CrococryptMirror 1.43a freeware

... to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly. ...

Author Hissen IT
Released 2021-06-16
Filesize 30.28 MB
Downloads 641
OS Java, Win10 x32, Win10 x64, Win8 x32, Win8 x64, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP, Windows 7 x64, Windows Vista x64, Windows 8, Windows 10
Installation Install and Uninstall
Keywords encryption, file encryption, folder encryption, cloud encryption, cloud storage, aes, twofish, password, pbe, sha512, whirlpool, windows
Users' rating
(25 rating)
CrococryptMirrorEncryption ToolsJava, Win10 x32, Win10 x64, Win8 x32, Win8 x64, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP, Windows 7 x64, Windows Vista x64, Windows 8, Windows 10
CrococryptMirror - used Freeware Download Notice

CrococryptMirror Free Download - we do not host any CrococryptMirror torrent files or links of CrococryptMirror on rapidshare.com, depositfiles.com, megaupload.com etc. All CrococryptMirror download links are direct CrococryptMirror download from publisher site or their selected mirrors.

CrococryptMirror freeware - The Latest User Reviews
CrococryptMirror freeware - The Latest Versions History
1.43a Jun 16, 2021 Minor Update Auto-Sync-Service fixed for Windows 10. For details go to the CrococryptMirror Homepage.
1.42 Feb 1, 2020 Minor Update Auto-Sync-Service fixed for Windows 10. For details go to the CrococryptMirror Homepage.
1.41 Apr 2, 2018 Minor Update Fix for Explorer View (WebDav) under Windows 10. For details go to the CrococryptMirror Homepage.

Most popular Encryption Tools freeware downloads

Download Hash Verifier

6.0 freeware download

... Clipboard' etc Hash verification is a standard mechanism used to verify that downloaded file is original and not tempered. Often it happens that hackers modify ...

VeraCrypt

1.26.15 freeware download

... The software enhances the security of the algorithms used for system and partition encryption, making it immune to brute-force attacks. This is achieved through the ...

Paranoia Text Encryption for Mac

15.0.4 freeware download

... - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen symmetric cipher algorithm to make a final steganogram (JPEG image). Fully compatible ...

SSuite Agnot StrongBox Security

2.2.2.2 freeware download

... and absolutely Portable! This download may also be used as a complete portable security kit, as it also contains Backup Master, FileShredder, and Picsel Security ...

5 freeware award

Hash Generator

8.0 freeware download

... for hash generation. Hashes or checksums are mainly used for file integrity verification. Often files downloaded from ... sure file is not tempered. Hashes are also used in encryption and storage of password as well ...

CrococryptFile

1.6a freeware download

... (e.g., password-based or PGP-based AES-256 encryption ) is used. CrococryptFile and all its clients are open-source. ...

Crypto Anywhere - OpenPGP Edition

2.0 freeware download

... to make a travel floppy which can be used in internet cafe's or at work. You don't even need to install the software - just ...

logIQKey

2.0 freeware download

atypiq logIQKey is a powerful application used to secure your valuable data and it is very easy to use. Use it to exchange critical documents ...

5 freeware award

Registrator

8.0.3 freeware download

The Registrator is a simple application desiged to decrypt the products from Einhugur Software and other vendors with your serial number. ...

Registrator for Linux

8.0.3 freeware download

The Registrator is a simple application desiged to decrypt the products from Einhugur Software and other vendors with your serial number. ...