "Open / Create". At vіknі, scho announced, I will need a folder. Before the speech, in the same place it is possible to record її, as it was missed.

Vibrate password for the point of installation (disk letter).

Now I have a new folder. You just enter the password.

As a result, a new virtual disk with DOKAN im'yam will be accepted in the system, for which your archives of home porn are filled with everything you want from outside the eyes.

The axis yak will be watched, if you do not go to the mounting disk, but bezposeredno into the folder. Navigate the name of the files to be converted to crocodile.

The first axis, how to beat the evil-tempered, how did it get lost in your gloom. Nagadati, zychayno, bezmozhe, ale of vividness, so to lie there - the devil's two!

A cipher folder can be easily added to the system through the same icon next to the tray (there will be a list), and you can use it as a flash drive.