CrococryptMirror 1.43a freeware

... an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly. ...

Author Hissen IT
Released 2021-06-16
Filesize 30.28 MB
Downloads 632
OS Java, Win10 x32, Win10 x64, Win8 x32, Win8 x64, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP, Windows 7 x64, Windows Vista x64, Windows 8, Windows 10
Installation Install and Uninstall
Keywords encryption, file encryption, folder encryption, cloud encryption, cloud storage, aes, twofish, password, pbe, sha512, whirlpool, windows
Users' rating
(23 rating)
CrococryptMirrorEncryption ToolsJava, Win10 x32, Win10 x64, Win8 x32, Win8 x64, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP, Windows 7 x64, Windows Vista x64, Windows 8, Windows 10
CrococryptMirror - encrypted Freeware Download Notice

CrococryptMirror Free Download - we do not host any CrococryptMirror torrent files or links of CrococryptMirror on rapidshare.com, depositfiles.com, megaupload.com etc. All CrococryptMirror download links are direct CrococryptMirror download from publisher site or their selected mirrors.

CrococryptMirror freeware - The Latest User Reviews
CrococryptMirror freeware - The Latest Versions History
1.43a Jun 16, 2021 Minor Update Auto-Sync-Service fixed for Windows 10. For details go to the CrococryptMirror Homepage.
1.42 Feb 1, 2020 Minor Update Auto-Sync-Service fixed for Windows 10. For details go to the CrococryptMirror Homepage.
1.41 Apr 2, 2018 Minor Update Fix for Explorer View (WebDav) under Windows 10. For details go to the CrococryptMirror Homepage.

Most popular Encryption Tools freeware downloads

Speedcrypt

1.5 freeware download

... create secure Master Keys to be stored and encrypted with the Serpent engine. The List of Tests related to encryption, compression and file deletion is ...

ProxyCrypt

2.6.3 freeware download

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. ... made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and ...

Portable TrueCrypt

7.1a freeware download

... they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being ... copied to the TrueCrypt volume are automatically being encrypted on-the-fly (right before they are written to the ...

Free Text Encrypt

1.00 freeware download

... AES 256 bit encryption algorithm; - Easily copy encrypted messages to the clipboard and send via e-mail; - Absolutely Free software. ...

VSFileEncrypt

1.2.3.149 freeware download

... on different operating systems. For example, all files encrypted on Windows can be decrypted on Linux and Mac OS. ...

abylon READER

23.60.1 freeware download

... time the following file extensions are supported (Symmetrical Encrypted: CR2 / Asymmetrical Encrypted: CRP, PK7, P7M, VSP7, ASC, TBE / Signed: ...

5 freeware award

Rohos Mini Drive

3.0 freeware download

... file manager, which can be useful when the encrypted partition can't be read by the host computer. Operating Rohos Mini Drive is fairly straightforward. ...

OpenVPN Connect for iOS

3.6.0.4074 freeware download

OpenVPN Connect, developed by OpenVPN Technologies Inc., is a robust and versatile VPN client designed to provide secure and private internet access. As the official VPN ...

DiskCryptor

1.1.846.118 freeware download

... o Broad choice in configuration of booting an encrypted OS. Support for various multi-boot options. * ... external USB storage devices. o Option to create encrypted CD and DVD disks. * Full compatibility ...

OpenVPN

2.6.13 I001 freeware download

... that data transmitted through the VPN tunnel is encrypted and secure from prying eyes. This makes it an excellent tool for protecting sensitive information, whether ...