Boxcryptor for Mac OS X 2.3.403.737 freeware

Boxcryptor is easy-to-use encryption software optimized for the cloud. It allows the secure use of cloud storage services without sacrificing privacy and comfort. Boxcryptor supports all major cloud storage providers (such asDropbox,Google Drive,OneDrive,Box, SugarSync and many more)on all platforms (desktop and mobile). With Boxcryptor, your files go protected to your cloud provider and you can enjoy peace of mind. ...

Author Secomba GmbH
Released 2016-07-21
Filesize 10.19 MB
Downloads 284
OS Mac OS X
Installation Install and Uninstall
Keywords encryption, end-to-end, security, privacy, data protection
Users' rating
(21 rating)
Boxcryptor for Mac OS XEncryption ToolsMac OS X
Boxcryptor for Mac OS X - encryption freeware Freeware Download Notice

Boxcryptor for Mac OS X Free Download - we do not host any Boxcryptor for Mac OS X torrent files or links of Boxcryptor for Mac OS X on rapidshare.com, depositfiles.com, megaupload.com etc. All Boxcryptor for Mac OS X download links are direct Boxcryptor for Mac OS X download from publisher site or their selected mirrors.

Boxcryptor for Mac OS X freeware - The Latest User Reviews
Boxcryptor for Mac OS X freeware - The Latest Versions History
2.3.403.737 Jul 21, 2016 Major Update Added: Granting and revoking group ownership by right-clicking on a group member
Fixed: Missing 'Do you want to encrypt' dialog on copying or moving files to an unencrypted folder
Fixed: Cannot create a Whisply link in OneDrive
Various other bug fixes and improvements

Most popular Encryption Tools freeware downloads

Crypto Anywhere

1.1 freeware download

... themselves. Crypto Anywhere implements trusted, industry standard, strong encryption algorithms based on RSA public key encryption, the Twofish block cipher and the ISAAC random ... SecExMail client based and SecExMail Gate server based encryption. ...

Aloaha Crypt Disk

6.0.170 freeware download

... and mounts it as a real disk - Encryption is automatic, real-time (on-the-fly) and transparent - Parallelization ... Hidden volume (steganography) with second smart card - Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: ...

Portable TrueCrypt

7.1a freeware download

... where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * ... volume (steganography) and hidden operating system. * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: ...

Hash Generator

8.0 freeware download

... is not tempered. Hashes are also used in encryption and storage of password as well as other sensitive data to protect it from the spying ...

PCTuneUp Free EXE Lock

5.1.7 freeware download

... This free application locker provides users with two encryption modes: Speed priority mode and Security priority mode. ... it a waste of time to launch he freeware over and over. It's not a big deal. ...

SurfEasy VPN for Windows

3.3 freeware download

... protect their privacy with SurfEasy. SurfEasy uses bank-grade encryption to ensure no one can see your online ... for protecting your online privacy and security. Bank-grade encryption secures any Internet connection. (ie. Wi-Fi hotspots) Browse ...

Encoding Decoding Free

3.5.4 freeware download

... decryption (in addition to the hidden internal); Secure encryption of login passwords, pin codes, serial numbers, etc..; Inability of systems to be cracked by 'Brute ...

Textcrypt

1.6 freeware download

Text Encryption Application. Uses a costly method in-processing. The strength of the encryption is configurable, so it can be adapted according ... the size of the text to get appropriate encryption times (long enough to deter brute force attacks ...

PDF Page Lock

2.0.4 freeware download

... pages of a PDF document with a password encryption. With PDF Page Lock, users could hide or lock selected pages of a PDF file while ...

Confidential Free Edition

1.0 freeware download

... a visible image. Confidential uses the AES-256 bits encryption algorithm as well as other security measures. Moreover, the presence of the hidden data is undetectable. ...