ProxyCrypt 2.6.3

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. It works as a 'proxy' for the ImDisk driver, which is included in the full package. If you need to create encrypted spaces which can be partitioned like an ordinary hard drive, it is also compatible with Arsenal Image Mounter. ...

Author v77
License Freeware
Price FREE
Released 2022-03-06
Downloads 253
Filesize 467 kB
Requirements - ImDisk or Arsenal Image Mounter - Administrative privileges - CPU with SSE2
Installation No Install Support
Keywords volume, encryption, imdisk, command line
Users' rating
(22 rating)
ProxyCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
ProxyCrypt disk read - Download Notice

Using ProxyCrypt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of ProxyCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All ProxyCrypt download links are direct ProxyCrypt full download from publisher site or their selected mirrors.
Avoid: disk read oem software, old version, warez, serial, torrent, ProxyCrypt keygen, crack.
Consider: ProxyCrypt full version, disk read full download, premium download, licensed copy.

ProxyCrypt disk read - The Latest User Reviews

Most popular Encryption Tools downloads

Aloaha Crypt Disk

6.0.16 download

Features - Creates a virtual encrypted disk within a file and mounts it as a real disk - Encryption is automatic, real-time (on-the-fly) and transparent - Parallelization and pipelining allow data to be read and written as fast as if the drive ...

TrueCrypt

7.2 download

... just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are ... decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. ...

Cryptainer LE Gratis Encryptie Software

9.2.0 download

Cryptainer LE Tototally free 128 bit disk encryption software. Simple, easy to use encryption application ... protect data on USB Drives, Mobile Devices, Flash Disks, Pen Drives, CDs and HDDs. Cryptainer LE ensures ...

KakaSoft Shared Folder Protector

6.40 download

... individuals. This approach ensures only authorized users can read or modify files, fulfilling requirements for separation of ... Settings custom permessions for different user group,such as read-only permission, write-only permission. Rapid Deployment Process: After installing ...

Cryptainer Pro Encryption Software

17.0.2.0 download

... A single password allows access to the virtual disk, thereby eliminating the need to remember separate passwords ... a standard windows drive. The files can be read, viewed, modified, as well as moved from one ...

ShareCrypt

2.1 download

... additional passwords. Everyone with a valid password can read or write data on the encrypted shared disk even simultaneously ...

Best Folder Encryptor

16.97 download

... system security and optimization settings, disabling USB devices, read-only use of USB drives and removable drives, etc. ...

GiliSoft File Lock Pro

13.9 download

... and client password system. 3. Protecting Files/Folders/Drives: Enable read-only access to files while preventing any alterations or ... Folder/Disk Monitoring: Keep track of changes in specified disks or folders, monitoring any operations carried out by ...

east-tec SafeBit

2.1 download

... features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, ... Data is decrypted automatically during the transfer from disk to memory, and re-encrypted when data is written ...

Best Encryption Expert

12.03 download

... devices, set USB drives and removable drives as read-only, system garbage cleanup, system security and optimization settings, etc. ...