BestCrypt Data Shelter

Discussion in 'other anti-malware software' started by kakaka, Feb 18, 2023.

  1. kakaka

    kakaka Registered Member

    Joined:
    Oct 5, 2009
    Posts:
    84
    Use BestCrypt Data Shelter to protect your data even when it’s in use.
    Create protection policies for individual folders to keep data secure when it’s accessible and being used. Gain protection from malware and ransomware. Keep track of your encrypted drives and receive reminders about non-encrypted volumes.
     
  2. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
     
  3. kakaka

    kakaka Registered Member

    Joined:
    Oct 5, 2009
    Posts:
    84
    BestCrypt Data Shelter https://www.jetico.com/file-downloads/bcshelter_setup.exe
     
    Last edited by a moderator: Feb 18, 2023
  4. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Thank You @kakaka-I currently and for many years still rely on long abandoned Secure Folders
    It implements a solid filter driver which i have experienced positive results with in spite of Promosoft now defunct.

    sshot-2023-02-18-17-47-58.jpg
     
    Last edited: Feb 18, 2023
  5. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Thanks for this @kakaka. Reputable developer, installed.
    I want the granularity of defining which programs can access which folders. Using it to protect my second backups, restricted now to only Bvckup 2.
     
  6. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Jetico is been around a long time and i get a positive vibe that BestCrypt Data Shelter can and will fill the void for protecting folders and contents. Thanks @kakaka
     
  7. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,805
    Location:
    .
    Is this BestCrypt Data Shelter using a driver?
     
  8. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    I haven't installed it yet @Mr.X
     
  9. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    Opinions may change with testing.
    Just sayin'
     
  10. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Good timing @cruelsister - Have you an opinion at present with this particular folder protector progrsm?
     
  11. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    Saw this thread and just happened to have a test setup ready:
    1). Downloaded and installed BestCrypt Data Shelter
    2). Set things up exactly as their video how-to suggested (Documents and Photos folders were protected)..
    3). Ran selected ransomware files.

    Results- Sage, FiveHands X-data. Ishtar were unable to encrypt anything.
    Pony, HelloKitty, Magniber, CruelSister were able to trash files

    As an application that is touted to specifically protect files against encryption only works for certain ransomware, one can only judge such protection as sub-optimal.

    (Note to self: in the future please remove all USB devices prior to testing ransomware files)
     
  12. plat

    plat Registered Member

    Joined:
    Dec 19, 2018
    Posts:
    2,233
    Location:
    Brooklyn, NY
    Thanks very much-- I decided long ago to put faith only in myself and store my stuff offline. That way, I only have myself to blame.
     
  13. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Thank You @cruelsister for running a series. Just imagine if only the successfully repelled bugs were only one's someone accepted as sufficient to comfortably rely on that product. It's why in my opinion that any such program even before being released for distribution should be hammered at with every malware/ransomware possible, even locally invented. As in personally modified to even perform lifting ACL file permission protection.

    That is possible yes>
     
  14. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Hmm ... I wonder if you can recommend a similar product that works in this regard @cruelsister.? Just the data protection bit.
     
  15. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    I wonder the same she might suggest. An Iron-clad folder/contents solid protection apparatus.
     
  16. Azure Phoenix

    Azure Phoenix Registered Member

    Joined:
    Nov 22, 2014
    Posts:
    1,560
    Cant’ you use Wise Vector’s folder protection?
     
  17. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Maybe, but like Secure Folders and Folderfication, that's also no longer supported/developed.
     
  18. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Very true. Sigh
     
  19. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,805
    Location:
    .
  20. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,805
    Location:
    .
    I agree that's why I opened this thread for it.
    Thanks for raising a ticket, let's wait to what they have to say...
     
  21. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Guess I should have anticipated this response:

    Thank you for your interest in our software.
    I have read the post from 'cruelsister' with the results of DataShelter testing.
    To diagnose the case and provide an answer, we need more details - a log file, screenshots of the created policy, etc.
    Generally, DataShelter uses a low-level driver and works according to the assigned policy.
    We are sure, it is always possible to create a policy that will protect your data at the desired level.

    I can't really help them further, @cruelsister?
     
  22. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    This is a quote from Cruelsister, I don't know from which thread exactly. But anyway, this apps seems to suck? And the app also looks like it's from the 80's or something. :gack:
     
  23. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    A further response from Jetico support:
    shelter_folder_UNprotected.jpg shelter_folder_protected.jpg
    I write to inform you about our further work on the matter.
    First, I tried to register on the forum to contact 'cruelsister'. I introduced myself as a Jetico person.
    Unfortunately, my post was not approved by the moderator. Perhaps I should have registered as a private person.

    The 'cruelsister' reported that the default policy was used ("Set things up exactly as their video how-to suggested" )
    However, this policy is 'Allow all' and it is quite understandable that some attacks were not repelled.

    Yesterday I Used the ransomware simulator: https://www.knowbe4.com/ransomware-simulator to test BC Data Shelter.
    I created the policy 'Based on file types' - allow only the default applications for the files located in the folder.
    The results are shown on the pictures.
    You can repeat the test yourself to get these results.

    Also, we have read the available technical information about mentioned ransomware programs (HelloKitty and others).
    We have not found any fact that could prevent Data Shelter from reliable protection.
     
  24. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    A few things:

    1). If you read my post it would be noted that I wrote: "Set things up exactly as their video how-to suggested".
    This referred to the 3-step how-to video https://www.youtube.com/watch?v=vVplu4xa5oM on the Jetico website. Certainly NOT "Allow All".

    2). The Ransom Simulator is rather old. Although it did indeed simulate the most common ransomware mechanisms at that time, malware has moved on. Sadly the simulator has not.

    3). As there would be little interest in viewing a video on this topic (and I feel would be borderline nasty), I didn't post one publicly, but for any that want I can supply a Private link. Just shoot me a PM saying "Gimme",

    (Paul and Rasheed are already covered)
     
    Last edited by a moderator: Mar 1, 2023
  25. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Thanks cruelsis!

    There may be one point of confusion (?) in the 3-step how-to video https://www.youtube.com/watch?v=vVplu4xa5oM on the Jetico website.
    I think Support is saying, instead of selecting 'Create new policy' at 0:19 in that video, one needs to proceed by selecting the next option 'Scan folder to determine programs needed to access files based on type'.

    I am not sure whether you would have arrived at a different result in your test though.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.