Blog of CyberSoft Company. Encryption Software

Cryptocontainer vulnarabilities for remote attacks

At present, cryptocontainers are used to store confidential information both on user’s PCs and in corporate environment of businesses and institutions; they can be created with almost any encrypting software. Cryptocontainers are so widespread because they are convenient in handling encrypted files and offer opportunity to implement on-the-fly encrypting.

Cryptocontainer vulnarabilities

Nonetheless, only a few users realize how vulnerable files in a cryptocontainer become after the latter is mapped as a logical drive of the operational system, and how easily they can be stolen. This is why we have written this article, where we are going to demonstrate on a specific example how to steal information from a cryptocontainer created by means of iconic for RuNet (and others) TrueCrypt encrypting application. However, the same situation is true for any other software, which allows to create cryptocontainers and has no additional functions for protecting encrypted data they store.

Read more

Password or Passphrase: what to choose?

Encrypting a file and then finding yourself unable to decrypt it is a painful lesson in learning how to choose a password you will always remember. Thus when creating a password we are inevitably faced with a dilemma: it must contain a variety of letters, numbers, symbols and be easy to remember.

Password or Passphrase

In this case it is recommended to use passphrases which help us to remember a complex set of characters. For example, it may seem that this combination “2b,0rn2b:Tit?” is difficult to remember but in reality it is simple because it is built on the basis of the utterance that is known to almost every one and it almost impossible to forget.

However, first things first…

Read more

Crypto containers vulnerabilities

One of the most convenient solutions to encrypt files is the creation of virtual encrypted volumes, which are also called crypto containers. However, not everyone is aware of the shortcomings of this method and that mismanagement of their use may do more harm than good. So in this article I want to talk about the crypto containers vulnerabilities and methods that allow dealing with them.

Crypto containers vulnerabilities

Read more

Transparent file encryption on a PC using Cybersafe File Encryption

We’ve added a “transparent file encryption” function to the new version of CyberSafe. In this article, I’ll describe how this function works and its basic abilities, as well as its advantages over EFS, the standard data encryption system of windows.

How does “transparent encryption” work?

CyberSafe’s transparent encryption feature executes a special driver of the file system, which carries out decryption of files when certain applications request it, as well as reencryption after the application is finished with the files. The driver also encrypts all new files added into a secure folder.

The encryption process looks like this:

• the file is first encrypted using the AES algorithm and a 256 bit symmetric key generated randomly by the program;
• the symmetric key is RSA encrypted via the user’s Public Key, which can be up to 8192 bits in length and is stored in an alternate NTFS data stream.

Read more

Methods of hiding files and folders. Part 1

Information for fans


Information on the hard drive may be hidden in several ways. We’ll talk about them from simplest to most complex. This article is about how to hide files and folders, not how to find it. Therefore, methods of hiding only delineated. If someone needs more detailed information – he will always be able to find it and, what is more importantly will bring his own unique fragrance by mixing the spices. Concrete recipes will benefit those who seek, not hide.

Read more

Get download link

We can give you some ideas about keeping your data safe. Sign up for our newsletter, or activate the checkbox and leave the fields blank.