CryptIt 1.4

... work forever. CryptIt is designed to use XOR encryption on keys that are the same size as ... ability to use removable media as a key code book and integrates with the key generator built into our program GigAlarm. ...

Author ACAPsoft
License Free To Try
Price $8.00
Released 2008-02-10
Downloads 640
Filesize 42 kB
Requirements
Installation Install and Uninstall
Keywords Encrypt, File, assembly, security, Sinner, vernam, one-time pad, XOR
Users' rating
(10 rating)
CryptItEncryption ToolsWindows 2000, Windows XP, Windows 2003, Windows Vista, Windows Vista x64, Windows Vista
CryptIt code encryption - Download Notice

Using CryptIt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of CryptIt on rapidshare.com, depositfiles.com, megaupload.com etc. All CryptIt download links are direct CryptIt full download from publisher site or their selected mirrors.
Avoid: code encryption oem software, old version, warez, serial, torrent, CryptIt keygen, crack.
Consider: CryptIt full version, code encryption full download, premium download, licensed copy.

CryptIt code encryption - The Latest User Reviews

Most popular Encryption Tools downloads

ArmorTools

25.8.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

New Version

ArmorTools Home x64

25.8.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

New Version

ArmorTools Pro

25.8.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

New Version

Abacre File Encryptor

1.0 download

... any files or folders by using 39 advanced encryption algorithms (CAST, Blowfish, Twofish, Rijndael and others). Files ... individually. It's also possible to compress files during encryption so the resulting file size will be even ...

5 award

DiskCryptor

1.1.846.118 download

... under GNU General Public License (GPLv3), which offers encryption of all disk partitions, including the system partition. ... open-source software is the availability of its source code under one of the open source licenses. The ...

The Enigma Protector x64

7.90 download

... key generator for your software. Various methods of code obfuscation, mutation and virtualization will help protect your application from hacking, modifying, disassembling, illegal retrieval of unique functions and data, etc. ...

New Version

CryptSync

1.4.11.515 download

... by Stefan Küng, is a robust and user-friendly encryption tool designed to seamlessly integrate with your existing ... chosen cloud service. CryptSync uses strong AES-256 encryption, a widely recognized standard that provides robust protection ...

EaseFilter Auto File Encryption

5.6.1.1 download

Atuo file encryption tool performs real-time I/O encryption and decryption of the files in any block data with 16 bytes. The encryption uses a 256 bits symmetric key to encrypt or decrypt the data with AES encryption algorithm. Atuo file encryption protects data 'at rest', ...

Textcrypt

1.6 download

Text Encryption Application. Uses a costly method in-processing. The strength of the encryption is configurable, so it can be adapted according ... the size of the text to get appropriate encryption times (long enough to deter brute force attacks ...

ArmorTools

25.8.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

New Version