ProxyCrypt 2.6.3 freeware

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. ... the full package. If you need to create encrypted spaces which can be partitioned like an ordinary hard drive, it is also compatible with Arsenal Image Mounter. ...

Author v77
Released 2022-03-06
Filesize 467 kB
Downloads 747
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation No Install Support
Keywords volume, encryption, imdisk, command line
Users' rating
(44 rating)
ProxyCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
ProxyCrypt - encrypted disk Freeware Download Notice

ProxyCrypt Free Download - we do not host any ProxyCrypt torrent files or links of ProxyCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All ProxyCrypt download links are direct ProxyCrypt download from publisher site or their selected mirrors.

ProxyCrypt freeware - The Latest User Reviews
ProxyCrypt freeware - The Latest Versions History
2.6.3 Mar 6, 2022 Minor Update - updated driver to version 2.1.1 in full package
- updated MinGW from 10.2.1 to 11.2.1
2.6.2 Apr 29, 2021 Minor Update - added a sound ("bell" character) in case of password or hash file error
2.5.2 Aug 29, 2020 New Release - fix: write errors occurred when 64 threads were used for encryption; max number of threads is now 63 (appeared in 2.4.0)
- minimal new image file size is now 69 KB, because of a new requirement of imdisk driver 2.0.8 and later

Most popular Encryption Tools freeware downloads

Cypherix LE Free Encryption Software

11.7.0.0 freeware download

Cypherix LE Ttotally free 448 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data ...

Cryptainer Lite Free Encryption Software

17.0.2.0 freeware download

Cryptainer Lite is a totally free 448-bit disk encryption software. Simple, easy to use encryption application that creates encrypted 'vaults'. One can store any kind of data ...

CrococryptMirror

1.43a freeware download

... an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are ... Features: Copying and synchronizing of files/folders/directories (recursive) to encrypted folders, Encryption of filenames, Source folders can be ...

USB Flash Security

5.0.0 freeware download

... encryption algorithm has been adopted. Data will be encrypted automatically by writing in USB Flash Drive, and it will be decrypted automatically by reading from ...

5 freeware award

Aloaha Crypt Disk

6.0.170 freeware download

Features - Creates a virtual encrypted disk within a file and mounts it as a real disk - Encryption is automatic, real-time (on-the-fly) and transparent ... as fast as if the drive was not encrypted - Provides plausible deniability, in case an adversary ...

Auto File DRM Encryption Tool

5.2.5.4 freeware download

... the digital rights management( DRM) data to the encrypted files. It allows you to protect the sensitive files from end to end, the encrypted files always stay encrypted in the disk. It ...

Cryptainer Lite Free Encryption Software

17.0.2.0 freeware download

Cryptainer Lite is a totally free 448-bit disk encryption software. Simple, easy to use encryption application that creates encrypted 'vaults'. One can store any kind of data ...

ProxyCrypt

2.6.3 freeware download

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. ... made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and ...

Notebook PEA

1.7 freeware download

... text must be never stored on the hard disk, instead it is kept only in the random ... at the same time, not displaying texts remain encrypted in RAM. The authenticated encryption mode (EAX) achieves ...

TrueCrypt

7.2 freeware download

... just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are ... they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being ...