AxCrypt 2.1.1494

Easy to use password protection for files using strong encryption, integrated with Windows Explorer. Encrypt, compress, decrypt, wipe with a few mouse clicks and double-click to view and edit. Cryptographic primitives are AES-128 and SHA-1. Encrypted files have a '.AXX' extension added, and are shown with a new icon. GPL Open Source, only free tools required for development. ...

Author AxCrypt AB
License Freeware
Price FREE
Released 2017-04-20
Downloads 137
Filesize 5.75 MB
Requirements Windows Vista or higher
Installation Install and Uninstall
Keywords file, encryption, free, aes, shell extension, windows, encrypt, multiple backup, api, server, script, open source, gnu, gpl
Users' rating
(13 rating)
AxCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
AxCrypt secure algorithm - Download Notice

Using AxCrypt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of AxCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All AxCrypt download links are direct AxCrypt full download from publisher site or their selected mirrors.
Avoid: secure algorithm oem software, old version, warez, serial, torrent, AxCrypt keygen, crack.
Consider: AxCrypt full version, secure algorithm full download, premium download, licensed copy.

AxCrypt secure algorithm - The Latest User Reviews

Most popular Encryption Tools downloads

USBCrypt

10.9.5 download

... encryption. USBCrypt uses the industry standard AES encryption algorithm to protect your files, the strongest protection available. ... USBCrypt can keep your personal files secure, too. If you use a removable drive to ...

File Privacy

0.2 download

... (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...

Crypditor

1.21 download

... data with somebody else with a high-secure encryption algorithm (AES). No other software needed: application and documents are in one. No installation required! ...

GiliSoft Private Disk

11.5.23 download

... Encryption: Files are encrypted with a powerful 256-bit algorithm, which is a standard for secure data encryption, rendering the encrypted files inaccessible without ... encryption, Private Disk allows you to create a secure locker within your Dropbox to safeguard your sensitive ...

File Encryption XP

1.7.395 download

... for Windows. Files are encrypted with hack-proof Blowfish algorithm. This tool works with USB drives, flash memory ... files (.exe), File Encryption XP is perfect for secure file transfer over Internet, e-mail or corporate network. ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...

Digital Security Suite

2011 download

... file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so ... Infosec Standard 5, Baseline & Enhanced Peter Gutmann's algorithm U.S.Department of Defense Sanitizing (DOD 5220.22-M) Bruce Schneier's ...

abylon ENTERPRISE

23.60.1 download

... or DVD. The using of the recognized encryption algorithm AES and Blowfish guarantee the security of the ... you can send your messages and attachments particularly secure over the internet. With abylon LOGON you can ...

Computer Security

1.5 download

... Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with ...