iXBT Labs - Computer Hardware in Detail

Platform

Video

Multimedia

Mobile

Other

Aladdin Secret Disk



The program uses an interesting algorithm of generation of sequence of random numbers. In principle, some modern chipsets are equipped with a very good generator which gives not pseudo-random but pure random numbers. That is why such tricks will die with time, but today, when all programs are to comply with a definite standard, we can make use of them.

The main settings of the system. The first item is the most interesting - it allows improving the integrity of data.

Additional parameters. Automatic locking of a computer in case of at least one secret disc is a very useful feature. The Red button is a powerful tool, and you should think over the key combination in order not to lose all data when working in some other program. The default combination suits very well here.

One of the most intriguing features of the Secret Disk is "work under duress".

When you are creating a secret disc you must define its size. If you choose a wrong variant, you will may face problems in future.

Encryption algorithms can be different. Moreover, you can activate encryption modules which were absent when the program was under development. But a 128-bit length for an internal algorithm is sufficient for the majority of applications.

A password for an access under duress is created for each disc separately, and separately from a main password.

Such feature weakens the protection, that is why you are to decide whether this will be useful for you. When you are making a copy of the key the guide recommends you to create it on a diskette, because a file can sometimes be accessed if you create the copy on a hard disc and then delete it.

This is a disc administrator which serves for the most of operations with discs: settings, creation, deletion, backup copying etc.

At this stage of connection a possibility of choosing a name for a disc is very convenient.

Now the disc looks like other partitions on the hard disc both for the operating system and for programs. It will be seen until it is disabled.

The file archiving is another powerful tool.

On the whole, I'd like to thank Aladdin for the excellent documentation of the system, both printed and electronic, with its helpful detailed steps.

Write a comment below. No registration needed!


Article navigation:



blog comments powered by Disqus

  Most Popular Reviews More    RSS  

AMD Phenom II X4 955, Phenom II X4 960T, Phenom II X6 1075T, and Intel Pentium G2120, Core i3-3220, Core i5-3330 Processors

Comparing old, cheap solutions from AMD with new, budget offerings from Intel.
February 1, 2013 · Processor Roundups

Inno3D GeForce GTX 670 iChill, Inno3D GeForce GTX 660 Ti Graphics Cards

A couple of mid-range adapters with original cooling systems.
January 30, 2013 · Video cards: NVIDIA GPUs

Creative Sound Blaster X-Fi Surround 5.1

An external X-Fi solution in tests.
September 9, 2008 · Sound Cards

AMD FX-8350 Processor

The first worthwhile Piledriver CPU.
September 11, 2012 · Processors: AMD

Consumed Power, Energy Consumption: Ivy Bridge vs. Sandy Bridge

Trying out the new method.
September 18, 2012 · Processors: Intel
  Latest Reviews More    RSS  

i3DSpeed, September 2013

Retested all graphics cards with the new drivers.
Oct 18, 2013 · 3Digests

i3DSpeed, August 2013

Added new benchmarks: BioShock Infinite and Metro: Last Light.
Sep 06, 2013 · 3Digests

i3DSpeed, July 2013

Added the test results of NVIDIA GeForce GTX 760 and AMD Radeon HD 7730.
Aug 05, 2013 · 3Digests

Gainward GeForce GTX 650 Ti BOOST 2GB Golden Sample Graphics Card

An excellent hybrid of GeForce GTX 650 Ti and GeForce GTX 660.
Jun 24, 2013 · Video cards: NVIDIA GPUs

i3DSpeed, May 2013

Added the test results of NVIDIA GeForce GTX 770/780.
Jun 03, 2013 · 3Digests
  Latest News More    RSS  

Platform  ·  Video  ·  Multimedia  ·  Mobile  ·  Other  ||  About us & Privacy policy  ·  Twitter  ·  Facebook


Copyright © Byrds Research & Publishing, Ltd., 1997–2011. All rights reserved.