ProxyCrypt 2.6.3

... is a command line tool that creates encrypted volumes within a file or a hard drive. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. It works as a 'proxy' for the ImDisk driver, which is included in the full package. If you need to create encrypted spaces which can be partitioned like an ordinary hard drive, it is also compatible with Arsenal Image Mounter. ...

Author v77
License Freeware
Price FREE
Released 2022-03-06
Downloads 239
Filesize 467 kB
Requirements - ImDisk or Arsenal Image Mounter - Administrative privileges - CPU with SSE2
Installation No Install Support
Keywords volume, encryption, imdisk, command line
Users' rating
(16 rating)
ProxyCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
ProxyCrypt volume - Download Notice

Using ProxyCrypt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of ProxyCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All ProxyCrypt download links are direct ProxyCrypt full download from publisher site or their selected mirrors.
Avoid: volume oem software, old version, warez, serial, torrent, ProxyCrypt keygen, crack.
Consider: ProxyCrypt full version, volume full download, premium download, licensed copy.

ProxyCrypt volume - The Latest User Reviews

Most popular Encryption Tools downloads

Rohos Mini Drive

3.0 download

Rohos Mini Drive is a freeware app that safeguards personal documents by creating a password-protected partition on your flash drive. The download actually installs two programs. One, Rohos Mini Drive, is ...

VeraCrypt

1.26.15 download

... guides users through the process of creating encrypted volumes, encrypting entire partitions, or even encrypting the system ... features of VeraCrypt is its support for hidden volumes and hidden operating systems. This provides an additional ...

BestCrypt Volume Encryption

5.12.3 download

BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks - simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), while also working on ...

Cryptainer Lite Free Encryption Software

17.0.2.0 download

... access your data. Cryptainer Lite creates an encrypted volume that can be accessed only with a password. Once mounted, the volume behaves as a standard windows drive. The files ...

abylon SHAREDDRIVE

23.60.1 download

... several users and reduce the backup data transfer volume. The encrypted files can be stored on local or a network computer. Security is increased by masking the file names. As ...

Rohos Disk Encryption

2.2 download

... - up to 4TB for Windows 2000/XP. Encrypted volumes can be mounted and dismounted at any time. - Automatic disk connecting on system start - Integrates into MS Office applications. ...

ProxyCrypt

2.6.3 download

... is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption ... on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced ...

Cryptainer Pro Encryption Software

17.0.2.0 download

... can access your data. Cryptainer creates an encrypted volume that can be accessed only with a password. Once mounted, the volume behaves as a standard windows drive. The files ...

BestCrypt Volume Encryption

5.12.7 download

**BestCrypt Volume Encryption by Jetico, Inc. - A Comprehensive Review** ... ever-increasing, securing sensitive information has become paramount. BestCrypt Volume Encryption, developed by Jetico, Inc., emerges as a ... **Key Features** 1. **Full-Disk Encryption**: BestCrypt Volume Encryption offers full-disk encryption, ensuring that all data ...

Aloaha Crypt Disk

6.0.16 download

... to reveal the smart card PIN - Hidden volume (steganography) with second smart card - Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Requirements - Windows XP, Vista, ...