CrococryptMirror Portable 1.43b freeware

CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly. ...

Author Hissen IT
Released 2021-06-16
Filesize 30.26 MB
Downloads 601
OS Java, Win10 x32, Win10 x64, Win8 x32, Win8 x64, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP, Windows 7 x64, Windows Vista x64, Windows 8, Windows 10
Installation Install and Uninstall
Keywords encryption, file encryption, folder encryption, cloud encryption, cloud storage, aes, twofish, password, pbe, sha512, whirlpool, windows
Users' rating
(22 rating)
CrococryptMirror PortableEncryption ToolsJava, Win10 x32, Win10 x64, Win8 x32, Win8 x64, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP, Windows 7 x64, Windows Vista x64, Windows 8, Windows 10
CrococryptMirror Portable - stored Freeware Download Notice

CrococryptMirror Portable Free Download - we do not host any CrococryptMirror Portable torrent files or links of CrococryptMirror Portable on rapidshare.com, depositfiles.com, megaupload.com etc. All CrococryptMirror Portable download links are direct CrococryptMirror Portable download from publisher site or their selected mirrors.

CrococryptMirror Portable freeware - The Latest User Reviews
CrococryptMirror Portable freeware - The Latest Versions History
1.43b Jun 16, 2021 Minor Update Auto-Sync-Service fixed for Windows 10. For details go to the CrococryptMirror Homepage.
1.42 Feb 1, 2020 Minor Update Auto-Sync-Service fixed for Windows 10. For details go to the CrococryptMirror Homepage.
1.41 Apr 2, 2018 Minor Update Fix for Explorer View (WebDav) under Windows 10. For details go to the CrococryptMirror Homepage.

Most popular Encryption Tools freeware downloads

Speedcrypt

1.5 freeware download

... the user create secure Master Keys to be stored and encrypted with the Serpent engine. The List of Tests related to encryption, compression and file ...

Guardian Of Data

3.006 freeware download

... little storage space as possible and can be stored and shared in a compact form. To ensure that no sensitive data is left behind, the ...

AssureFiles Secure File Sharing

5.1.8.1 freeware download

... rights management, encryption keys and access policies are stored in the remote central server, so your data ... wherever you share them. Wherever your data is stored, on the cloud, on your laptop, on a ...

CryptArchiver

3.1.0.0 freeware download

... can only be accessed with a password. Files stored in this drive are automatically encrypted on-the-fly. Once loaded, the encrypted drive is like any other ...

Prot-On for Mac

1.5.3.25 freeware download

... accessed your files regardless of where they are stored. Protect your information and all of your documents: You can protect photos, MS Office and ...

Cryptnos

1.3.3 freeware download

... secure. Your master and generated passwords are NEVER stored, and the parameters to recreate your passwords are stored in an encrypted form. FEATURES Generates ...

TrueCrypt

7.2 freeware download

... file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt. ...

BestCrypt Traveller

1.06 freeware download

... A single BestCrypt Traveller executable can also be stored on a removable disk together with encrypted containers to access the data on any computer that ...

BoxCryptor for Android

2.122.1101 freeware download

... to hide any sensitive information hat might be stored in the name of a file or a folder. - App unlock PIN for additional security ...

VeraCrypt

1.26.15 freeware download

... is designed to provide robust security for data stored on various types of storage devices, ensuring that sensitive information remains inaccessible to unauthorized users. ...