FAQ
What is Polar Encrypt, how powerful is it and what do you get with it? Keep reading to learn about the powerful data protection you can do with this application.
Q: What is the difference between the Release and Trial Versions?
A: The Release version of the product works with the full strength of the AES algorithm and with the length of key of 256 bytes. The Trial version of the product works only with the length of key of 32 bytes.
Q: If I encrypt files or text with the trial version, can I decrypt it with the release version and vice-versa?
A: Previously Polar offered he Trial and the Release versions which were fundamentally different security-wise. Therefore you could not decrypt the files and text created with the different versions of the application.
Now we grant you Polar Encryt which is free to download here.
Q: What is the result of encrypting files and directories?
A: The result is a ZIP archive with the files and the directories that have been ZIP compressed and then AES encrypted. Therefore the process of encrypting a file is as follows:
- Compress the file with the standard lossless ZIP compression algorithm
with the maximum compression ratio - Encrypt the compressed file with the maximum security AES algorithm.
- Put the file into the ZIP archive.
This way the benefits of encryption and compression are optimally combined.
Q: What is the result of encrypting RTF or plain text in the text editor?
A: You get an ASCII signature string which is syntactically similar to the well-known PGP signature. The same is not interchangeable with PGP signature, only similar in syntax.
Q: Is it a rule that one password applies to one encrypted archive?
Yes, the rule is: one archive – one password.
Q: Is there a limit to the amount of files that can be encrypted?
A: The limit is your disk space!
Q: What is the upper limit of the length of text than I can work with?
A: The upper limit of the text editor is 1MB exactly
Q: Does Polar Encrypt delete files and directories after encryption?
A: No, this is left to the discretion of the user.
Q: Why do I get asked for a password when opening or creating an encrypted archive?
A: This is to provide you with a working password for the duration of encryption and the decryption, the one which always applies to this particular encrypted archive.
Q: How does drag-drop and copy-paste mechanism work?
A: This mechanism applies to the encryption and the decryption of files.
The mechanism works freely between the file and archive browsers in the file encryption mode.
It is possible to copy or drop files from the Windows Explorer to the archive browser.
It is also possible to drag files in the file browser to the desktop or the Windows Explorer.
Q: Do I lose special formatting of RTF text if I switch the text mode to ASCII mode from RTF mode?
A: The switch of context implies two things:
- The switch of working mode.
- The conversion of existing RTF text to plain ASCII.
The latter implies the loss of RTF special formatting.
Q: Why does the mode change to ASCII after the encryption of text?
A: Because the Polar Signature is in ASCII format.
|
|