{"id":7528,"date":"2010-08-16T07:11:28","date_gmt":"2010-08-16T05:11:28","guid":{"rendered":"http:\/\/onsoftware.softonic.fr\/?p=7528"},"modified":"2025-06-12T13:30:11","modified_gmt":"2025-06-12T12:30:11","slug":"securite-comment-crypter-ses-donnees","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/fr\/securite-comment-crypter-ses-donnees\/","title":{"rendered":"S\u00e9curit\u00e9: comment crypter ses donn\u00e9es"},"content":{"rendered":"<p><a href=\"http:\/\/onsoftware.softonic.fr\/securite-comment-crypter-ses-donnees\/padlock_aj_ashton_01\/\" rel=\"attachment wp-att-7547\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/padlock_aj_ashton_01-290x290.png\" alt=\"padlock_aj_ashton_01\" width=\"160\" height=\"160\" class=\"alignleft size-medium wp-image-7547\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/padlock_aj_ashton_01-290x290.png 290w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/padlock_aj_ashton_01.png 410w\" sizes=\"auto, (max-width: 160px) 100vw, 160px\" \/><\/a>Comment s&#8217;assurer que  personne ne peut acc\u00e9der \u00e0 vos <strong>donn\u00e9es confidentielles<\/strong> sur votre disque dur? La solution la plus s\u00fbre est le <strong>chiffrement<\/strong>, une op\u00e9ration aussi appel\u00e9e -improprement- <strong>cryptage<\/strong> et qui rend impossible la lecture d&#8217;un document cod\u00e9 sans la cl\u00e9 de d\u00e9chiffrement ad\u00e9quate.<\/p>\n<p>Nous allons voir ensemble comment prot\u00e9ger vos documents personnels \u00e0 l&#8217;aide d&#8217;un <strong>logiciel de chiffrement gratuit<\/strong>, Open Source et particuli\u00e8rement simple \u00e0 utiliser: <a href=\"http:\/\/axcrypt.softonic.fr\" title=\"AxCrypt\">AxCrypt<\/a>.<!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Une fois t\u00e9l\u00e9charg\u00e9 sur votre ordinateur, AxCrypt ne pose aucun probl\u00e8me d&#8217;installation. Il suffit de cliquer plusieurs fois de suite sur &#8220;Next&#8221;. Vous pouvez entrer votre email pour \u00eatre tenu au courant des mises \u00e0 jours mais cette op\u00e9ration est facultative.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-install.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-install.png\" alt=\"Cryptage - install\" width=\"400\" height=\"310\" class=\"aligncenter size-full wp-image-7562\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-install.png 499w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-install-290x224.png 290w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Une fois install\u00e9, AxCrypt s&#8217;utilise directement depuis le <strong>menu contextuel de la souris<\/strong>, accessible en faisant un <strong>clic droit dans l&#8217;explorateur de fichiers<\/strong>. S\u00e9lectionnons deux images et lan\u00e7ons la commande <strong>&#8220;Crypter&#8221;<\/strong> depuis le menu contextuel.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-Crypter.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-Crypter.png\" alt=\"Cryptage - Crypter\" width=\"500\" height=\"427\" class=\"aligncenter size-full wp-image-7565\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-Crypter.png 523w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-Crypter-290x247.png 290w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>AxCrypt nous demande ensuite d&#8217;entrer une cl\u00e9 : plus elle sera longue et complexe, plus la protection sera solide. Vous pouvez vous r\u00e9f\u00e9rer \u00e0 ce tr\u00e8s bon article sur <a href=\"http:\/\/onsoftware.softonic.fr\/comment-bien-choisir-ses-mots-de-passe\" target=\"_blank\" rel=\"noopener noreferrer\">le choix d&#8217;un bon mot de passe<\/a> pour cr\u00e9er votre cl\u00e9.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-clef.png\" alt=\"Cryptage - clef\" width=\"279\" height=\"284\" class=\"aligncenter size-full wp-image-7578\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Vos fichiers encrypt\u00e9s apparaissent ensuite avec l&#8217;ic\u00f4ne d&#8217;AxCrypt.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-fichiers-cryptes.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-fichiers-cryptes.png\" alt=\"Cryptage - fichiers cryptes\" width=\"500\" height=\"327\" class=\"aligncenter size-full wp-image-7579\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-fichiers-cryptes.png 569w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-fichiers-cryptes-290x189.png 290w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Un double-clic permet de les d\u00e9crypter temporairement pour y acc\u00e9der. Vous pouvez aussi choisir la fonction <strong>&#8220;D\u00e9crypter&#8221;<\/strong> depuis le menu contextuel.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-decrypter.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-decrypter.png\" alt=\"Cryptage - decrypter\" width=\"362\" height=\"293\" class=\"aligncenter size-full wp-image-7570\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-decrypter.png 362w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-decrypter-290x234.png 290w\" sizes=\"auto, (max-width: 362px) 100vw, 362px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Il suffit ensuite d&#8217;entrer votre cl\u00e9 pour r\u00e9cup\u00e9rer les fichiers originaux.<\/p>\n<p>Pour envoyer des fichiers crypt\u00e9s par email ou les transporter sur <strong>une cl\u00e9 USB<\/strong>, vous pouvez utiliser la fonction <strong>&#8220;Crypter et cr\u00e9er ex\u00e9cutable&#8221;<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-exe-create.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-exe-create.png\" alt=\"Cryptage - exe create\" width=\"490\" height=\"419\" class=\"aligncenter size-full wp-image-7571\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-exe-create.png 490w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-exe-create-290x247.png 290w\" sizes=\"auto, (max-width: 490px) 100vw, 490px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Sur une cl\u00e9 USB, voici comment appara\u00eetront les fichiers crypt\u00e9s avec AxCrypt.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-fichiers.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-fichiers.png\" alt=\"Cryptage - fichiers\" width=\"500\" height=\"219\" class=\"aligncenter size-full wp-image-7573\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-fichiers.png 686w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-fichiers-290x126.png 290w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-fichiers-600x262.png 600w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><br \/>\nL&#8217;avantage des fichiers crypt\u00e9s ex\u00e9cutables est qu&#8217;ils peuvent \u00eatre d\u00e9chiffr\u00e9s sans qu&#8217;AxCrypt soit install\u00e9.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-exe-decrypt.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-exe-decrypt.png\" alt=\"Cryptage - exe decrypt\" width=\"294\" height=\"199\" class=\"aligncenter size-full wp-image-7572\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-exe-decrypt.png 294w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-exe-decrypt-120x80.png 120w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2010\/08\/Cryptage-exe-decrypt-290x196.png 290w\" sizes=\"auto, (max-width: 294px) 100vw, 294px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Logiciels associ\u00e9s<\/h2>\n<table style=\"text-align: left\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"600\">\n<tbody>\n<tr>\n<td><a href=\"http:\/\/axcrypt.softonic.fr\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/screenshots.fr.sftcdn.net\/fr\/scrn\/24000\/24475\/axcrypt-7.jpg\" alt=\"AxCrypt\" width=\"50\" height=\"50\" align=\"left\" \/><\/a><\/td>\n<td><strong><a href=\"http:\/\/axcrypt.softonic.fr\">AxCrypt<\/a>:<\/strong> Pour crypter simplement depuis l&#8217;explorateur de fichiers.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"http:\/\/truecrypt.softonic.fr\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/screenshots.fr.sftcdn.net\/fr\/scrn\/34000\/34872\/truecrypt-14.jpg\" alt=\"TrueCrypt\" width=\"50\" height=\"50\" align=\"left\" \/><\/a><\/td>\n<td><strong><a href=\"http:\/\/truecrypt.softonic.fr\">TrueCrypt<\/a>:<\/strong> Un logiciel de chiffrement complet et puissant, mais plus difficile \u00e0 utiliser.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"http:\/\/folder-protection.softonic.fr\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/screenshots.fr.sftcdn.net\/fr\/scrn\/68000\/68943\/folder-protection-01-100x100.png\" alt=\"Folder Protection\" width=\"50\" height=\"50\" align=\"left\" \/><\/a><\/td>\n<td><strong><a href=\"http:\/\/folder-protection.softonic.fr\">Folder Protection<\/a>:<\/strong> Un outil simple pour prot\u00e9ger l&#8217;acc\u00e8s \u00e0 vos dossiers avec un mot de passe.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Comment s&#8217;assurer que personne ne peut acc\u00e9der \u00e0 vos donn\u00e9es confidentielles sur votre disque dur? La solution la plus s\u00fbre est le chiffrement, une op\u00e9ration aussi appel\u00e9e -improprement- cryptage et qui rend impossible la lecture d&#8217;un document cod\u00e9 sans la cl\u00e9 de d\u00e9chiffrement ad\u00e9quate. Nous allons voir ensemble comment prot\u00e9ger vos documents personnels \u00e0 l&#8217;aide &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/fr\/securite-comment-crypter-ses-donnees\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;S\u00e9curit\u00e9: comment crypter ses donn\u00e9es&#8221;<\/span><\/a><\/p>\n","protected":false},"author":8012,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[16774,1],"tags":[21,819,821,820,818,63],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-7528","post","type-post","status-publish","format-standard","hentry","category-how-to","category-uncategorized","tag-securite","tag-chiffrement","tag-cle-usb","tag-confidentiel","tag-cryptage","tag-protection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/7528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/users\/8012"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/comments?post=7528"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/7528\/revisions"}],"predecessor-version":[{"id":168643,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/7528\/revisions\/168643"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/media?parent=7528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/categories?post=7528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/tags?post=7528"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/usertag?post=7528"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/vertical?post=7528"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/content-category?post=7528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}