This is the feature-filled file and drive encryption software that delivers far more usable features than others do. idoo
But that's not all. We've packed our Encryption Software with clever additional features you will find extremely helpful. For example, when someone tries to log in over and over without the proper password, you get an email notification. Meanwhile, the program shuts down to prevent further attempts.
Additionally we give you a unique ability to fully monitor all your files and drives. You receive a complete report on all accesses to files and the running of programs. One quick check lets you know if any unauthorized access has occurred. You can quickly follow up and stop access before extensive damage can take place.
Features | Free Edition | Pro Edition |
---|---|---|
Hide Single File | ||
(Deny Read) Lock Single File | ||
(Deny Write) Protect Single File | ||
Change Password | ||
Folder Encryption |
- | |
Batch Files Add | - | |
Hide Folder | - | |
Hide Disk | - | |
(Deny Read) Lock Folder | - | |
(Deny Read) Lock Disk | - | |
(Deny Write) Password Protect Folder | - | |
(Deny Write) Password Protect Disk | - | |
Folder Monitor | - | |
Tech support | ||
Free Download | Upgrade Now ( Giveaway ) |
Hide Data: It can perfectly hide your files, folders or drives from users' programs, and make them completely invisible.
Lock Data: You can easily lock your data by it, and the locked files, folders or drives, cannot be accessed or modified.
Security Protection: The files and sub-folders in a locked folder can be protected without any password.
Encrypt Data: It has the function of file encryption and folder encryption.
Portable Encryption: Using advanced AES encryption algorithm, it packs and encrypts the folder into an executable file, which is portable and readily to use.
Safe Delete: No one can recover the safe deleted data from your disk.
Password Protected: There's no way to run or uninstall the software without the password.
Easy to Use: With user-friendly interface, it is very easy to use.
Hardware Compatibility
System Requirements
Why do we need file encryption tool
What features do you need for file encryption software
idoo File Encryption Features