Extrait du mode d'emploi : notice AXANTUM AXCRYPT FILE ENCRYPTION SOFTWARE
Les instructions détaillées pour l'utilisation figurent dans le Guide de l'utilisateur.
Shredding documents Did you know that documents that you delete can be very easily recovered by any number of third party tools commonly available on the Internet? One of them is even built into recent versions of Windows the recycling bin. With AxCrypt you can elect to delete files and documents in a more permanent way. Select the files you want to shred, and select the `Shred' option on the right-click menu. You will always be asked to confirm this, since this operation cannot be undone. Click `OK' or `Cancel' as the case may be. If you clicked `OK' your data will now be overwritten with random data before being permanently deleted. Advanced use AxCrypt supports a number of a advanced uses which will only be mentioned briefly here:
You can rename encrypted files to anonymous names the original names will still be restored on decryption. You can create self-decrypting files that you can ship to users who do not have AxCrypt installed. There is an install-free decrypt-only `viewer', AxDecrypt, which you and others can use to decrypt without installing the full program. You can create and use key-files which are files with randomly generated strong keys ensuring that your information security is not subject to weaknesses in your chosen pass phrase. These may (and should) be stored on removable media such as USB-drives. Information on security Encryption alone can never ensure security. It often is a vital tool, but as all tools must be used carefully. A single tool will seldom solve all security needs. This section tries to point out some additional aspects to consider when using any file encryption product such as AxCrypt for information security here taken to mean confidentiality and integrity. Security provided by AxCrypt The following is true of a file encrypted with AxCrypt: If you are using a key-file, your information is protected by the full 128-bit strength of AES currently considered unfeasible to break. If you are using a pass phrase only, AxCrypt will protect your information within the limits of that pass phrase. If it's too short, security suffers. Anything shorter than 10 characters is short. Full 128-bit strength requires a meaningless sequence of at least 22 characters. [...] Please see the product home page for details on other usage. Windows Explorer displays your desktop and is the part of Windows normally used to navigate among all your files and documents, where you double-click to open for example. 14(19)
Context menu In Windows Explorer you double-click to open a document, but you may also right-click to see a menu of choices appropriate for the particular document. This right-click menu is called the context menu. This is where you'll find most of the functionality of AxCrypt. 15(19)
Encrypt To encrypt a file, right-click it and select `Encrypt'. You'll be asked to provide a pass phrase and optionally a key-file. Using a key-file will ensure that the full strength of AxCrypt is applied, but is beyond the scope of this short guide. Enter a pass phrase, i. a sequence of secret strings. This is the secret that will protect your data from viewing by others and undetected tampering. Please note that encryption does not protect you from data loss. Regular backup copying is the only method that will do this. Enter your pass phrase a second time for verification. It's vital that you ensure that you actually type what you think you type, and that you remember this pass phrase. Click `OK' There are NO BACKDOORS into AxCrypt. If you forget your pass phrase your documents are likely to be irretrievably lost. Write it down, or print it, and keep it in a safe place. 16(19)
Open an encrypted document The encrypted document will have the. axx extension, and be shown with the AxCrypt icon. To conveniently decrypt the file, just double-click it to open it in its own application, and when done have it re-encrypted if modified. Decrypt an encrypted document To permanently decrypt a document, right-click it, select `Decrypt' and enter the pass phrase when prompted. Click `OK' The file will be restored to its original name and contents. The pass phrase memory AxCrypt has the capability to remember any number of pass phrases for decryption, and a default pass phrase for new encryption. This memory is only as long as your logon session. 17(19) If you use the pass phrase memory, you should be using a password protected screen saver, and not leave your system unattended. To enable this feature, use the provided checkbox options on the pass phrase dialog. The dialogs above show these checkboxes at the bottom. [...]..
Vos avis sur le AXANTUM AXCRYPT FILE ENCRYPTION SOFTWARE - QUICK INSTALLATION GUIDE
Je n'aurai pas chargã© ce produit si on ne me l'avait pas recommandã©, excellent locgiciel de cryptage. C'est un excellent logiciel, c'est tout à fait ce que je cherchais
efficace et pratique et en plus possibilité de choisir la langue, pratique quand on sait s'en servir, pratique quand on sait s'en servir. Si pas de mode d'emploi pas d'uytilisation :), a verifier . Produit indispensable, ghfgffgnyjnhy(n, tudn i , très bon produit, bien mais j ais perdue mon code ou plutot ma clé et j ais due faire une fausse manipe j ais surment effacer toute les clef et j arrive pas a recuperer un autre mot de passe allors que c est possible c est pour ca que je veux etudier le mode d emplois merci
Tres bien, je ne l'ai pas encore utilisé ! C'est bien, ras ne manque que le mode d'emploi complet, tres bon logiciel. Logiciel petit mais costaud je ne pourrais plus m'en passer (pas même l'idée d'aller voir s'il en existe de meilleur) irreprochable, efficace si prudence !