Expired Boxcryptor Unlimited Business Giveaway

Disclaimer: We cannot guarantee that all promo codes will remain active. Some offers have a short validation period and expire.

Status
Not open for further replies.

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
LIVE!! Ends On March 27,2015
http://malwaretips.com/styles/MalwareTips/xenforo/logo.png


Boxcryptor Unlimited Business Giveaway
2rqyl29.png


We would like to thank Boxcryptor for giving us the opportunity to give away these (20) Boxcryptor Unlimited Business licenses.​


Boxcryptor – Secure your Cloud

Highest Security for your Files in the Cloud
  • Fast and easy encryption
  • Available for all major cloud storage providers
  • Secure cloud usage on all platforms
  • Free for private use
Boxcryptor protects your files in the cloud no matter if you use Dropbox, Google Drive, Microsoft OneDrive, SugarSync, Box.net, or any other major cloud storage provider. It also supports all the clouds that use the WebDAV standard such as Cubby, Strato HiDrive, and ownCloud.

If you are storing or would like to store your files in the cloud, make sure these are securely encrypted before uploading them to the cloud. Encrypting your files will safeguard the privacy of your data; especially important when you are storing sensitive corporate data or personal information that should never fall into the wrong hands.

Boxcryptor is the right solution for all private and business needs. Once you have installed Boxcryptor, you can easily encrypt files and store them in your cloud provider's folder (e.g. your Dropbox folder). You keep control of your data and enjoy 24/7 peace of mind knowing that your data is securely stored in the cloud.

With Boxcryptor you don't have any problems to access your files on the go - anywhere and anytime. Our Boxcryptor apps for Android, iOS, Windows Phone and Blackberry 10 give you quick and easy access to your files from your mobile devices at your convenience.

What is Boxcryptor?

Boxcryptor is an easy-to-use encryption software optimized for the cloud. It allows the secure use of cloud storage services without sacrificing comfort. Boxcryptor supports all major cloud storage providers (such as Dropbox, Google Drive, Microsoft OneDrive, SugarSync) and supports all the clouds that use the WebDAV standard (such as Cubby, Strato HiDrive, and ownCloud). With Boxcryptor your files go protected to your cloud provider and you can enjoy peace of mind knowing that your information cannot fall into the wrong hands.

Here is how it works:
Boxcryptor creates a virtual drive on your computer that allows you to encrypt your files locally before uploading them to your cloud or clouds of choice. It encrypts individual files - and does not create containers. Any file dropped into an encrypted folder within the Boxcryptor drive will get automatically encrypted before it is synced to the cloud. To protect your files, Boxcryptor uses the AES-256 and RSA encryption algorithms.

Boxcryptor Features at a Glance

Boxcryptor secures your data the quick and easy way with the highest security standards. We place great emphasis on making Boxcryptor a user-friendly, quick, and simple solution. The main features are:
Supported Providers
Boxcryptor is the solution to secure your data in the cloud of your choice. With Boxcryptor you decide for safety – not for the storage provider. Our software supports all major cloud providers:
If your provider is not on the list, please contact us to verify compatibility.
Provider list: https://www.boxcryptor.com/en/provider

Supported Platforms
AES and RSA Encryption

AES- 256 encryption
As first publicly accessible, from the NSA for the classification "top secret" approved cipher, the Advanced Encryption Standard (AES) is one of the most frequently used and most secure encryption algorithms available today. Its story of success started 1997, when the National Institute of Standards and Technology NIST announced the search for a successor to the aging encryption standard DES. An algorithm named "Rijndael", developed by the Belgian cryptographists Daemen and Rijmen, excelled in security as well as in performance and flexibility. It came out on top of several competitors, and was officially announced as the new encryption standard AES in 2001. The algorithm is based on several substitutions, permutations and linear transformations, each executed on data blocks of 16 byte – therefore the term blockcipher. Those operations are repeated several times, called “rounds”. During each round, a unique roundkey is calculated out of the encryption key, and incorporated in the calculations. Based on this block structure of AES, the change of a single bit either in the key, or in the plaintext block results in a completely different ciphertext block – a clear advantage over traditional stream ciphers. The difference between AES-128, AES-192 and AES-256 finally is the length of the key: 128, 192 or 256 bit – all drastic improvements compared to the 56 bit key of DES. By way of illustration: Cracking a 128 bit AES key with a state-of-the-art supercomputer would take longer than the presumed age of the universe. And Boxcryptor even uses 256 bit keys! As of today, no practicable attack against AES exists. Therefore, AES remains the preferred encryption standard for governments, banks and high security systems around the world.

More Information can be found here:
RSA encryption
RSA is one of the most successful, asymmetric encryption systems today. Originally discovered 1973 by the British intelligence agency GCHQ, it received the classification “top secret”. Its civil rediscovery is owned to the cryptologists Rivest, Shamir and Adleman, who discovered it during an attempt to break another cryptographic problem. As opposed to traditional, symmetric encryption systems, RSA works with two different keys: A “public” key, and a “private” one. Both work complementary to each other, a message encrypted with one of them can only be decrypted by its counterpart. Since the private key can’t be calculated from the public key, the latter is generally made available to the public. Those properties enable asymmetric cryptosystems to be used in a wide array of functions, such as digital signatures. In the process of signing a document, a fingerprint, encrypted with RSA, is appended to the file, and enables the receiver to verify both the sender and the integrity of the document. The security of RSA itself is mainly based on the mathematical problem of integer factorization. A message that is about to be encrypted is treated as one large number. When encrypting the message, it is raised to the power of the key, and divided with remainder by a fixed product of two primes. By repeating the process with the other key, the plaintext can be retrieved back. The best, currently known method to break the encryption requires factorizing the product used in the division. Currently, it is not possible to calculate these factors for numbers greater than 768 bits. None the less, modern cryptosystems use a minimum key length of 3072 bits.
Technical Overview: https://www.boxcryptor.com/en/technical-overview

2czrb6a.png

How Boxcryptor Works


How Secure File Access Sharing Works

____________________________________________________________________


34fl09e.png
2yzkisk.jpg

rrscq0.jpg

2mx385i.jpg

2hf1iqu.jpg
____________________________________________________________________

You can view Boxcryptor Homepage - Here

You can view downloads for all Boxcryptor Versions - Here

You can view complete details about Boxcryptor - Here


____________________________________________________________________
2gv06xu.png


windows.png

Download for Windows
mac_0.png

Download for Mac OS X

Download for Linux(beta)


Download for Chrome(beta)

____________________________________________________________________

Boxcryptor Unlimited Business Giveaway Details
____________________________________________________________________

The Boxcryptor Unlimited Business Giveaway starts on March 1,2015 and ends on March 27,2015

To participate in our Boxcryptor Unlimited Business Giveaway:

1. You have to be a registered member on our forum.
  • You must use your real IP address to enter the giveaway.
  • If you enter the giveaway using a proxy or VPN,You Will Be Disqualified.
2. Make 2 posts in the following forums if you have not done so already
3. Share the giveaway news on Facebook or Twitter, so that others may enjoy it.

Share on Twitter
  • Make sure you follow MalwareTips on Twitter;
  • Tweet this :
    Code:
    Join the Boxcryptor Unlimited Business Giveaway at malwaretips.com > http://malwaretips.com/threads/MalwareTips-com-boxcryptor-unlimited-business-giveaway.42777/
  • Post the link in your reply.
Share on Facebook
  • Like MalwareTips on Facebook ;
  • Post this on your wall:
    Code:
    Join the Boxcryptor Unlimited Business Giveaway at malwaretips.com > http://malwaretips.com/threads/MalwareTips-com-boxcryptor-unlimited-business-giveaway.42777/
  • Make sure everyone can see it:
    ifEsjmxPw7NY.png
  • Post the link in your reply.
Final Details
  • The Boxcryptor Unlimited Business Giveaway starts on March 1,2015 and ends on March 27,2015
  • Winners will be randomly selected using RANDOM.ORG on March 27,2015.
  • Winners must reply to the winning PM within 5 days or a new winner will be selected from the posted list
  • You are allowed to participate with one post and one account/IP. Having multiple accounts on our forum is against our rules and will disqualify you.
  • One post per user, posting multiple times inside the thread is not allowed.
  • Any member that enters a giveaway and tries to run their own personal giveaway with a winning license will be PERMANENTLY banned from all future Exclusive MT Giveaways.
  • Winners will be notified by private message.
Good luck! :)
 
Last edited:
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top