Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Airscanner Encrypter for Pocket PC review
Posted on 18-Jul-2005 23:09 by M Freitas | Tags Filed under: Reviews


You probably read about cases of owners losing their PDA or Smartphones with very important or confidential information stored on the device’s memory. Not hard to imagine this can happen to anyone.

What can be done? There are some things to consider and some involve deploying software for remote management of mobile devices, or even software to completely lock down the device (some of these discussed in our previous article Defining a security policy for Windows Mobile Pocket PC).

One effective way of making information available to authorized users but still keeping it from prying eyes is using encryption programs. In this article we check the capabilities of 98720 Airscanner Mobile Encrypter for Pocket PC.

Airscanner Mobile Encrypter for Pocket PC is an easy to use encryption software. After installation on the Pocket PC it can be configured to initiate when the Pocket PC is soft reset, or be executed on demand by the user.


Easy to use menus

This software allows users to apply encryption in two ways. In the first type a single file or entire folder can be encrypted using a password. The resulting container file is only readable when decrypted back by using Airscanner Mobile Encrypter for Pocket PC with the correct password.

The file extension used to identify the encrypted files is automatically associated with Airscanner Mobile Encrypter for Pocket PC, so files can be decrypted directly from File Explorer.


elock are encrypted files and automatically associated with Airscanner Mobile Encrypter for Pocket PC

Another way of using the software is by creating an encrypted volume. This is an encrypted container file that can be mounted as a new folder on the system. The software can be configured for automatic un-mounting of this file after a certain inactivity time is detected.


User-set timeout

This is the best and most transparent way of using the program. If the file is created under \My Documents it will be automatically synchronized back to an ActiveSync partner computer.

After mounting an encrypted volume the user can simply utilize it like any other folder in the system – copying, moving and deleting files are simple operations like any other.


The volument management interface


On the left the SECRESTUFF file, and on the right the same file mounted as a folder

Pros
  • Easy to use encryption program
  • Encrypted volume capabilities
  • Auto-encryption of volumes after timeout set by user
  • Encryption using 168-bit 3DES
  • File Explorer on ActiveSync sees volume mounted as well

    Cons
  • Couldn't fine any really









  • comments powered by Disqus


    Trending now »

    Hot discussions in our forums right now:

    Kiwis to be hit with tax on online purchases
    Created by Gordy7, last reply by tdgeek on 21-Nov-2017 09:49 (176 replies)
    Pages... 10 11 12


    Xero generated PDF's faulty ?
    Created by xpd, last reply by MadEngineer on 20-Nov-2017 20:18 (15 replies)

    Device choice - tablet, chromebook, other
    Created by Geektastic, last reply by Geektastic on 21-Nov-2017 11:53 (11 replies)

    Curious updates from Bigpipe
    Created by robjg63, last reply by hio77 on 17-Nov-2017 19:27 (11 replies)

    Where can I get Chilis?
    Created by trig42, last reply by networkn on 21-Nov-2017 10:27 (19 replies)
    Pages... 2


    Potential heatpump issue
    Created by theitman, last reply by Rickles on 19-Nov-2017 18:41 (9 replies)

    Data hunt (free data game) is back!
    Created by PhantomNVD, last reply by Linux on 21-Nov-2017 12:07 (69 replies)
    Pages... 3 4 5


    HDMI over Ethernet
    Created by Rickles, last reply by Rickles on 20-Nov-2017 18:49 (14 replies)