Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Airscanner Encrypter for Pocket PC review
Posted on 18-Jul-2005 23:09 by M Freitas | Tags Filed under: Reviews


You probably read about cases of owners losing their PDA or Smartphones with very important or confidential information stored on the device’s memory. Not hard to imagine this can happen to anyone.

What can be done? There are some things to consider and some involve deploying software for remote management of mobile devices, or even software to completely lock down the device (some of these discussed in our previous article Defining a security policy for Windows Mobile Pocket PC).

One effective way of making information available to authorized users but still keeping it from prying eyes is using encryption programs. In this article we check the capabilities of 98720 Airscanner Mobile Encrypter for Pocket PC.

Airscanner Mobile Encrypter for Pocket PC is an easy to use encryption software. After installation on the Pocket PC it can be configured to initiate when the Pocket PC is soft reset, or be executed on demand by the user.


Easy to use menus

This software allows users to apply encryption in two ways. In the first type a single file or entire folder can be encrypted using a password. The resulting container file is only readable when decrypted back by using Airscanner Mobile Encrypter for Pocket PC with the correct password.

The file extension used to identify the encrypted files is automatically associated with Airscanner Mobile Encrypter for Pocket PC, so files can be decrypted directly from File Explorer.


elock are encrypted files and automatically associated with Airscanner Mobile Encrypter for Pocket PC

Another way of using the software is by creating an encrypted volume. This is an encrypted container file that can be mounted as a new folder on the system. The software can be configured for automatic un-mounting of this file after a certain inactivity time is detected.


User-set timeout

This is the best and most transparent way of using the program. If the file is created under \My Documents it will be automatically synchronized back to an ActiveSync partner computer.

After mounting an encrypted volume the user can simply utilize it like any other folder in the system – copying, moving and deleting files are simple operations like any other.


The volument management interface


On the left the SECRESTUFF file, and on the right the same file mounted as a folder

Pros
  • Easy to use encryption program
  • Encrypted volume capabilities
  • Auto-encryption of volumes after timeout set by user
  • Encryption using 168-bit 3DES
  • File Explorer on ActiveSync sees volume mounted as well

    Cons
  • Couldn't fine any really









  • comments powered by Disqus


    Trending now »

    Hot discussions in our forums right now:

    The horrors of owning a Ford - my story
    Created by dejadeadnz, last reply by sbiddle on 25-Jun-2017 20:46 (33 replies)
    Pages... 2 3


    Time for nuclear power in NZ?
    Created by Jonski, last reply by DarthKermit on 25-Jun-2017 02:27 (104 replies)
    Pages... 5 6 7


    The President Of The USA: Donald Trump
    Created by TimA, last reply by Rikkitic on 24-Jun-2017 10:49 (4543 replies)
    Pages... 301 302 303


    Climate change? What climate change?
    Created by kingdragonfly, last reply by BlueShift on 23-Jun-2017 16:15 (14 replies)

    Which mods have got fibre?
    Created by DarthKermit, last reply by scottjpalmer on 25-Jun-2017 20:53 (13 replies)

    Best option for 2G SIM for GPS car tracker
    Created by SumnerBoy, last reply by davidcole on 23-Jun-2017 21:59 (13 replies)

    I think these are fake iphone chargers
    Created by jimbob79, last reply by JoshWright on 21-Jun-2017 21:07 (12 replies)

    Who does not have a mobile phone?
    Created by Rikkitic, last reply by blakamin on 25-Jun-2017 20:22 (10 replies)