ProxyCrypt 2.6.3

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. It works as a 'proxy' for the ImDisk driver, which is included in the full package. If you need to create encrypted spaces which can be partitioned like an ordinary hard drive, it is also compatible with Arsenal Image Mounter. ...

Author v77
License Freeware
Price FREE
Released 2022-03-06
Downloads 244
Filesize 467 kB
Requirements - ImDisk or Arsenal Image Mounter - Administrative privileges - CPU with SSE2
Installation No Install Support
Keywords volume, encryption, imdisk, command line
Users' rating
(22 rating)
ProxyCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
ProxyCrypt command - Download Notice

Using ProxyCrypt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of ProxyCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All ProxyCrypt download links are direct ProxyCrypt full download from publisher site or their selected mirrors.
Avoid: command oem software, old version, warez, serial, torrent, ProxyCrypt keygen, crack.
Consider: ProxyCrypt full version, command full download, premium download, licensed copy.

ProxyCrypt command - The Latest User Reviews

Most popular Encryption Tools downloads

FileHash

5.3.0.1281 download

... **Command Line Support**: For advanced users, FileHash offers command line support, enabling automation and integration into scripts or larger workflows. This feature enhances the software’s flexibility and adaptability to different ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... key is used to decrypt the message. AEP Command Line Tool has support for all RSA alg. ... has 10 nice additional skins. Complete support for Command Line Interface. Support for USB Flash Drives to ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... key is used to decrypt the message. AEP Command Line Tool has support for all RSA alg. ... has 10 nice additional skins. Complete support for Command Line Interface. Support for USB Flash Drives to ...

Secure IT Encryption Software

17.0.2.0 download

Cypherix's SecureIT File and Folder Encryption Software is an easy to use, feature packed program that protects all your files and folders using 448-bit strong Blowfish encryption. It includes a powerful, ...

Safeguard Enterprise PDF DRM

5.0.40 download

... manual input or user intervention) using our PDF command line protection utility, and Locklizard PDF DRM Security can be integrated with your existing ecommerce system to help provide 24x7 delivery ...

VSFileHash

1.0.3.121 download

... (Ubuntu and others). VSFileHash can be called with command line parameters. ...

TekCERT

2.7.3 download

... be configured through TekCERT GUI and from the command line interface. You can browse, export and delete ... certificate store through TekCERT GUI and from the command line interface. Built-in SCEP server (SP License is ...

AIMPasswordDecryptor

5.0 download

... comes with both GUI interface as well as command-line version in the single tool making it useful ... Comes with both GUI interface as well as Command-line version in one tool · Recover password of ...

Terminal Password Manager

0.14.23b download

**Terminal Password Manager: A Robust Solution for Command Line Enthusiasts** Developed by Rick Scorpio, Terminal Password Manager (TPM) is a streamlined, command-line based password management tool designed for users who ...

Tor (Expert Bundle)

14.0.7 download

... Browser, the Expert Bundle operates primarily through a command-line interface. This feature is particularly appealing to tech-savvy ... have a solid understanding of network protocols and command-line operations. Its flexibility and integration capabilities make it ...