CrococryptMirror 1.43a freeware

... mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly. ...

Author Hissen IT
Released 2021-06-16
Filesize 30.28 MB
Downloads 637
OS Java, Win10 x32, Win10 x64, Win8 x32, Win8 x64, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP, Windows 7 x64, Windows Vista x64, Windows 8, Windows 10
Installation Install and Uninstall
Keywords encryption, file encryption, folder encryption, cloud encryption, cloud storage, aes, twofish, password, pbe, sha512, whirlpool, windows
Users' rating
(25 rating)
CrococryptMirrorEncryption ToolsJava, Win10 x32, Win10 x64, Win8 x32, Win8 x64, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP, Windows 7 x64, Windows Vista x64, Windows 8, Windows 10
CrococryptMirror - algorithms Freeware Download Notice

CrococryptMirror Free Download - we do not host any CrococryptMirror torrent files or links of CrococryptMirror on rapidshare.com, depositfiles.com, megaupload.com etc. All CrococryptMirror download links are direct CrococryptMirror download from publisher site or their selected mirrors.

CrococryptMirror freeware - The Latest User Reviews
CrococryptMirror freeware - The Latest Versions History
1.43a Jun 16, 2021 Minor Update Auto-Sync-Service fixed for Windows 10. For details go to the CrococryptMirror Homepage.
1.42 Feb 1, 2020 Minor Update Auto-Sync-Service fixed for Windows 10. For details go to the CrococryptMirror Homepage.
1.41 Apr 2, 2018 Minor Update Fix for Explorer View (WebDav) under Windows 10. For details go to the CrococryptMirror Homepage.

Most popular Encryption Tools freeware downloads

OpenVPN

2.6.13 I001 freeware download

... speed, thanks to its support for various encryption algorithms and compression techniques. This ensures that users can enjoy a seamless and fast internet experience while ...

Crypto Anywhere

1.1 freeware download

... Crypto Anywhere implements trusted, industry standard, strong encryption algorithms based on RSA public key encryption, the Twofish block cipher and the ISAAC random number generator. ...

Aloaha Crypt Disk

6.0.170 freeware download

... volume (steganography) with second smart card - Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Requirements - Windows XP, Vista, 2008, 7, 2008r2 ...

Portable TrueCrypt

7.1a freeware download

... (steganography) and hidden operating system. * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. ...

Hash Generator

8.0 freeware download

... Hash Generator * Generate hashes for 15+ popular algorithms including MD5, SHA256, BASE64, LM, NTLM. * Create Hash for either the File or custom Text. ...

Hash Compare

3.0 freeware download

... * Performs file integrity comparison using popular Hash algorithms such as MD5, SHA1 & SHA256. * 'Drag & Drop' feature to quickly drag one or ...

VSEncryptor 64-bit

2.7.3.527 freeware download

... box. VSEncryptor supports a variety of encryption algorithms, including AES-128, AES-192, AES-256, RC2, RC4, DES and Triple DES. ...

VeraCrypt

1.26.15 freeware download

... At its core, VeraCrypt offers advanced encryption algorithms, including AES, Serpent, and Twofish, either individually or ... data. The software enhances the security of the algorithms used for system and partition encryption, making it ...

Paranoia Text Encryption for Mac

15.0.4 freeware download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit ...

Speedcrypt

1.5 freeware download

Speedcrypt provides its users with protection against Dictionary Attacks, Guessing Attacks or Brute Force Attacks, and Rainbow Table Attacks. These types of attacks cannot be prevented ...