ProxyCrypt 2.6.3

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. It works as a 'proxy' for the ImDisk driver, which is included in the full package. If you need to create encrypted spaces which can be partitioned like an ordinary hard drive, it is also compatible with Arsenal Image Mounter. ...

Author v77
License Freeware
Price FREE
Released 2022-03-06
Downloads 237
Filesize 467 kB
Requirements - ImDisk or Arsenal Image Mounter - Administrative privileges - CPU with SSE2
Installation No Install Support
Keywords volume, encryption, imdisk, command line
Users' rating
(16 rating)
ProxyCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
ProxyCrypt aes 256 bit key - Download Notice

Using ProxyCrypt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of ProxyCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All ProxyCrypt download links are direct ProxyCrypt full download from publisher site or their selected mirrors.
Avoid: aes 256 bit key oem software, old version, warez, serial, torrent, ProxyCrypt keygen, crack.
Consider: ProxyCrypt full version, aes 256 bit key full download, premium download, licensed copy.

ProxyCrypt aes 256 bit key - The Latest User Reviews

Most popular Encryption Tools downloads

BoxCryptor for Android

2.122.1101 download

... features (see below). You can buy the license key seperately to unlock all features. BoxCryptor is ... never transmitted - Secure storage by using the AES-256 standard. (Advanced Encryption Standard with a key size ...

abylon CRYPTDRIVE

23.60.1 download

... software encrypted container, using the international algorithm standards AES and Blowfish with an key-length from 256 or 448 bit. An even greater protection offer the combination of ...

abylon BASIC

23.60.1 download

... diaries, pictures or other secret documents with the AES- or Blowfish-Algorithm is relatively simple. With the help ... the data occurs with the Blowfish- (448 bits key length) or the AES-Algorithm (256 bit key length). ...

Cryptocx v6

6.2.9 download

... Merck, Numerous Law enforcement agencies, and many others. Key Cryptocx v6 Features: Fully OpenPGP compatible component COM ... to add to the SDA are secured with 256 Bit AES encryption, Cryptocx is compatible with ALL ...

Safeguard PDF Security

4.0.23 download

... shared with others) Locklizard PDF security uses public key technology with AES 256 bit encryption and a real-time web based licensing system. ...

PenProtect

1.45 download

... your Password and a special technique (AES algorithm 256 bit key). PenProtect requires no installation: it is a single ...

5 award

Lizard Safeguard PDF Writer

3.0.20 download

... and document management control using US Government strength AES 256 bit encryption. Made specifically for publishers, Lizard Safeguard ... and unmanageable password mechanisms Lizard Safeguard uses public key technology with strong 256 bit encryption and a ...

Safeguard Enterprise PDF DRM

5.0.40 download

... unmanageable password mechanisms Locklizard PDF security uses public key technology with AES 256 bit encryption and a real-time web based licensing system. ...

Rohos Disk Encryption

3.2 download

... On-the-fly disk encryption Rohos disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly. No ... if you forgot your password or lost USB key. Easy of use Rohos cares about usability: ...

Free Text Encrypt

1.00 download

... (AES) specification to protect your confidential data. The AES encryption algorithm secures the sensitive and unclassified information ... and pasted into any text editor, or e-mailed. Key Features: - Easy-to use fast text encryption tool. ...