Rohos Disk and Rohos Mini 2.3

July 1, 2016 saw the release of new versions of Rohos Disk Encryption and its free counterpart Rohos Mini. These applications received a facelift and improved internal design.

Read more

Backup copies made faster in Rohos Disk Encryption 2.2

Rohos Disk ensures that your data is protected from third parties by locking the disk in your absence. The size of the disk can be increased as needed. You can create several disks on a PC, USB flash drive, or a DVD at the same time.

We’ve introduced a new version of Rohos Disk — Rohos Disk Encryption 2.2. A distinctive new feature that it brings is the remarkable Backup Disk functionality. Now making a backup copy of the contents of an encrypted disk is much faster and easier.
Read more

Setting up shared access to an encrypted disk

Rohos Disk Encryption allows you to set up shared access to an encrypted disk for various purposes:

  1.  Common access to all users of a single computer.
    This is default behavior of Rohos Disk letter access mode. All users on a computer or terminal server is able to access and work with encrypted drive letter. Users do not need to know the disk password, and they do not need to run the Rohos Disk program. Nobody knows where  the disk file container and cannot delete it. The password for accessing the disk is entered by the Administrator or the owner of the Rohos disk.
  2. Access rules on a Windows Terminal Server.
    In this case only selected users knows the password for the disk. Each user enters the password for accessing the disk independently whenever necessary. Secured Disk is accessed by using plain password or a hardware based key.
  3. Shared access through a shared network folder.
    The Rohos disk drive letter will be open for common access on the local network from the computer which acts as the file server. Entering the password to enable the Rohos disk is done by the Administrator or owner of the Rohos disk once per day. He or she will also grant users privileges for network access and is also responsible for making backups and shutting down access to the disk.

 

Common access for all users of a single computer.

In the Rohos Disk options you must enable Enable shared disk drive (local and network) – this option is ON by default .

In this case, when one user connects a Rohos disk, the drive letter of this disk will be immediately visible to all users when they open Explorer.

When the read-only option is set, users (including the owner) cannot change the contents of the Rohos disk.

You can set up different rights for reading and writing to the folder  within the disk itself. You give some users full control, while other users will have read-only access, and a third group will not be authorized to view the contents of the secret Rohos disk at all.

Advantages of this method:

  1. Only one user, the owner of the disk, has the password.
  2. Ability to limit access to certain users.
  3. The disk can be located in a place where only its owner has access to it, which limits the possibility that it can be copied or deleted by others.
  4. Users do not need to know the password for the secret disk, and the drive letter will be immediately visible in Explorer.
  5. This setup is also suitable for users on a Terminal server. Work folders with especially important and confidential files and programs can be converted to a Rohos disk using the “Encrypt folder” function. This will make the disk protection transparent to users of the remote desktop.

Features of this method:

When opening Rohos Disk for other users, the drive letter will be visible among the computer’s additional disks. If it is suddenly turned off, it will become inaccessible for all users. To avoid this, you can deny users the right to launch Rohos Disk on the server by protecting it with a password.

In addition, you must untick the option Show Rohos Icon near the clock so that users cannot manage the disk by clicking on the icon near the clock.

Access rules on a Windows Terminal Server.

 

To set up this form of common access:
1. You must turn off the option Enable shared Disk drive. In this case the secret disk letter will be accessible only to a session or user account where the password for this encrypted disk has been entered.

2. The file container should be placed in a common-access folder and different access rights should be granted for different users in order to prevent unauthorized copying or deletion of this file. Some users will be able to open the folder for reading and writing, while other users will have read-only access. Other users still will not be able to view it at all.

3. It is necessary to create a shortcut for accessing this disk and copy it onto the desktop of the selected users. To do this, in the main window go to Rohos Disk Encryption > Disk > Tools > Create disk shortcut. Then a file with the given shortcut will be visible on the desktop.

4. You can give the password for the Rohos disk to all users or hand out access keys such SafeNet ikey,  eToken or  any other PKCS#11-compatible.

Advantages of this method:

  1. Only selected group of users will be able to access Encrypted Disk letter.
  2. The secret drive letter will be protected from other terminal sessions.
  3. By using hardware USB token you protect disk password from being revealed on a thin client side.
  4. Open source and strong AES-256 bit encryption by using open and NIST approved data security standards.

 

Shared access through a shared network folder

The entire Rohos encrypted disk or some folders on it can be opened up for common access over the network. Select the disk in My Computer and enter its properties through the context menu.

Assigning access to this disk for different categories of network users can be done here with the Permissions command.

Connect the Rohos disk network folder to the workstations on the network:

Advantages of this way of assigning access:

  • The encrypted disk can be located on both on a computer or a connected USB storage device.
  • You set it up so that when a USB storage device is disconnected, the encrypted disk will be automatically disabled, the network folder will disappear, and it will no longer be possible to access it.
  • You can set up a hardware security module (HSM) for accessing the secret disk, e.g. USB tokens like ruToken, iKey, or eToken. You can entrust such a token for the disk to the employee responsible for activating the disk. When the token is disconnected from the PC, the disk will automatically turn off.
  • Activating a secret disk can only be done by means of a password or automatically by connecting a USB token.
  • Network users do not necessarily have to know the password for the disk to begin working with all, but all data will be reliably secured on the file server.

While one network user is working with one file or directory, another user can work with another file or directory. It will appear as a simple common-access resource. However, as soon as you leave the system, access to it will automatically end.

ICQ/Skype encryption in Rohos Disk v.2.0

We are glad to announce the release of Rohos Disk 2.0.

Tesline-Service company is always trying to keep up with the trends of IT world, and now it is ready to offer you Rohos software already compatible with Windows 8. The new features have been added to simplify the encryption process without compromising data security. This new encryption feature for folders and applications will make it possible for any PC user to protect their data.

ICQ/Skype encryption

Can you ever imagine your virtual life without instant messengers like ICQ or Skype? You’ll probably say it is hardly possible. Yes. It seems to be true. Most of users can hardly imagine their everyday life without all these cyber tools, and, after all, why should we deprive ourselves of convenience and comfort while communicating with our business partners or friends, or while performing free calls or exchanging instant messages or files?

ICQ and Skype are one of the most popular instant messengers. These programs keep all your contacts, so you have your friends and partners in one list. These communication tools allow you to have access to several user accounts and keep all your passwords. One instant messenger holds the passwords to your social networking profiles (Facebook etc.). With this handy approach you can save both your time and computer space.

Believe it or not, if you step away from your computer and leave it unsupervised you may suffer from an intruder overwhelmed with curiosity or driven by evil intent. The access to your chat history, passwords and exchanged files remains absolutely insecure. So, what can you do to protect all your passwords and chat history?


Read more

Safe encryption with Rohos Disk Encryption 1.9

Rohos Disk Encryption 1.9 Release
March 14, 2012.

We announce a release of the advanced version – Rohos Disk Encryption v.1.9 – with the final updates and new function. The Rohos Disk Encryption program allows you to store the information encrypted on any USB flash drive, hard drive or CD/DVD. We use one of the most secure data encryption algorithms – AES 256 bit.  «Encryption on-the-fly» is an instant process hiding your personal information and confidential data any time you work with them.

Read more

Rohos Logon Key v. 2.9 improvements for Windows 7

Dear users and customers, we are happy to announce a few improvements in Rohos Logon Key. New features affects “Allow login only by USB Key” feature specially when using Rohos Logon in corporate network or Windows Remote Desktop services.

What’s new:

Read more

Rohos Mini and Rohos Disk v.1.8. Keep folders hidden!

(updated February 10, 2011)

You share your computer with somebody but would rather keep your data private??? It’s not always possible. Using Google Chrome, Mozilla Firefox and Skype??? Well, for an experienced user it’s a piece of cake to find and look through your Skype chat’s logs without being signed into your account. And now you can keep all those gawkers away from your computer data with Rohos encryption programs.

Rohos Developers have been asked to implement “Hide folder” feature which in future will eventually step-by-step lead to the long-awaited feature – complete Account Encryption (all applications and data are encrypted) but about this you’ll learn more later.

“Hide folder” option in Rohos Mini Drive and Rohos Disk Encryption brings affordable and AES 256 strength encryption solution to your security issues by preventing unauthorized access to your private data in PC folders by local or network users. Your protected items can be quickly and easily rendered inaccessible to other users but are instantly accessible when you turn on your Rohos disk.

Read more

Encrypted files are one click away with Rohos Disk v.1.7

Your USB flash drive data protection and its portability demands are increasing, yet with today’s offers we have in software community there are small chances you might find a worthwhile application.

So what do you use to password protect your USB drive and have secure access to your encrypted partition on Public PCs without having administrative rights?

Long time anticipated by fans of portable encryption solutions possibility to create an encrypted area on a USB disk/key that a user can open/mount, double click and open the files, and close as required, without Admin rights is now implemented in Rohos Data Security solutions Rohos Disk Encryption and Rohos Mini Drive. You do not need Administrative privileges, and yet you can double click and open say a Word doc, and then save it to the same place without leaving any traces of working with it.

You may say – “There are solutions that have a portable disk Explorer utility that allows working with an encrypted disk without Admin rights”. Yes, but very few disk encryption solutions provide decent disk Explorer performance. Meaning that in many of them you can only extract a file outside the disk Explorer and then open it.  After some changes to the file have been done, if any, you should Import file back to the Disk Explorer. In this case “on-the-fly” encryption principle doesn’t work.  The obvious disadvantages of such approach – ‘unencrypted files’ may be left behind on a guest PC or unsecured part of the USB flash drive, and you can’t work with big files.

Try Rohos Disk Encryption (shareware) or Rohos Mini Drive (freeware) and discover:

  • File Virtualization. Open files via Rohos Disk Browser in associated application without first decrypting them into temporary folder. Rohos virtualizes file presence for the application, thus it works with encrypted file by using “on-the-fly” encryption principle.

Read more

Rohos Disk v.1.6. Rohos Disk Browser supports NTFS in “read-write” mode.

Exciting news!

Rohos Disk Encryption brings new and exciting opportunities for its users  to work with encrypted partition created on USB flash drive in NTFS format. Now NTFS partitions opened on a PC with no Admin rights via Rohos Disk Browser work in “read-write” mode.

Rohos Disk Encryption is one of the leading solutions for data security has enhanced opportunity to use your secured disk in the most effective way. Having large encrypted partitions, e.g. 100 GB, you easily work (read and edit) with your data on any PC.

Download v.1.6

What’s new:

Rohos Disk Encryptionchoose the right solution for your precious data security.

Rohos Disk v.1.5 – new Rohos Disk Browser

(updated on July, 24)

We are glad to announce new Rohos Disk and Rohos Mini v.1.5  with updated Rohos Disk Browser application. Rohos Disk Browser enables you to open and view the contents of secret partitions on a USB drive on any other computer, even if you do not have administrative rights.

Download v.1.5

What’s new:

  1. List of file names now are sorted in alphabetic order
  2. List of files now has a small icons and looks just like in Explorer
  3. Fixed bug of wrong folder icon under Vista/Seven
  4. Improved Unicode support for FAT/FAT32
  5. Added Virtual Keyboard. Press “***” button to open VK and click it to type in your password.
  6. Improved translation handling. Now language is automatically taken from global settings. However there are translation issues  – if Disk Browser is opened without Admin rights on Vista (enabled UAC), therefore it is recommended to run Rohos Disk Browser with full privileges.
  7. Improved error reporting
  8. Fixed bug in Rohos Disk driver that leads to Windows Error (Blue Screen) after pulling out USB drive (that contains Rohos disk container file) without disconnecting Rohos disk.
  9. Added Traditional Chinese language UI
  10. Added Umikey OTP token support.

Screen shot:

List of file names are in alphabetic order