What happens if I enter an incorrect Password when trying to decrypt my files? For this reason, it is strongly recommended to save your data before using PenProtect and to write down or remember your Password. In order to execute PenProtect, enter your Password repeat for security in the field Confirm , then press the button to run data protection. This makes it safe to insert personal data when naming files. Try the online “live support” chat with operator. PenProtect is useful to protect your data but is fundamental to solving the problems of privacy that are often found in offices or companies. In the following image, you can see files before and after encryption:

Uploader: Tygora
Date Added: 17 August 2011
File Size: 57.83 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 84071
Price: Free* [*Free Regsitration Required]

PenProtect – password protect USB Flash Drive and Pen Drive

How to use PenProtect. Popular Downloads Ammyy Admin 3. PenProtect requires no installation. After this process is finished, the option to restore the data penprotrct available. See for example the following image. None of these programs were able to recover the original file. Unfortunately, users can often forget their Pen Drive or Flash Drive in a computer, allowing other users to penprotect 1.45 their personal data.


Data protection is performed using an AES bit the best of penprotect 1.45 technology to encrypt, with a password, all private data, files and folders, stored in your USB Flash Drive. So, all you have to do is type in a password and confirm it, in order to encrypt the pen drive.

PenProtect 1.45 Download

After running the “penprotect. To decrypt files run PenProtect, enter the Password and press the button to decrypt them. Penprotect 1.45 submit your review for PenProtect. Click on the image to enlarge.

Consequently, the PenProtect protection is particularly efficient. To protect the data, there are two possibilities: Click here to review our site terms of use.

PenProtect Manual for your Flash Drive, Pen Drive and Flash Memory

For more information on AES, which is currently used as a standard by the United States Government and numerous banks, one can refer to the following page: After penprotect 1.45 execution of the protection by PenProtect can I retrieve data using specific programs “Undelete” files?

We can not guarantee there will be no damage. EXE, which is the usual extension for file applications, can also no longer be executed after encryption. It is not absolutely necessary to protect or unprotect all the contents of your Flash Drive. PenProtect has won more than 50 Awards with 5 stars! If for some reason it is no longer possible to use the original Pen Drive, you can obtain a new registration. PenProtect is meant to secure your data in cases such as these. Is the encryption process safe?


This concept is fully explained in the F. In this penprotect 1.45 of the manual there penprotect 1.45 additional information.

The following image contains most of the devices currently on the market:. This is the effect of running PenProtect.

No size limit of encrypted files.

It is not only encrypts the file content, but also the file name and folders. What is a good Password?

Due to its increased popularity, prices have reduced and GByte storage has increased. Microsoft 3D Pinball – Space See also this image.