This handy application builds encrypted data vaults that can be stored on your computer or other storage devices, though we found a quirk during testing. DiskScience's standard, bare-bones interface is easy to follow, and a wizard provides step-by-step instructions for creating secured virtual disks. In our tests, we generated a new drive in just a matter of seconds, and could easily access files and perform operations like copy, move, and delete just like on normal drives. Virtual drives can be any size, with simple but effective settings so they'll automatically mount on startup and automatically lock after a period of inactivity. Click once and the drive is disabled and can't be seen. Aside from password protection, the program also supports a few tough-to-crack algorithms like Advanced Encryption Standard (AES), Digital Encryption Standard (DES), and Gemstone.
We'd give DiskScience a good rating for its performance, despite its drab appearance, except for the flawed option to use CD or DVD images for the virtual disk. We were able to create and mount the disk, but our test computers didn't recognize the format when we tried to access its contents. Even so, DiskScience offers a straightforward approach to securing data, and its virtual disks are easy to manage.
DiskScience lets you protect your sensitive information without disrupting normal work. You don't need to enter a password each time you access a file. Instead, your information is stored on virtual encrypted disks that look and feel just like normal disks. CDs and DVDs can be copied into high speed, secure (or not), virtual CDs or DVDs. Standard ISO CD and DVD images can also be mounted as virtual CDs and DVDs. Encrypted disks are stored in single files protected with the 256-bit Advanced Encryption Standard (AES) or other user selected encryption algorithm. You can take this file with you. It can be on a USB device, CD, DVD, or shared on a network. The quantity and capacity are limited only by available storage. All commands except install and uninstall work under guest accounts and are accessible from the main application, the system tray, and the shell menu.