ProxyCrypt 2.6.3

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. It works as a 'proxy' for the ImDisk driver, which is included in the full package. If you need to create encrypted spaces which can be partitioned like an ordinary hard drive, it is also compatible with Arsenal Image Mounter. ...

Author v77
License Freeware
Price FREE
Released 2022-03-06
Downloads 239
Filesize 467 kB
Requirements - ImDisk or Arsenal Image Mounter - Administrative privileges - CPU with SSE2
Installation No Install Support
Keywords volume, encryption, imdisk, command line
Users' rating
(16 rating)
ProxyCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
ProxyCrypt hashing - Download Notice

Using ProxyCrypt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of ProxyCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All ProxyCrypt download links are direct ProxyCrypt full download from publisher site or their selected mirrors.
Avoid: hashing oem software, old version, warez, serial, torrent, ProxyCrypt keygen, crack.
Consider: ProxyCrypt full version, hashing full download, premium download, licensed copy.

ProxyCrypt hashing - The Latest User Reviews

Most popular Encryption Tools downloads

fHash

3.11.3.0 download

... Sun Junwen, is a lightweight yet powerful file hashing utility designed to meet the needs of both ... its core, fHash supports a wide array of hashing algorithms, including MD5, SHA-1, SHA-256, and more, ensuring ...

FileHash

5.2.0.1251 download

**FileHash by BrainWave Consulting Company, LLC: A Comprehensive Review** FileHash, developed by BrainWave Consulting Company, LLC, is a robust and efficient utility designed to generate and verify file hashes with ...

MD5 Checksum Tool

4.7 download

... from the offical author. The file and string hashing algorithms supported are MD5, SHA1, SHA256, SHA384 and SHA512. Best tool to compute MD5/SHA file hash. It is possible to ...

Toms Hash Explorer

1.2 download

... to verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including ... engine + Calculate Hash Values using industry standard hashing algorithms + Calculate File Entropy using Shannon's Entropy ...

ProxyCrypt

2.6.3 download

... key derivation function, which uses Whirlpool or Keccak hashing function. - Scrypt can be tuned for more security or more speed. - Password length can be up to 250 characters. ...

Cryptnos

1.3.3 download

... using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, RIPEMD-160, Whirlpool (2003 revision), and Tiger (1995 original, not “Tiger2?) Combines site domain or mnemonic ...

Hash Codes

1.62.780.7200 download

... hash process Save the log information Display the hashing time Version on 32-bit and 64-bit Windows system Can be used as standalone software Multilingual user interface (English, German, Polish, Slovenian) ...

Hash Codes x64

1.62.780.7200 download

... hash process Save the log information Display the hashing time Version on 32-bit and 64-bit Windows system Can be used as standalone software Multilingual user interface (English, German, Polish, Slovenian) ...

Appnimi SHA512 Decrypter

3.8.6 download

... is probably the most easily available highly secure hashing algorithm. Above all it is FREE. * FREE Download * Stop Restart the decryption process * Peak speed of above 1 ...

VPN Gate Client Plug-in

2024.10.09 Build 979 download

... AES encryption, RSA 4096-bit key encryption, and SHA-1 hashing. It supports multiple protocols, albeit varying by server due to the autonomous operation by volunteers. Despite the commendable encryption and protocol ...