Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Airscanner Encrypter for Pocket PC review
Posted on 18-Jul-2005 23:09 by M Freitas. | Tags Filed under: Reviews.


You probably read about cases of owners losing their PDA or Smartphones with very important or confidential information stored on the device’s memory. Not hard to imagine this can happen to anyone.

What can be done? There are some things to consider and some involve deploying software for remote management of mobile devices, or even software to completely lock down the device (some of these discussed in our previous article Defining a security policy for Windows Mobile Pocket PC).

One effective way of making information available to authorized users but still keeping it from prying eyes is using encryption programs. In this article we check the capabilities of 98720 Airscanner Mobile Encrypter for Pocket PC.

Airscanner Mobile Encrypter for Pocket PC is an easy to use encryption software. After installation on the Pocket PC it can be configured to initiate when the Pocket PC is soft reset, or be executed on demand by the user.


Easy to use menus

This software allows users to apply encryption in two ways. In the first type a single file or entire folder can be encrypted using a password. The resulting container file is only readable when decrypted back by using Airscanner Mobile Encrypter for Pocket PC with the correct password.

The file extension used to identify the encrypted files is automatically associated with Airscanner Mobile Encrypter for Pocket PC, so files can be decrypted directly from File Explorer.


elock are encrypted files and automatically associated with Airscanner Mobile Encrypter for Pocket PC

Another way of using the software is by creating an encrypted volume. This is an encrypted container file that can be mounted as a new folder on the system. The software can be configured for automatic un-mounting of this file after a certain inactivity time is detected.


User-set timeout

This is the best and most transparent way of using the program. If the file is created under \My Documents it will be automatically synchronized back to an ActiveSync partner computer.

After mounting an encrypted volume the user can simply utilize it like any other folder in the system – copying, moving and deleting files are simple operations like any other.


The volument management interface


On the left the SECRESTUFF file, and on the right the same file mounted as a folder

Pros
  • Easy to use encryption program
  • Encrypted volume capabilities
  • Auto-encryption of volumes after timeout set by user
  • Encryption using 168-bit 3DES
  • File Explorer on ActiveSync sees volume mounted as well

    Cons
  • Couldn't fine any really






  • comments powered by Disqus




    Trending now »

    Hot discussions in our forums right now:

    The President Of The USA: Donald Trump
    Created by TimA, last reply by Rikkitic on 17-Jan-2017 10:46 (1700 replies)
    Pages... 112 113 114


    New Unlimited Fixed Broadband
    Created by LivingSkinny, last reply by noroad on 17-Jan-2017 09:56 (40 replies)
    Pages... 2 3


    How do people feel about lawyers?
    Created by Rikkitic, last reply by MikeAqua on 17-Jan-2017 09:35 (48 replies)
    Pages... 2 3 4


    Sick of TM search engine, how can I use google to find an exact Tag, ie NZ New?
    Created by TeaLeaf, last reply by Jaxson on 13-Jan-2017 19:13 (16 replies)
    Pages... 2


    New fibre install and SunGenie power supply
    Created by littleheaven, last reply by littleheaven on 16-Jan-2017 22:41 (14 replies)

    Mountain Bike Recommendation
    Created by networkn, last reply by joker97 on 15-Jan-2017 22:14 (14 replies)

    Holdens, what have you owned?
    Created by MikeB4, last reply by jaymz on 16-Jan-2017 11:05 (69 replies)
    Pages... 3 4 5


    Dish t2100 USB device not recognized...
    Created by Madeline, last reply by Madeline on 15-Jan-2017 23:54 (10 replies)