BestCrypt 8.23

BestCrypt 8.23

Reviewed by Gary Oldwood

"BestCrypt protects your sensitive data"

Overview

Sensitive and important data must be protected from unauthorized users, and you’re the only one responsible for your own stuff. Encrypt them before it’s too late; if you don’t know how, then you’re in the right place. BestCrypt is a software designed to protect personal files and folders by storing them on a virtual drive that doesn’t let anyone touch them, except you of course. Read on for more details.

Installation

The installation wizard will help you out with the procedure, which doesn’t have many configurations anyways. In one of the steps you’ll be asked to select the utilities you want to install alongside BestCrypt, and those are: Swap file encryption, Wipe Utilities, Encrypted Archive and Volume Encryption. You don’t have to install any of these if you don’t particularly need them. The main installation process will begin shortly afterwards, and during it you will get a notification message from Windows that asks you if you want to install a component- click Install and let the installation continue.

The program is clean from malware and other types of additional software.

Supported operating systems are Windows 9x, ME, NT, 2000, 2003 Server, 2008 Server, XP, Vista, 7, 8 (32/64-bit), Mac OS X and Linux.

Interface

BestCrypt’s interface is neat and has all its features organized in a nicely manner. There is the menu bar, the toolbar, a pane on the left with all available drives and a list of all created containers in the main area of the window (containers are special files located in the safe virtual drive created by BestCrypt, and all encrypted files are placed inside them- more information below). All functions in the program open in new windows and have helpful captions and comments that explain everything, making their usage easy for all users.

Pros

BestCrypt works basically like this: first it creates a virtual drive in your computer, in which all encryption and decryption tasks take place. Then the user creates containers in his physical disks, which are password-protected and hold all encrypted data. To access the data you must mount them on the virtual disk. You can create as many containers as you want; for example, you can have a container that stores all work documents, another container with personal files like photos/videos and another container with your password lists (each container has different password; note however that you cannot mount multiple containers on the same virtual disk at the same time, and for each new container you create you must format the virtual disk you want to mount it on). Everything in the program is user-defined and can be customized in great detail, including the container’s size (the virtual disk’s size is not constant and is equal to the size of the mounted container), encryption algorithm, encryption mode (CBC, LRW, XTS) and key-generator used (SHA-256, KG-Ghost, GOST). In addition, the password you create for a container is encrypted as well and you get to choose encryption algorithm, encryption mode and hash algorithm. If on the other hand you don’t want to use password based encryption, you can use Public Key Encryption (keys can be created/imported in the BestCrypt’s Key Manager or loaded from a webserver like wwwkeys.pgp.net) or a Secret-Sharing Scheme.

Supported encryption algorithms are AES (which is based on Rijndael’s algorithm), Triple DES, BLOWFISH-448, CAST, GOST, IDEA, RC6, SERPENT and TWOFISH.

A utility called Container Guard prevents you from accidentally deleting containers- you can only disable it if you have Administrator privileges.

Properties of already created containers can be viewed and changed too (for example, name, description, size, encryption algorithm/mode, etc.).

The plugin manager lists all installed encryption algorithms and key-generators and allows the user to add his own.

The Benchmark Test can perform speed tests on any of the available algorithms and encryption modes and report the results. Buffer size and byte pattern can be configured as well.

Extensive documentation is available to users, in which every single feature and option is explained clearly.

Cons

You cannot mount a created container to a virtual drive that has another container mounted on it, and if the container has just been created then the virtual disk that is going to mount it must be formatted first.

Alternatives

Very good alternatives are TrueCrypt (free), Axcrypt (free) and WinGuard Pro (free). TrueCrypt does an amazing job in encrypting your files, since it works in a way similar to BestCrypt. Many users prefer it over BestCrypt dues to the fact that it’s free.

Conclusion

All kinds of users will find this software easy to use and extremely interesting too. Moreover, the best protection methods are implemented so that no user will complain about limited or weak functionality. Top-notch program.

Requirements: 20 MB of hard drive space

What's new in this version: Windows 7 support, XTS encryption mode

Top user review

There are no user reviews. Be the first to review this software.

Antivirus information

Download3K has downloaded and tested BestCrypt on 28 Nov 2017 with some of Today's best antivirus engines and you can find below, for your convenience, the scan results:
  • Avast:

    Clean
  • Avira:

    Clean
  • Kaspersky:

    Clean
  • McAfee:

    Clean
  • NOD32:

    Clean
BestCrypt Antivirus Report

Email me updates

You need to log in before you can access this feature.
User rating
3/5 (1 votes)
Good
Your rating
Your review