DiskCryptor 1.1.846.118 freeware

DiskCryptor is the only truly free solution, provided under GNU General Public License (GPLv3), which offers encryption of all disk partitions, including the system partition. The main criteria for open-source software is the availability of its source code under one of the open source licenses. The only open-source alternative to DiskCryptor that has comparable features is TrueCrypt. ...

Author ntldr
Released 2016-05-27
Filesize 1004 kB
Downloads 1079
OS Windows 2000, Windows 2003, Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64
Installation Instal And Uninstall
Keywords disk partition encryption, encrypt partition, disk encryptor, encrypt, decrypt, encryption
Users' rating
(27 rating)
DiskCryptorEncryption ToolsWindows 2000, Windows 2003, Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64
DiskCryptor - serpent Freeware Download Notice

DiskCryptor Free Download - we do not host any DiskCryptor torrent files or links of DiskCryptor on rapidshare.com, depositfiles.com, megaupload.com etc. All DiskCryptor download links are direct DiskCryptor download from publisher site or their selected mirrors.

DiskCryptor freeware - The Latest User Reviews
DiskCryptor freeware - The Latest Versions History
1.1.846.118 May 27, 2016 New Release Improved: More accurate handling writing of the volume header. Reduced risk of data loss in the encryption process.
Fixed: Small Windows 8 compatibility bugfixes.
1.0.757.115 Jan 7, 2013 New Release · Added workaround for AES-NI support on Hyper-V
· Added internal self-tests for PKDBF2 and XTS engines.
· Fixed bug with data loss with some cases on VIA-PadLock.
· Fixed regression with SSD detection on Windows XP.
· Fixed bug with no FS creation when formatting from GUI.
1.0.744.115 Jan 3, 2013 New Release · Project moved to Visual Studio 2010
· Improved: 3tb+ disks detection.

Most popular Encryption Tools freeware downloads

Speedcrypt

1.5 freeware download

... Keys to be stored and encrypted with the Serpent engine. The List of Tests related to encryption, compression and file deletion is also available. The ...

DiskCryptor

1.1.846.118 freeware download

... Choice to select an encryption algorithm (AES, Twofish, Serpent), including their combinations. * Full support for external storage devices. o Full support for encryption ...

Aloaha Crypt Disk

6.0.170 freeware download

... with second smart card - Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Requirements - Windows XP, Vista, 2008, 7, 2008r2 - Licensed ...

Portable TrueCrypt

7.1a freeware download

... hidden operating system. * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. ...

S.S.E. File Encryptor for PC

15.0.6 freeware download

... strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ...

PCTuneUp Free File Encryptor

5.1.7 freeware download

... hash. You can combine 3DES, Blowfish, Rijndael DES, Serpent etc. from cipher with Haval, MD4, MD5, SHA1, Tiger, etc. from hash to build an uncrackable ...

S.S.E. File Encryptor for Mac

15.0.6 freeware download

... strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ...

Paranoia File & Text Encryption

15.0.8 freeware download

... strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit. Fully compatible with Paranoia Text Encryption for iOS (iPhone/iPad/iPod) ...

TrueCrypt

7.2 freeware download

... hidden operating system. * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. ...

VeraCrypt

1.26.15 freeware download

... core, VeraCrypt offers advanced encryption algorithms, including AES, Serpent, and Twofish, either individually or in combination, to create a virtually impenetrable barrier around your data. ...