![]() ![]() ![]() ![]() ![]() |
Private File Top BenefitsPowerful EncryptionWhen you select files to encrypt, you are also asked to select a password. Private File takes this password and processes it through an industry standard algorithm called MD5. This process takes the original password and reduces it to a reasonably unique pattern of 16 bytes (128 bits). The encryption key is then taken from this pattern. The international version uses 5 bytes while the domestic version uses all 16. This encryption key is then used by the industry standard RC4 encryption algorithm to encrypt the data. The domestic version of Private File uses 128-bit encryption. The international version uses 40-bit encryption. Secure DeletionPrivate File securely deletes the original file if you set the preferences to do so. The deletion process is done in accordance with the U.S. Department of Defense standards. These standards consist of a three-pass deletion process. The first pass writes over the old data file using new data consisting of all bits set to zero. The second pass overwrites the file with data consisting of all bits set to one. The third pass is exactly like the first where the file is overwritten using data consisting of all bits set to zero. Once these passes are complete, Private File then directs the operating system to remove all references to the file from the disk. Cross-PlatformPrivate File allows you to easily transfer files to and from the Mac OS and Windows 95/NT platforms. By intelligently handling and storing the appropriate information, decryption of files from either platform is a seamless process.
CompressionCompressing data prior to encrypting can have significant benefits. Compression is the process by which a file is made smaller without losing any of its information. A compression program uses an algorithm, or method, for compressing the information in a file in a more efficient manner, thus taking up less disk space. Compression works by minimizing or eliminating redundancy and empty space. A file containing the characters "AAAABBBBBBB" typically would take up ten locations. However, this file could be compressed by one algorithm into "4A6B" and would take up only four locations. Private File utilizes compression to create a smaller file, thus the amount of hard disk spaced used by the encrypted file and the time needed to transmit the file are less than if the file was not compressed. |
|
Products | Support | Company Info | Site Map | Home Downloads | Updates | Products | Register |
||
Copyright 1997, 1998 Aladdin Systems, Inc. Questions? Send us a note. Modified 3/12/98 FxD Webworks |