Ace Secret Disk Has Been Updated to Version 8.15

Ace Secret Disk allows you to create a secret disk on your computer, on which you can store your private files (such as photos, videos and financial information documents) just like you would do on a normal disk. In this way the danger of data leakage can be completely eradicated.

Change Log of Ace Secret Disk 8.15:

File Size: 13.49MB

Category: Encryption Software

Language: English

License type: Trial Version

OS Support: Win 7/Win 8/Win 10/Win 11

Released on: April.30, 2025

Download Address: https://www.dogoodsoft.com/ace-secret-disk/free-download.html

What’s New in This Version:

– Included some improvements and bug fixes.

Why Choose Ace Secret Disk:

Ace Secret Disk

Ace Secret Disk creates an additional virtual disk on your computer with a password, which can make your private documents (images, videos, financial files, etc.) invisible and protected. It works as a regular hard disk, while completely prevents your files and folders from leakage. Ace Secret Disk is known for its three features:

(1) High Safety

It adopts new methods to protect data on your personal secret disk, and only with the correct password you can access it.

(2) Excellent Software Performance

The secret disk takes up no extra space, with data import and export as fast as lightning.

(3) Easy and Convenient Usage

The secret disk is used just like a normal disk, easy for you to save your private files.

CHK File Recovery Has been updated to version 1.30

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.30.

Details of CHK File Recovery V1.30:

Version: 1.30

File Size: 13.9MB

Category: CHK File Recovery Software

Language: English

License type: Trial Version

OS Support: Win 7/Win 8/Win 10/Win 11

Release on: April.27, 2025

Download from: https://www.dogoodsoft.com/chk-file-recovery/free-download.html

What’s New in CHK File Recovery V1.30:

Includes some improvements and bug fixes.

Why Choose CHK File Recovery:

CHK File Recovery is a professional CHK file recovery tool that can quickly and accurately identify the original file type of CHK files and recover more than 200 common file types, such as mp3, mp4, jpg, png, doc, docx, xls, xlsx, ppt, pptx, zip, rar, psd, etc.

CHK File Recovery 1.30

CHK File Recovery can identify the file types automatically. For file types that cannot be automatically recovered, CHK File Recovery provides a powerful manual identification, which can read the file content in 4 ways to judge the file type and recover.

CHK File Recovery Expert is easy to use. Just select the drive where the CHK file is located and click Search. The software will automatically scan the drive and then display the searched CHK files according to the file type. You can also choose to search and scan the specified folder for CHK files.

CHK File Recovery Has been updated to version 1.29

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.29.

Details of CHK File Recovery V1.29:

Version: 1.29

File Size: 7.09MB

Category: CHK File Recovery Software

Language: English

License type: Trial Version

OS Support: Win VISTA/Win 7/Win 8/Win 10/Win 11

Release Date: Aug.09, 2024

Download from: https://www.dogoodsoft.com/chk-file-recovery/free-download.html

What’s New in CHK File Recovery V1.29:

Includes other improvements and bug fixes.

Why Choose CHK File Recovery:

CHK File Recovery is a professional CHK file recovery tool that can quickly and accurately identify the original file type of CHK files and recover more than 200 common file types, such as mp3, mp4, jpg, png, doc, docx, xls, xlsx, ppt, pptx, zip, rar, psd, etc.

CHK File Recovery can identify the file types automatically. For file types that cannot be automatically recovered, CHK File Recovery provides a powerful manual identification, which can read the file content in 4 ways to judge the file type and recover.
chk file recovery 1.29
CHK File Recovery Expert is easy to use. Just select the drive where the CHK file is located and click Search. The software will automatically scan the drive and then display the searched CHK files according to the file type. You can also choose to search and scan the specified folder for CHK files.

Best Disk Lock Has Been Updated to Version 2.79

The powerful data protection software-Best Disk Lock has been updated to version 2.79. The latest version software includes some improvements and bug fixes.

Change Log of Best Disk Lock 2.79:

File Name: Best Disk Lock

Version: 2.79

File Size: 6.76MB

Category: System Security Software

Language: English

License type: Trial Version

OS Support: Win 7/Win 8/Win 10/Win 11

Released on: Jun.29, 2024

Download Address: https://www.dogoodsoft.com/best-disk-lock/free-download.html

What’s New in This Version:

* Includes other improvements and bug fixes.

Why Choose Best Disk Lock:

Best Disk Lock is a powerful utility that can not only completely hide disk partitions on your PC, disable USB storage devices or set them as read-only, but also forbid using the unassigned drive letters. The partition with advanced-lock cannot be found in any environment by anyone else, so the security and confidentiality of your data on this partition can be ensured.

The feature Lock File is to change the access permissions of file, folder or disk in NTFS-formatted partitions, by which the file/folder/disk will be prohibited or allowed to access. Besides, Best Disk Lock can configure the security of your computer system and optimize the system.

Best Disk Lock Has Been Updated to Version 2.77

The powerful data protection software-Best Disk Lock has been updated to version 2.77. The latest version software includes some improvements and bug fixes.

Change Log of Best Disk Lock 2.77:

File Name: Best Disk Lock

Version: 2.77

File Size: 6.76MB

Category: System Security Software

Language: English

License type: Trial Version

OS Support: Win 7/Win 8/Win 10/Win 11

Released on: Jun.29, 2024

Download Address: https://www.dogoodsoft.com/best-disk-lock/free-download.html

What’s New in This Version:

* Includes other improvements and bug fixes.

Why Choose Best Disk Lock:

Best Disk Lock Has Been Updated to Version 2.62

Best Disk Lock is a powerful utility that can not only completely hide disk partitions on your PC, disable USB storage devices or set them as read-only, but also forbid using the unassigned drive letters. The partition with advanced-lock cannot be found in any environment by anyone else, so the security and confidentiality of your data on this partition can be ensured.

The feature Lock File is to change the access permissions of file, folder or disk in NTFS-formatted partitions, by which the file/folder/disk will be prohibited or allowed to access. Besides, Best Disk Lock can configure the security of your computer system and optimize the system.

The Ace Secret Disk Has Been Updated to Version 8.11

Ace Secret Disk allows you to create a secret disk on your computer, on which you can store your private files (such as photos, videos and financial information documents) just like you would do on a normal disk. In this way the danger of data leakage can be completely eradicated.

Change Log of Ace Secret Disk 8.11:

File Size: 5.74MB

Category: Encryption Software

Language: English

License type: Trial Version

OS Support: Win WISTA/Win 7/Win 8/Win 10/Win 11

Released on: Aug. 22, 2022

Download Address: https://www.dogoodsoft.com/ace-secret-disk/free-download.html

What’s New in This Version:

* Compatible with windows 11.

– No more Windows XP support.

– Included some improvements and bug fixes.

Why Choose Ace Secret Disk:

ace secret disk

Ace Secret Disk creates an additional virtual disk on your computer with a password, which can make your private documents (images, videos, financial files, etc.) invisible and protected. It works as a regular hard disk, while completely prevents your files and folders from leakage. Ace Secret Disk is known for its three features:

(1) High Safety

It adopts new methods to protect data on your personal secret disk, and only with the correct password you can access it.

(2) Excellent Software Performance

The secret disk takes up no extra space, with data import and export as fast as lightning.

(3) Easy and Convenient Usage

The secret disk is used just like a normal disk, easy for you to save your private files.

The CHK File Recovery Has Been Updated to Version 1.25

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.25.

Change Log of CHK File Recovery V1.25:
Version: 1.25
File Size: 6.23MB
Category: CHK File Recovery Software
Language: English
License type: Trial Version
OS Support: Win VISTA/Win 7/Win 8/Win 10/Win 11
Released on: Jan.15, 2022
Download Address: https://www.dogoodsoft.com/chk-file-recovery/free-download.html

What’s New in This Version:
* Compatible with windows 11.
– No more Windows XP support.
* Included some improvements and bug fixes.

Why Choose CHK File Recovery:
CHK File Recovery1.25
CHK File Recovery can accurately and quickly recover more than 200 common file types, such as mp3, mp4, jpg, bmp, gif, png, avi, rm, mov, mpg, wma, wmv, doc, docx, xls, xlsx, ppt, pptx, zip, rar, exe, dll, sql, mdb, psd.

CHK File Recovery can determine file type automatically by default. However, for file types that cannot be recognized automatically, manual identification is used to confirm file type, which can check the content of an unknown file through 4 methods and recover it afterwards.

The interface of CHK File Recovery is simple and clear. It is easy to use. You only need to select a drive and click Search, then CHK File Recovery starts to scan the whole drive automatically. Afterwards, the CHK files found are shown in the list at the left of the application by their original file type. Besides, you can choose to search and scan a folder you specify.

Best Folder Encryptor Has Updated to Version 16.97

The professional file and folder encryption software – Best Folder Encryptor has been updated to version 16.97. The new version fixed bug that the control board cannot be closed after a Flash- and Hiding-encrypted folder is opened because of misjudgment, made some improvements and optimization, and several minor bug fixes. For more details about Best Folder Encryptor, please read the following content.

More about Best Folder Encryptor 16.97

File Name: Best Folder Encryptor

Version: 16.97

File Size: 10.04MB

Category: Folder Encryption, File Encryption

Language: English

License: Trial version

System Requirements: Win XP/vista/Win 7/Win 8/Win 10

Released on: Oct.08, 2017

Download Address: http://www.dogoodsoft.com/best-folder-encryptor/free-download.html

What’s New in This Version:

– Fixed bug the control board cannot be closed after a Flash- and Hiding-encrypted folder is opened because of misjudgment.

– Minor bug fixes.

* The new software interface.

* Some improvements and optimization.

* Better display of encryption records.

* The new disk mirroring.

– Fixed bug that the encrypted folder cannot be closed after it is opened in some cases.

– Fixed bug with disguise failure after opening a disguised folder.

– Fixed bug with wrong record after a folder is encrypted.

+ Added the drag-and-drop feature to encrypt.

– Fixed bug displayed in the software interface.

– Fixed bug with duplicate records when performing First Aid for Flash- and Hiding-encryted folders.

* Better dealing with the error files when decrypting a Full-encrypted folder.

* Security and usability improvements.

Best Folder Encryptor Has Updated to Version 16.97

Why Choose Best Folder Encryptor

Best Folder Encryptor is a professional file and folder encryption software. It features superfast with high security and confidentiality. With the internationally advanced encryption algorithms, encryption methods and file system drivers, the encrypted files and folders cannot be decrypted without the correct password, and are prevented from copy, deletion or removal.

It is convenient to open and edit the encrypted folder or file with the Open feature, and you don’t have to re-encrypt the folder or file after use.

Besides, it supports many powerful features such as data shredding (file/folder shredding), completely hiding hard disks, disabling USB storage devices or set them as read-only, etc. All these make Best Folder Encryptor undoubtedly a flawless encryption software and the best helper.

American ISIS Recruits Down, but Encryption Is Helping Terrorists’Online Efforts, Says FBI Director

American ISIS Recruits Down, but Encryption Is Helping Terrorists'Online Efforts, Says FBI Director

The number of Americans traveling to the Middle East to fight alongside Islamic State has dropped, but the terrorist group’s efforts to radicalize people online is getting a major boost from encryption technology, FBI Director James Comey said Wednesday.

Since August, just one American a month has traveled or attempted to travel to the Middle East to join the group, compared with around six to 10 a month in the preceding year and a half, Mr. Comey told reporters in a round table meeting at FBI headquarters.

However, federal authorities have their hands full trying to counter Islamic State’s social media appeal. Of around 1,000 open FBI investigations into people who may have been radicalized across the U.S., about 80% are related to Islamic State, Mr. Comey said.

The increasing use of encrypted communications is complicating law enforcement’s efforts to protect national security, said Mr. Comey, calling the technology a “huge feature of terrorist tradecraft.”

The FBI director cited Facebook Inc.’s WhatsApp texting service, which last month launched end-to-end encryption in which only the sender and receiver are able to read the contents of messages.

“WhatsApp has over a billion customers—overwhelmingly good people but in that billion customers are terrorists and criminals,” Mr. Comey said. He predicted an inevitable “collision” between law enforcement and technology companies offering such services.

Silicon Valley leaders argue that stronger encryption is necessary to protect consumers from a variety of threats.

“While we recognize the important work of law enforcement in keeping people safe, efforts to weaken encryption risk exposing people’s information to abuse from cybercriminals, hackers and rogue states,” WhatsApp CEO Jan Koum wrote last month in a blog post accompanying the rollout of the stronger encryption technology. The company Wednesday declined to comment on Mr. Comey’s remarks.

The FBI also continues to face major challenges in unlocking phones used by criminals including terrorists, Mr. Comey said. Investigators have been unable to unlock around 500 of the 4,000 or so devices the FBI has examined in the first six month of this fiscal year, which began Oct. 1, he said.

“I expect that number just to grow as the prevalence of the technology grows with newer models,” Mr. Comey added.

A terrorist’s locked iPhone recently sparked a high-stakes legal battle between the Justice Department and Apple Inc.
After Syed Rizwan Farook and his wife killed 14 people and wounded 22 in a December shooting rampage in San Bernardino, Calif., FBI agents couldn’t unlock the phone of Mr. Farook—who, along with his wife, was killed later that day in a shootout with police.

The government tried to force Apple to write software to open the device, but the technology company resisted, saying that such an action could compromise the security of millions of other phones.

That court case came to an abrupt end in March, when the FBI said it no longer needed Apple’s help because an unidentified third party had shown it a way to bypass the phone’s security features.

Encryption; Friend of Freedom, Guardian of Privacy

The issue of government access to private encrypted data has been in the public eye since the San Bernardino shootings in December, 2015. When an iPhone was found the FBI requested that Apple write code to override the phone’s security features. The FBI was ultimately able to decrypt the phone without Apple’s assistance. However, the ensuing debate over encryption has just begun.

High profile criminal and national security issues serve to shed light on an issue which is pervasive throughout the country. Local governments presumably have thousands of devices they would like to decrypt for investigatory purposes as New York City alone has hundreds. Seeking a resolution and remembering the horrific terror attacks of September 11, 2001 New York State Assembly Bill A8093A is in committee and seeks to outlaw the sale of phones in the state which have encryption not by passable to law enforcement.

Encryption allows for the safe keeping and targeting dissemination of private thoughts and information without worry off judgment, retaliation or mistreatment. On a grander scale encryption prevents unchecked government oversight. It can be argued that encryption technology is a hedge against current and future totalitarian regimes. With a history of occupation and abuse of power it is no surprise that Germany and France are not pushing for encryption backdoors.

Backdoors in encrypted devises and software provide another avenue for unwelcome parties to gain access. Hackers are often intelligent, well-funded and act on their own, in groups and most harmfully with foreign entities. Holes have a way of being found and master keys have a way of being lost.

Senators Richard Burr and Diane Feinstein are undoubtedly well intended with their draft law entitled the Compliance with Court Orders Act of 2016. The act calls for providers of communication services including software publishers to decrypt data when served with a court order. The data would have to be provided in an intelligible format or alternatively technical assistance for its retrieval. Prosecutors have a need to gather evidence. Governments have a duty to prevent crime and acts of terror.

However, experts question the feasibility of building backdoors into all types of encryption as it comes in many forms and from a host of global providers. Further, there is concern that the measure, if adopted, will backfire as the targeting of backdoors by our adversaries is assured. Cyberwar in the form of illicit data collection, theft of trade secrets and access to infrastructure is all too common and may escalate as tensions rise between adversaries. Ransomware and cyber extortion have been spreading, most recently at hospitals, and the knowledge of the existence of backdoors will motivate those who seek unseemly profits.

Efforts to prosecute the accused, fight crime and terror are noble causes. However, government should be wise in the approach lest we weaken our shared defenses in the process. The big corporate names of Silicon Valley recognize the dangers of backdoors and are speaking out and lobbying against Senator Burr and Feinstein’s efforts. The draft legislation does ensure that the monetary cost of decrypting is paid to the, “covered entity.” However, the costs to society at large remain up for discussion.