ProxyCrypt 2.6.3 freeware

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. It works as a 'proxy' for the ImDisk driver, which is included in the full package. If you need to create encrypted spaces which can be partitioned like an ordinary hard drive, it is also compatible with Arsenal Image Mounter. ...

Author v77
Released 2022-03-06
Filesize 467 kB
Downloads 691
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation No Install Support
Keywords volume, encryption, imdisk, command line
Users' rating
(35 rating)
ProxyCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
ProxyCrypt - password Freeware Download Notice

ProxyCrypt Free Download - we do not host any ProxyCrypt torrent files or links of ProxyCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All ProxyCrypt download links are direct ProxyCrypt download from publisher site or their selected mirrors.

ProxyCrypt freeware - The Latest User Reviews
ProxyCrypt freeware - The Latest Versions History
2.6.3 Mar 6, 2022 Minor Update - updated driver to version 2.1.1 in full package
- updated MinGW from 10.2.1 to 11.2.1
2.6.2 Apr 29, 2021 Minor Update - added a sound ("bell" character) in case of password or hash file error
2.5.2 Aug 29, 2020 New Release - fix: write errors occurred when 64 threads were used for encryption; max number of threads is now 63 (appeared in 2.4.0)
- minimal new image file size is now 69 KB, because of a new requirement of imdisk driver 2.0.8 and later

Most popular Encryption Tools freeware downloads

Vov Password Generator

1.5 freeware download

Quickly generate passwords for your accounts, using any character set you ... this lightweight, minimalistic application. The widespread use of password managers has also increased the demand for password ...

SecExFile Home

1.1 freeware download

... once encryption is completed. + Easy to use, password based, intuitive + Strong 128/384 bit SecExMail cipher, incorporating 256 bit Twofish + Encrypt multiple files ...

ABC CHAOS

2.75 freeware download

ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For ...

CryptArchiver

3.1.0.0 freeware download

The popular award-winning choice for password-protecting files, folders and drives on all versions of ... Vista! It's really easy to hide, encrypt and password protect data with CryptArchiver. All you do is ...

Crypt4Free

5.67 freeware download

Crypt4Free (freeware) is files encryption software with ability to encrypt files and text messages. Support for ZIP files and ability to secure delete sensitive files. Skinnable ...

Encrypt Files

1.5 freeware download

... Files is free software to securely encrypt and password protect your confidential data. It is fast desktop ... system. With Encrypt Files you can encrypt and password protect both files and folders. ...

Pos Multimedia Privacy Keeper

1.31 freeware download

... Privacy Keeper allows you to encrypt and add password to most of standard photos, video and audio ... each view of the file will require the password to protect your privacy. Pos Multimedia Privacy Keeper ...

5 freeware award

logIQKey

2.0 freeware download

... uses a non-reversible algorithm, this means that the password cannot be recovered, as opposed to office, pdf, zip and other "password-secured" documents. This way your ...

5 freeware award

TrueCrypt

7.2 freeware download

... case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system. * Encryption algorithms: AES-256, Serpent, and Twofish. ...

File Encryption

2.1 freeware download

... which can be opened only after entering a password. File Encryption prevents unauthorised access to user's private data by using a military grade algorithms for ...