AxCrypt 2.1.1494

Easy to use password protection for files using strong encryption, integrated with Windows Explorer. Encrypt, compress, decrypt, wipe with a few mouse clicks and double-click to view and edit. Cryptographic primitives are AES-128 and SHA-1. Encrypted files have a '.AXX' extension added, and are shown with a new icon. GPL Open Source, only free tools required for development. ...

Author AxCrypt AB
License Freeware
Price FREE
Released 2017-04-20
Downloads 128
Filesize 5.75 MB
Requirements Windows Vista or higher
Installation Install and Uninstall
Keywords file, encryption, free, aes, shell extension, windows, encrypt, multiple backup, api, server, script, open source, gnu, gpl
Users' rating
(6 rating)
AxCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
AxCrypt secure algorithm - Download Notice

Using AxCrypt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of AxCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All AxCrypt download links are direct AxCrypt full download from publisher site or their selected mirrors.
Avoid: secure algorithm oem software, old version, warez, serial, torrent, AxCrypt keygen, crack.
Consider: AxCrypt full version, secure algorithm full download, premium download, licensed copy.

AxCrypt secure algorithm - The Latest User Reviews

Most popular Encryption Tools downloads

Advanced Encryption Package 2008 Professional

4.8.7 download

... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...

Touch N Go

1.0.61228.0 download

... is designed with multiple layers of protection, including Secure Sockets Layer (SSL) for data transfer, 256-bit Advanced ... and application-level controls. It uses FBI Certified WSQ Algorithm & Biometric Data interchange and interoperability standards (ISO ...

File Privacy

0.2 download

... (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data ...

KakaSoft Video Copy Protection

10.20 download

... With 256-bit AES encryption and advanced video encoding algorithm, more secure and reliable! Anti Screen Recorder: Automatically identify various ...

Video DRM Protection

10.30 download

... With 256-bit AES encryption and advanced video encoding algorithm, more secure and reliable! Anti Screen Recorder: Automatically identify various ...

File Encryption XP

1.7.395 download

... for Windows. Files are encrypted with hack-proof Blowfish algorithm. This tool works with USB drives, flash memory ... files (.exe), File Encryption XP is perfect for secure file transfer over Internet, e-mail or corporate network. ...

Digital Security Suite

2011 download

... file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so ... Infosec Standard 5, Baseline & Enhanced Peter Gutmann's algorithm U.S.Department of Defense Sanitizing (DOD 5220.22-M) Bruce Schneier's ...

abylon ENTERPRISE

23.60.1 download

... or DVD. The using of the recognized encryption algorithm AES and Blowfish guarantee the security of the ... you can send your messages and attachments particularly secure over the internet. With abylon LOGON you can ...

Computer Security

1.5 download

... Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with ...