Portable TrueCrypt 7.1a freeware

TrueCrypt is a software designed to protect your important data by encrypting it. It can also maintain an on-the-fly-encrypted volume (data storage device). Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). ...

Author TrueCrypt Foundation
Released 2012-02-08
Filesize 2.30 MB
Downloads 1084
OS Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64, Linux, Mac OS X
Installation Instal And Uninstall
Keywords disk encryptor, virtual disk creator, data encryptor, encryptor, decryptor, encrypt
Users' rating
(19 rating)
Portable TrueCryptEncryption ToolsWindows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64, Linux, Mac OS X
Portable TrueCrypt - twofish Freeware Download Notice

Portable TrueCrypt Free Download - we do not host any Portable TrueCrypt torrent files or links of Portable TrueCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All Portable TrueCrypt download links are direct Portable TrueCrypt download from publisher site or their selected mirrors.

Portable TrueCrypt freeware - The Latest User Reviews
Portable TrueCrypt freeware - The Latest Versions History
7.1a Feb 8, 2012 New Release New features:
· Full compatibility with 64-bit and 32-bit Mac OS X 10.7 Lion
7.1 Sep 2, 2011 New Release New features:
· Full compatibility with 64-bit and 32-bit Mac OS X 10.7 Lion

Bug fixes:
· Minor bug fixes
7.0a Jul 26, 2010 New Release Improvements:
· Workaround for a bug in some custom (non-Microsoft) drivers for storage device controllers that caused a system crash when initiating hibernation on TrueCrypt-encrypted operating systems.

Bug fixes:
· Minor bug fixes

Most popular Encryption Tools freeware downloads

S.S.E. File Encryptor for PC

15.0.6 freeware download

... (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. Cross-Platform ...

TrueCrypt

7.2 freeware download

... system. * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. ...

Paranoia Text Encryption for Mac

15.0.4 freeware download

... (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. A ...

SSuite Agnot StrongBox Security

2.2.2.2 freeware download

... your most precious private information. There is BlowFish, TwoFish, CAST-128, Cast-256, DES, 3DES, ICE, Thin ICE, ICE2, IDEA, MARS, Misty1, RC2, RC4, RC5, RC6, Rijndael(AES), ...

5 freeware award

S.S.E. File Encryptor for Mac

15.0.6 freeware download

... (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. Cross-Platform ...

Paranoia File & Text Encryption

15.0.8 freeware download

... (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit. Fully compatible with Paranoia Text Encryption for iOS (iPhone/iPad/iPod) and Secret Space Encryptor ...

SecExFile Home

1.1 freeware download

... Strong 128/384 bit SecExMail cipher, incorporating 256 bit Twofish + Encrypt multiple files and folders into a single encrypted archive + Known plain text attack ...

Crypto Anywhere

1.1 freeware download

... algorithms based on RSA public key encryption, the Twofish block cipher and the ISAAC random number generator. Crypto Anywhere e-mail is compatible with SecExMail client ...

Aloaha Crypt Disk

6.0.170 freeware download

... smart card - Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Requirements - Windows XP, Vista, 2008, 7, 2008r2 - Licensed Aloaha Cardconnector ...

VeraCrypt

1.26.15 freeware download

... offers advanced encryption algorithms, including AES, Serpent, and Twofish, either individually or in combination, to create a virtually impenetrable barrier around your data. The software ...