CryptoTE 0.5.390 freeware

... the popular Scintilla widget and automatically stores text data in secure encrypted container files. Compared to other ... CryptoTE does not force any structure upon your data: it works with plain ASCII text and does not require you to fill in grids, key-value attributes, descriptions etc. ...

Author Timo Bingmann
Released 2009-08-02
Filesize 2.06 MB
Downloads 498
OS Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7, Linux, Linux Console, Linux Gnome,
Installation Install and Uninstall
Keywords text editor, integrated cryptography, integrated encryption, safe passwords
Users' rating
(11 rating)
CryptoTEEncryption ToolsWindows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7, Linux, Linux Console, Linux Gnome,
CryptoTE - ascii data Freeware Download Notice

CryptoTE Free Download - we do not host any CryptoTE torrent files or links of CryptoTE on rapidshare.com, depositfiles.com, megaupload.com etc. All CryptoTE download links are direct CryptoTE download from publisher site or their selected mirrors.

CryptoTE freeware - The Latest User Reviews
CryptoTE freeware - The Latest Versions History
0.5.390 Aug 2, 2009 New Release

Most popular Encryption Tools freeware downloads

Open PGP Studio

1.2.3 freeware download

... also use it to encase encrypted documents in ASCII armor and compress output files. ...

CryptoTE

0.5.390 freeware download

... the popular Scintilla widget and automatically stores text data in secure encrypted container files. Compared to other ... CryptoTE does not force any structure upon your data: it works with plain ASCII text and does ...

Encryption Software

108.31.2019.11 freeware download

Encryption Software uses to encrypt your confidential data with or without password advanced security. Encryption stands for totally changing your personal data and files with a password security to an ...

InfoLock

6.2 freeware download

... information and documents. It is designed to encrypt ASCII files only, NOT media files, as this is necessary for the superior-security algorithm. Key Features: ...