CrococryptMirror Portable 1.43b freeware

... encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by ... HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly. ...

Author Hissen IT
Released 2021-06-16
Filesize 30.26 MB
Downloads 601
OS Java, Win10 x32, Win10 x64, Win8 x32, Win8 x64, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP, Windows 7 x64, Windows Vista x64, Windows 8, Windows 10
Installation Install and Uninstall
Keywords encryption, file encryption, folder encryption, cloud encryption, cloud storage, aes, twofish, password, pbe, sha512, whirlpool, windows
Users' rating
(22 rating)
CrococryptMirror PortableEncryption ToolsJava, Win10 x32, Win10 x64, Win8 x32, Win8 x64, Windows 7 x32, Windows 7 x64, Windows Vista, Windows Vista x64, Windows XP, Windows 7 x64, Windows Vista x64, Windows 8, Windows 10
CrococryptMirror Portable - twofish Freeware Download Notice

CrococryptMirror Portable Free Download - we do not host any CrococryptMirror Portable torrent files or links of CrococryptMirror Portable on rapidshare.com, depositfiles.com, megaupload.com etc. All CrococryptMirror Portable download links are direct CrococryptMirror Portable download from publisher site or their selected mirrors.

CrococryptMirror Portable freeware - The Latest User Reviews
CrococryptMirror Portable freeware - The Latest Versions History
1.43b Jun 16, 2021 Minor Update Auto-Sync-Service fixed for Windows 10. For details go to the CrococryptMirror Homepage.
1.42 Feb 1, 2020 Minor Update Auto-Sync-Service fixed for Windows 10. For details go to the CrococryptMirror Homepage.
1.41 Apr 2, 2018 Minor Update Fix for Explorer View (WebDav) under Windows 10. For details go to the CrococryptMirror Homepage.

Most popular Encryption Tools freeware downloads

S.S.E. File Encryptor for PC

15.0.6 freeware download

... (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. Cross-Platform ...

TrueCrypt

7.2 freeware download

... system. * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. ...

Paranoia Text Encryption for Mac

15.0.4 freeware download

... (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. A ...

SSuite Agnot StrongBox Security

2.2.2.2 freeware download

... your most precious private information. There is BlowFish, TwoFish, CAST-128, Cast-256, DES, 3DES, ICE, Thin ICE, ICE2, IDEA, MARS, Misty1, RC2, RC4, RC5, RC6, Rijndael(AES), ...

5 freeware award

S.S.E. File Encryptor for Mac

15.0.6 freeware download

... (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. Cross-Platform ...

Paranoia File & Text Encryption

15.0.8 freeware download

... (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit. Fully compatible with Paranoia Text Encryption for iOS (iPhone/iPad/iPod) and Secret Space Encryptor ...

SecExFile Home

1.1 freeware download

... Strong 128/384 bit SecExMail cipher, incorporating 256 bit Twofish + Encrypt multiple files and folders into a single encrypted archive + Known plain text attack ...

Crypto Anywhere

1.1 freeware download

... algorithms based on RSA public key encryption, the Twofish block cipher and the ISAAC random number generator. Crypto Anywhere e-mail is compatible with SecExMail client ...

Aloaha Crypt Disk

6.0.170 freeware download

... smart card - Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Requirements - Windows XP, Vista, 2008, 7, 2008r2 - Licensed Aloaha Cardconnector ...

VeraCrypt

1.26.15 freeware download

... offers advanced encryption algorithms, including AES, Serpent, and Twofish, either individually or in combination, to create a virtually impenetrable barrier around your data. The software ...