Cryptnos 1.3.3 freeware

... and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, seemingly random yet completely repeatable. ...

Author Jeffrey T. Darlington
Released 2016-01-14
Filesize 911 kB
Downloads 743
OS Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64
Installation Instal And Uninstall
Keywords password generator, generate password, cryptographic hash, password, generator, hash
Users' rating
(24 rating)
CryptnosEncryption ToolsWindows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64
Cryptnos - encryption algorithm Freeware Download Notice

Cryptnos Free Download - we do not host any Cryptnos torrent files or links of Cryptnos on rapidshare.com, depositfiles.com, megaupload.com etc. All Cryptnos download links are direct Cryptnos download from publisher site or their selected mirrors.

Cryptnos freeware - The Latest User Reviews
Cryptnos freeware - The Latest Versions History
1.3.3 Jan 14, 2016 New Release Fixed Issue #8, where Cryptnos supposedly lost all settings on systems with tighter security policies. This appeared to be an issue with the mutex that was supposed to force only one copy of the program to be running at a time.
Implemented Issue #10, adding several hot key combinations, including the requested “keep on top” hot key.
Changed generated password box text to a monospace font to make similar-looking characters easier to distinguish.
Enhanced update checking code and added more error checking during start-up.
1.3.1 Apr 26, 2012 New Release
1.3.0 Feb 10, 2012 New Release

Most popular Encryption Tools freeware downloads

Idea crypting module for BestCrypt

7.20 freeware download

... BestCrypt version 6.0b or newer. The module performs encryption using well-known IDEA algorithm. Works in Bestcrypt Environment in any Windows system.The ... and use the "Add.." button to add new encryption driver to the list of available drivers. The ...

logIQKey

2.0 freeware download

... and secure way. By using the logIQKey strong encryption, you data is really protected. You can even ... like any other file. It uses a non-reversible algorithm, this means that the password cannot be recovered, ...

5 freeware award

USB Flash Security

5.0.0 freeware download

Add encryption to USB Flash Drive on the market. It ... Drive from PC, it will lock automatically. [Automated encryption] AES encryption which is recognized by speedy and ...

5 freeware award

DiskCryptor

1.1.846.118 freeware download

... under GNU General Public License (GPLv3), which offers encryption of all disk partitions, including the system partition. ... data. Program features * Encryption of system and bootable partitions with pre-boot authentication. ...

Encrypting Safe

1.1 freeware download

... from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source ... Smart Phone Behind: Using Symmetric key Algorithm for Encrypting and Decrypting note Features: - ...

SteadyCrypt

2.4 freeware download

SteadyCrypt is a java-based open source encryption tool for quickly encrypting confidential files to prevent unauthorized usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to ...

SteadyCrypt x64

2.4 freeware download

SteadyCrypt x64 is a java-based open source encryption tool for quickly encrypting confidential files to prevent unauthorized usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to ...

SteadyCrypt for Mac OS X

2.4 freeware download

SteadyCrypt is a java-based open source encryption tool for quickly encrypting confidential files to prevent unauthorized usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to ...

BestCrypt Traveller

1.06 freeware download

... BestCrypt Traveller supports containers encrypted by any Encryption Algorithm and any Key Generator available in BestCrypt. ...

Cryptnos

1.3.3 freeware download

... and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, ... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, ...