SteadyCrypt for Mac OS X 2.4 freeware

SteadyCrypt is a java-based open source encryption tool for quickly encrypting confidential files to prevent unauthorized usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to widely used TrueCrypt, but users who wont like to follow lengthy procedure in TrueCrypt to create encrypted containers. ...

Author Marvin Hoffmann & Jörg Harr
Released 2011-11-24
Filesize 29.10 MB
Downloads 522
OS Mac OS X
Installation Instal And Uninstall
Keywords file encryption, data crypter, encrypt information, encrypt, encryption, encryptor
Users' rating
(12 rating)
SteadyCrypt for Mac OS XEncryption ToolsMac OS X
SteadyCrypt for Mac OS X - encryption algorithm Freeware Download Notice

SteadyCrypt for Mac OS X Free Download - we do not host any SteadyCrypt for Mac OS X torrent files or links of SteadyCrypt for Mac OS X on rapidshare.com, depositfiles.com, megaupload.com etc. All SteadyCrypt for Mac OS X download links are direct SteadyCrypt for Mac OS X download from publisher site or their selected mirrors.

SteadyCrypt for Mac OS X freeware - The Latest User Reviews
SteadyCrypt for Mac OS X freeware - The Latest Versions History
2.4 Nov 24, 2011 New Release · Removed hibernate completly
· Minor performance improvement and Bug-Fixes
2 Feb 28, 2011 New Release · Take care of multiple files at a time or even chose complete folders
· Add folders to organize your encrypted files within the application
· Search for files that you have encrypted earlier and even save the result as a favorite
· A processbar now keeps you on track while encrypting or decrypting files or folders

Most popular Encryption Tools freeware downloads

Idea crypting module for BestCrypt

7.20 freeware download

... BestCrypt version 6.0b or newer. The module performs encryption using well-known IDEA algorithm. Works in Bestcrypt Environment in any Windows system.The ... and use the "Add.." button to add new encryption driver to the list of available drivers. The ...

logIQKey

2.0 freeware download

... and secure way. By using the logIQKey strong encryption, you data is really protected. You can even ... like any other file. It uses a non-reversible algorithm, this means that the password cannot be recovered, ...

5 freeware award

USB Flash Security

5.0.0 freeware download

Add encryption to USB Flash Drive on the market. It ... Drive from PC, it will lock automatically. [Automated encryption] AES encryption which is recognized by speedy and ...

5 freeware award

DiskCryptor

1.1.846.118 freeware download

... under GNU General Public License (GPLv3), which offers encryption of all disk partitions, including the system partition. ... data. Program features * Encryption of system and bootable partitions with pre-boot authentication. ...

Encrypting Safe

1.1 freeware download

... from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source ... Smart Phone Behind: Using Symmetric key Algorithm for Encrypting and Decrypting note Features: - ...

SteadyCrypt

2.4 freeware download

SteadyCrypt is a java-based open source encryption tool for quickly encrypting confidential files to prevent unauthorized usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to ...

SteadyCrypt x64

2.4 freeware download

SteadyCrypt x64 is a java-based open source encryption tool for quickly encrypting confidential files to prevent unauthorized usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to ...

SteadyCrypt for Mac OS X

2.4 freeware download

SteadyCrypt is a java-based open source encryption tool for quickly encrypting confidential files to prevent unauthorized usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to ...

BestCrypt Traveller

1.06 freeware download

... BestCrypt Traveller supports containers encrypted by any Encryption Algorithm and any Key Generator available in BestCrypt. ...

Cryptnos

1.3.3 freeware download

... and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, ... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, ...