home *** CD-ROM | disk | FTP | other *** search
- BestCrypt NP Data Protection system
- Jetico, Inc., 1997
-
- File: README.txt
-
- Dear Sir or Madam,
-
- Thank you for your decision to try this demo version of the
- BestCrypt NP Data Protection software. We beleive that everyone
- has the right to keep his private information in a secure form.
- We consider it as a basement of human being.
-
- BestCrypt NP is designed to satisfy your demands to keep files,
- letters, pictures, databases, etc. in an encrypted form.
- Taking into account many prior products, their good useful features
- and disadvantagies, we have tried to create an easy to use product
- based on strong cryptography algorithms to be sure that your data
- will not be decrypted even under a serious investigation.
-
- We invite you to try BestCrypt NP yourself and understand if
- this product really help you to keep your private data in a safe
- form.
-
-
- **************************** Contents ************************************
-
- 1. About BestCrypt NP software
- 2. About BestCrypt NP system installation
- 3. If you have file-containers created by previous version of BestCrypt
- 4. Wiping free disk space - recommendation
- 5. If You Want to Comment on the Product
-
- **************************************************************************
-
- 1. About BestCrypt NP software
- ------------------------------
-
- BestCrypt NP software supports encrypted logical disks for Windows 95
- computers and works with all kinds of media, including network-accessible
- disks.
-
- How does BestCrypt NP works? BestCrypt NP creates a pre-encrypted file called
- a container. This container is created by an encryption algorithm (Blowfish,
- GOST28147-89 or DES) using the key generated from the user password. In
- addition, BestCrypt NP creates a logical disks. The container is linked to
- a logical disk, and the disk is opened for access using the unique container
- password. All data stored in the logical disk are stored in the container in
- an encrypted form and transparently accessible for an authorized person.
-
-
- 2. About BestCrypt NP system installation
- -----------------------------------------
-
- Setup program copies all necessary files to your hard disk and inserts
- needed lines into Windows95 Registry database.
-
- To install the BestCrypt NP system run SETUP.EXE program. It is recommended
- that you exit all Windows programs before running Setup program.
-
- BestCrypt Setup program uses the standard Windows95 way to install software
- and provides all necessary explanations of installation steps' details. The
- only default information user may want to change during installation is
- the Folder name for BestCrypt NP software and the Directory name where
- to place the BestCrypt NP files.
-
- All dialog windows of the Setup programs are look as each other and
- have the following buttons:
-
-
- Cancel - click this button to abort installation
- Next - click this button to proceed installation
- Back - click this button to return to previous step of installation
-
- After a successful installation Setup will ask you to restart your computer.
- This is because the BestCrypt NP drivers will need to be loaded into the
- computer memory before you begin to use the BestCrypt NP system.
-
- Note: BestCrypt NP Setup program writes also an information to Windows95
- Registry database, places virtual drivers to SYSTEM\IOSUBSYS system
- directory, prepares the file for uninstall procedure.
- Please do not make any manual manipulations to install or uninstall
- BestCrypt NP software to prevent appearance of unused garbage software on
- the system directory or unused strings in Registry database.
-
-
-
- 2. If you have file-containers created by previous version of BestCrypt
- -----------------------------------------------------------------------
-
- Containers of BestCrypt NP software are compatible with BestCrypt 3.x
- containers. Hence, user may copy BestCrypt NP containers from Windows95
- computers to DOS or Windows 3.xx computers and access the data using
- BestCrypt 3.x software.
-
- NOTE: Attribute 'Read-only' of the file-container should be set if you
- are going to use the container with BestCrypt 3.x, and this attribute
- should be reset if you use the container with BestCrypt NP software.
-
-
-
- 4. Wiping free disk space - recommendation
- ------------------------------------------
-
- Please take into account that when you move your sensitive files
- from usual disks to BestCrypt NP logical disks, operating system
- (Windows 95) won't erase your files' contents from the disk - it
- will delete only 'references' to them from FAT (Fat Allocation
- Table).
-
- To make it impossible to restore deleted files from your disk, you need
- to run wiping utility to erase information from disk sectors that is
- currently marked as free, but may contain previously written sensitive
- data.
-
- You may run BestCrypt NP wiping utility from BestCrypt NP Control Panel or
- from Windows 95 Explorer program. After installing BestCrypt NP system you
- will find the command "Wipe free space" in Explorer program if you call
- context menu (by pressing right mouse button) for the drive you would like
- to wipe.
-
- In case, if you have any other questions about BestCrypt NP, please
- read Help-file in the program itself. The Help-file contains a whole
- description of the software from many it's aspects.
-
- 5. If You Want to Comment on the Product
- ----------------------------------------
-
- If you like the BestCrypt NP software, we invite you to register your
- copy of the software. Once registered you will get a commercial version
- of the BestCrypt NP, help and the product support. To become a registered
- user, please order a commercial version of the BestCrypt NP Data Protection
- software using a form available on:
-
- http://www.jetico.sci.fi/order.htm
-
- If you have a product suggestion or comments on how to make BestCrypt NP
- better, e-mail us at this Internet address:
-
- jetico@sci.fi
-
- Be sure to include your name, the version number of BestCrypt NP,
- and your Internet address with all correspondence.
-
- Please visit our WWW-site to get information about our other products,
- Frequently Asked Questions lists, BestCrypt UserÆs Evaluation page and other:
-
- http://www.jetico.sci.fi
-
- Note that your comments become a property of Jetico, Inc.
-
-
- We'd like to thank you for a time you have spent with us.
- We hope that it was useful to you.
-
- Jetico, Inc. company's team.
-
- http://www.jetico.sci.fi
- jetico@sci.fi
-
-
-