Support, help and instructions for abylon CRYPT in the BOX

Share page: || Newsletter: Subscribe Unsubscribe

Additional Info and Help Automatic file encryption

Legend abylon CRYPT in the BOX (File encryption)

Toolbar (faded in or out, depending on selection):

  • Close-Icon

    Exit:

    Closes the program interface
  • Copy-Icon

    Copy:

    Copies the selected file to the clipboard and can be copied to another directory in the File Explorer via Paste. The encrypted file will be decrypted!
  • Cutting-Icon

    Cutting:

    Copies the selected file to the clipboard and can be moved to another directory in the File Explorer via Paste. The encrypted file will be decrypted!
  • Insert-Icon

    Insert:

    Pastes the file from the clipboard into the ATUOCRYPT directory. Unencrypted files are encrypted.
  • Remove-Icon

    Remove:

    Deletes the selected file
  • Rename-Icon

    Rename:

    Changes the file name
  • Folder-Icon

    New directory:

    Creates a new directory
  • Add-Icon

    Add:

    Opens the Explorer dialog for selecting files. These files are encrypted and added to the AUTOCRYPT directory.
  • Password-Icon

    Change password:

    After entering the previous password, a new password can be set.
  • Folder-Icon

    AUTOCRYPT directory:

    Opens the File Explorer in AUTOCRYPT directory.
  • Start-Icon

    Start:

    Starts the AUTOCRYPT function of the software. All files in the AUTOCRYPT directory are automatically encrypted!

    NOTE Only displayed if the dialog was started with admin rights!

  • Stop-Icon

    Stop:

    Terminates the AUTOCRYPT functionality.

    NOTE Only displayed if the dialog was started with admin rights!

Icons at bottom right (faded in or faded out, depending on status):

  • Registration-Icon

    Registration:

    Allows you to enter the registration data
  • Info-Icon

    About:

    Opens the About dialog or the help page on our homepage
  • Change-Icon

    Change password:

    After entering the previous password, a new password can be assigned.

    The password assignment is organized by the integrated Credential-Provider. Thus you can freely choose between password, certificate and hardware key (chip card, USB stick, etc.).

  • Update-Icon

    Update:

    Updates the window

Right click of the mouse in the file list (menu of the right mouse button):

Copy:
Copies the selected file to the clipboard and can be copied to another directory in the File Explorer via Paste. The encrypted file will be decrypted!
Cut out:
Copies the selected file to the clipboard and can be moved to another directory in the File Explorer via Paste. The encrypted file will be decrypted!
Insert:
Inserts the file from the clipboard into the ATUOCRYPT directory. Unencrypted files will be encrypted.
Remove:
Delete the selected file
Rename:
Changes the file name

More functions and options:

Info field under the header line:
Shows the path of the AUTOCRYPT directory. The path can be changed by double-clicking on this field.

NOTE Files are not moved automatically!

Directory tree:
display the directory structure in the AUTOCRYPT directory
File list:
Displays the encrypted files of the directory selected on the left. Double-click to open them.

HINWEIS Changes will be saved in the encrypted file!

Copy & Paste (Drag&Drop):
By dragging files with the mouse into the program window they are moved into the AUTOCRYPT directory and then encrypted.
By dragging files from the program window with the mouse, these files will be from the AUTOCRYPT directory and then decrypted.
File Explorer:
Files in AUTOCRYPT directory can be opened by double-clicking. If the program window is not open, the password must be entered!

Questions and answers about the software abylon CRYPT in the BOX (FAQ's)

The simple file safe with automatic background encryption

At the moment there are no specific FAQ's available. At the end of this page in the support area you will find our answers to user questions.

FAQ: Installation

Questions and Answers about the installation of software products from abylonsoft.

Yes, because during the installation the software has to make some settings for which only the administrator has rights. So log in for the installation as an administrator or contact your responsible administrator.

Possible cause of error:

  1. You have entered the registration data incorrectly! The safest way is to copy and paste the name and the registration key from the email directly into the registration dialog of our software.
  2. Each license key is created individually for each program and each version. Check whether your registration data are also intended for the version you have installed!

Updates in the same major version number are free. Updates to the next major version number are subject to an update fee. If you have any questions or problems with us you are welcome to contact us in Kontakt.

Sofern dieser Fehler auftritt, sollten Sie das Setup manuell auf der Download-Seite herunter laden und installieren. Alle Einstellungen der Vorgängerversion werden dabei übernommen.

FAQ: General

General questions and answers about the software from abylonsoft.

Interaction with electromagnetic radiation

First of all, passive RFID tokens (chip cards or key fobs) need a magnetic field or high-frequency radio wave to be supplied with energy. This is usually done by the RFID card reader. The data integrity on the RFID token is not endangered by light magnetic or radio fields. The data is not likely to be erased, for example by a mobile phone, a magnet or a monitor. However, an electromagnetic interference source can lead to an impairment of the reading reliability.

Storing the RFID token in the same pocket as the mobile phone is no problem. In order not to disturb the reading process, the RFID card reader should be placed as far away from electromagnetic sources as possible! In a microwave, on the other hand, the RFID token is likely to be destroyed.

Tray-Icons are small buttons, which are displayed in the taskbar at the bottom right, next to the clock.
These icons are used to display information and call functions. In the preferences, Windows deactivates tray icons of programs so that they are not displayed for the time being. The following section describes how the settings for all or individual icons can be set.
NOTE The description is general. Depending on the program, you must select the appropriate tray icon. You can find this in the help or the FAQ's.

How do I open the settings for the tray icons?

To the left of the clock, there is a small white arrow pointing upwards, which can be used to display the other tray icons.

Adjust Tray-Icons

With "Customize" you can define the behavior of the tray icons. The "Info Area Symbols" window opens.
NOTE Below are alternative ways to open this window.

Information area symbols

In the settings window for info area symbols, you can define the behavior of each individual tray icon.
Select the corresponding icon and select "Show icon and notifications" as option. After that you will find the tray icon on the taskbar to the left of the clock at any time.
Alternatively, you can enable the option "Always show all icons and notifications on the taskbar". In this case, the tray icons of future programs will also be displayed directly on the taskbar.

Alternative 2 to open the notification area icon settings

Move the mouse to a free area of the taskbar and press the right mouse button. Select Properties from the menu. The dialog for customizing the info area symbols opens on the Taskbar page via the "Customize" button.

Taskbar Properties

Alternative 3 to open the notification area icon settings

As a further option, you can also open the Control Panel via the Start menu. Select "Large Icons" or "Small Icons" in the upper right corner. Now you can open the settings via the "Info Area Symbols" icon.

All_System_Controls

Because of errors in the operating system or other software, as well as the variety of the hardware used, apparently occurring errors and / or irregularities in the software of abylonsoft must not necessarily be justified in this software. This means that the interactions between our software and software / hardware from other manufacturers are so complex that they cannot be taken into account by us in all cases. Often errors / defects in other software (e.g. the operating system) also occur, which only become effective in combination with our software. These errors usually manifest themselves in a general protection violation or a system crash. For these reasons we subject our software to a very extensive test before release in order to reduce the problems and errors to a minimum.

Should you nevertheless become aware of a direct error in our software, we will correct it as soon as possible. So that we can understand the error / the problem, you should give us all the details:

  • Operating system
  • Service packs
  • Other software used
  • Whereby the error occurred
  • If the error is reproducible
  • Etc.

Please use our support form support form!

for this purpose

For more see AGB's

Supportanfrage zur abylon CRYPT in the BOX Auto-encryption for your files

3 Support requestn

Avatar von Osman #135

Osman - Eintrag vom: 06.08.2019 um 14:34 Uhr 
Software-Version: 2019.4 - Betriebssystem: Window 10 - 64-bit

Frage: Translation

Hi, I want to translate the "abylon CRYPT in the BOX" software into Turkish. Please help me.

Avatar of abylonsoft support #135

Reply:

Hello Osman,
thank you very much for your inquiry.

We only offer one language file for all our software products. It is located in the program directory and has an XML structure.
If nothing is changed in the XML structure and placeholders remain, the text entries can be changed freely.
With the software abylon CRYPT in the BOX the file names are:

Deutsch: APMPLangD.XML

English: APMPLangE.XML

If you have further questions, you are welcome to contact us again.

Avatar von DoktorThomas™ #106

DoktorThomas™ - Eintrag vom: 16.07.2017 um 21:42 Uhr 
Software-Version: sp4 - Betriebssystem: win7

Frage: What about defraging? Was ist mit Defragmentierung?

I have read that when I defrag my hard drive, encrypted areas, like this box, will be missed by the defragger and written over. Can items encrypted y your software be defragged?
Ich habe gelesen, dass, wenn ich meine Festplatte defragmentiert, verschlüsselte Bereiche, wie diese Box, wird von der Defragger verpasst und geschrieben werden. Können Items verschlüsselt werden und deine Software defragmentiert werden?

Avatar of abylonsoft support #106

Reply:

Our abylon CRYPT-in-the-BOX software is filebased. Therefore, defragmenting should not cause problems. So far, no user has reported such problems.
Should you observe any practical problems with our software, you can always contact us again.

Avatar von Ivan #10

Ivan - Eintrag vom: 13.06.2014 um 23:39 Uhr 
Software-Version: 2013 PRV - Betriebssystem: W7 prof.

Frage: Cannot open encrypted jpg pictures

Default Windows Picture Viewer opens empty window with error message "Picture is no more available or is in the no more accessible location"

Avatar of abylonsoft support #10

Reply:

Hi Ivan,
the "[i]Windows Live Photo Gallery[/i]" software opens the pictures and immediately reports that they are closed again. Our software monitors the status of the open file and deletes the decrypted file for security reasons immediately. This non-standard behavior of the software results the error you described.
Therefore we recommend of linking graphic files with another program!

Submit a support request

For general comments, please use our Comments Form!

Please enter your name or a pseudonym (alias) for the salutation!
Your email address will only be used for questions and notification and will not be saved!
Please enter the operating system you are using (incl. service pack and 32- or 64-bit platform) or "unknown"!
Please enter the version number of our software or "unknown"? The version number is displayed in the About dialog of our software.
Outline your problem in a short question!

The more detailed you describe your problem, the sooner we can help. We can only contact you if you have entered your email address correctly.
I have understood and accept the Privacy Policy.