AxCrypt 2.1.1494 freeware

Easy to use password protection for files using strong encryption, integrated with Windows Explorer. Encrypt, compress, decrypt, wipe with a few mouse clicks and double-click to view and edit. Cryptographic primitives are AES-128 and SHA-1. Encrypted files have a '.AXX' extension added, and are shown with a new icon. GPL Open Source, only free tools required for development. ...

Author AxCrypt AB
Released 2017-04-20
Filesize 5.75 MB
Downloads 409
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords file, encryption, free, aes, shell extension, windows, encrypt, multiple backup, api, server, script, open source, gnu, gpl
Users' rating
(35 rating)
AxCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
AxCrypt - algorithm Freeware Download Notice

AxCrypt Free Download - we do not host any AxCrypt torrent files or links of AxCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All AxCrypt download links are direct AxCrypt download from publisher site or their selected mirrors.

AxCrypt freeware - The Latest User Reviews
AxCrypt freeware - The Latest Versions History
2.1.1494 Apr 20, 2017 Minor Update Minor upgrade with bugfixes and enhancements,
2.1.1404 Jul 1, 2016 Major Update Major upgrade to version 2.x from version 1.x
2.1.1388 Apr 29, 2016 New Release Major upgrade to version 2.x from version 1.x

Most popular Encryption Tools freeware downloads

EaseFilter Auto File Encryption

5.1.8.1 freeware download

... to access the encrypted files. Supported strong cryptographic algorithm Rijndael is a high security algorithm which was chosen by the National Institute of ... encrypt or decrypt the data with AES encryption algorithm. Atuo file encryption protects data 'at rest', meaning ...

Hash Codes

1.62.780.7200 freeware download

... SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. Features: Hash data from keyboard, file ... SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER and Whirlpool algorithm Copy hash codes to the clipboard or save ...

Guardian Of Data

3.005 freeware download

... it's a breeze. With AES encryption (Rijndael Encryption Algorithm) you protect any type of document, so that it can only be read after entering the ...

BestCrypt Traveller

1.06 freeware download

... BestCrypt Traveller supports containers encrypted by any Encryption Algorithm and any Key Generator available in BestCrypt. ...

Idea crypting module for BestCrypt

7.20 freeware download

... newer. The module performs encryption using well-known IDEA algorithm. Works in Bestcrypt Environment in any Windows system.The IDEA driver is installed simply enough - you ...

Encrypting Safe

1.1 freeware download

... from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source ... Smart Phone Behind: Using Symmetric key Algorithm for Encrypting and Decrypting note Features: - ...

SilentEye

0.4.1 freeware download

... interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. Two main plug-ins family exists: ...

Cryptnos

1.3.3 freeware download

... and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, ... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, ...

Paranoia Text Encryption for PC

15.0.4 freeware download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish ... text within an image - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen ...

USB Flash Security

5.0.0 freeware download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 freeware award