Introduction to R-Crypto

Top  Next

R-Crypto is an easy-to-use disk encryption software that protects your confidential information and personal data on a desktop, notebook, or a removable data storage device against unauthorized access.

To protect the data R-Crypto creates encrypted virtual disks (virtual data storage devices). These disks provide real time data encryption and decryption which are fully transparent to the user, it means that the data is being encrypted just before it is being written to the disk and is being decrypted right after it is being read from the disk without the need of user intervention. All data (such as file and folder names, and content of all files) stored on such disks is constantly encrypted. The access to data on the virtual encrypted disk is impossible unless the user provides a correct password. At the same time, all file and disk operations for connected virtual encrypted disks are performed the same way as for standard disks.

All data of the encrypted virtual disk is stored together with the disk meta-data in a single file-container. That means that a virtual encrypted disk is actually an ordinary file that can be stored on any data storage device, like a hard drive, USB-disk, CD, DVD, or a network resource, and can be easily transferred to another computer or backed up.

R-Crypto encrypts the data on virtual disks using the cryptographic infrastructure of the Microsoft Windows operating system. This infrastructure allows the users to use various installable cryptographic service providers, including those that are already pre-installed. For example, Microsoft AES Cryptographic Provider is one of the pre-installed cryptographic service providers in Windows XP and Vista that implements the modern and most secure encryption algorithm Advanced Encryption Standard (AES) with key length of 128, 192, and 256 bits.

Such approach allows the users to select themselves the cryptographic sub-system that satisfies their requirements. It also reduces limitations on the use of R-Crypto in companies that require certification for such products to meet certain governmental or corporate standards.


R-Crypto Features

Contact Information and Technical Support

System Requirements

R-Crypto Limitations

Trial Version Limitations


R-Crypto Management Panel


Protecting Your Data Using R-Crypto

Managing Encrypted Disks


Configure Auto-connected Encrypted Disks

R-Crypto System Tray Icon

R-Crypto Settings


Command-line Utility


Security Issues