Comodo Disk Encryption is a software used for protecting sensitive information by encrypting a drive from the computer. It offers 2 modes of protecting the information: encrypt a drive with various encryption settings or mount an encrypted virtual partition and save the information inside it.
The program is really easy to use, has a simple and clean interface, so that even a user who doesn't know much about encryption could use it. It will split the local drives from the virtual drives in 2 different tabs so that the user will not get confused.
Comodo Disk Encryption offers the possibility to use various hash and encryption algorithms. The has algorithms include Whirlpool (512-bit, the strongest), SHA1, SHA256, MD5 and RIPEMD160, and the encryption algorithms include AES (Advanced Encryption Standard, 128-bit, the strongest), Serpent, Blowfish, 3DES and Twofish.
There are some additional layers of security for when encrypting a drive: password authentication, USB memory key authentication or both. The password authentication will require to enter a password whenever the system is started to enable accessing the encrypted drives. For the USB memory key authentication, a USB memory will have to be configured as a authentication key. After this is done, the key will have to be plugged-n the system for the encrypted drives to be accessible.
-BSTComodo Disk Encryption features and highlights:
Comodo Disk Encryption is licensed as Freeware for Windows (32-bit and 64-bit) operating system / platform from data encryption software without restrictions. Comodo Disk Encryption 2.0.138413 is available to all software users as a free download (Freeware).
Compatibility with this disk encryption software may vary, but will generally run fine under Microsoft Windows 10, 8, 8.1, 7, Vista and XP on either a 32-bit or 64-bit setup. A separate x64 version of Comodo Disk Encryption may be available from COMODO.
We have tested Comodo Disk Encryption 2.0.138413 against malware with several different programs. We certify that this program is clean of viruses, malware and trojans. [Read more]