ProxyCrypt 2.6.3

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. It works as a 'proxy' for the ImDisk driver, which is included in the full package. If you need to create encrypted spaces which can be partitioned like an ordinary hard drive, it is also compatible with Arsenal Image Mounter. ...

Author v77
License Freeware
Price FREE
Released 2022-03-06
Downloads 244
Filesize 467 kB
Requirements - ImDisk or Arsenal Image Mounter - Administrative privileges - CPU with SSE2
Installation No Install Support
Keywords volume, encryption, imdisk, command line
Users' rating
(19 rating)
ProxyCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
ProxyCrypt characters - Download Notice

Using ProxyCrypt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of ProxyCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All ProxyCrypt download links are direct ProxyCrypt full download from publisher site or their selected mirrors.
Avoid: characters oem software, old version, warez, serial, torrent, ProxyCrypt keygen, crack.
Consider: ProxyCrypt full version, characters full download, premium download, licensed copy.

ProxyCrypt characters - The Latest User Reviews

Most popular Encryption Tools downloads

PassFab for RAR

9.5.3.1 download

... the password, such as its length or specific characters, the Brute Force with Mask Attack provides a more targeted approach, significantly reducing the time required for recovery. One of ...

Paradox Password Recovery

2.2 download

... define the length of password or range of characters (useful for multi-computer break). All versions of Paradox tables and all file kinds (.db, .px, .xnn, .xgn, .ygn etc) supported. ...

Passper for PowerPoint

4.0.0 download

... Attack allows users to specify a range of characters, which the software then uses to generate possible password combinations. The Mask Attack is particularly useful when users remember part of ...

Master Uneraser

1.21 download

... NTFS5. It supports long file names and non-English characters in file names. And also it has possiblity to recover deleted NTFS compressed files. Free download. ...

PassGenCrypter

1.1 download

... length of your passwords also up to 100 characters. The utility will also then allow you to copy the generated password to your clipboard so that you can easy paste ...

Encryption Software

108.31.2019.11 download

... password that you given in encryption matters. ASCII-standard characters only for password, length 11 characters compulsory. Also you can encrypt any types of ... decryption. Advanced password encryption filling with three common characters in background for untouchable file safety. Optimized pointed ...

iMyFone Passper for ZIP

4.0.0 download

... be. 2. **Combination Attack**: By combining different characters, this attack method systematically tries various permutations to ... details about the password (such as length, specific characters, or patterns), the Mask Attack allows you to ...

Cryptosystem ME6

15.0 download

... a key which is from 16 to 64 characters long, and which can be either a phrase or a sequence of 64 random bytes (the software provides a way for ...

Soft Cleaner Safe

108.3.2019.0 download

... decryption. Advanced password encryption filling with three common characters in background for untouchable file safety. ---Optimized pointed accuracy for very large data. ---Extra powerful protected encryption any file up to ...

Confidential Free Edition

1.0 download

Confidential is a unique software in the world. It allows you to hide an image and/or text within a visible image. Confidential uses the AES-256 bits encryption algorithm as well as ...