CryptIt 1.4

Most file encryptors use methods that rely on the theory of ... work forever. CryptIt is designed to use XOR encryption on keys that are the same size as the file to be encrypted. CryptIt also has a ability to use removable media as a key code book and integrates with the key generator built into our program GigAlarm. ...

Author ACAPsoft
License Free To Try
Price $8.00
Released 2008-02-10
Downloads 640
Filesize 42 kB
Requirements
Installation Install and Uninstall
Keywords Encrypt, File, assembly, security, Sinner, vernam, one-time pad, XOR
Users' rating
(10 rating)
CryptItEncryption ToolsWindows 2000, Windows XP, Windows 2003, Windows Vista, Windows Vista x64, Windows Vista
CryptIt encrypt code - Download Notice

Using CryptIt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of CryptIt on rapidshare.com, depositfiles.com, megaupload.com etc. All CryptIt download links are direct CryptIt full download from publisher site or their selected mirrors.
Avoid: encrypt code oem software, old version, warez, serial, torrent, CryptIt keygen, crack.
Consider: CryptIt full version, encrypt code full download, premium download, licensed copy.

CryptIt encrypt code - The Latest User Reviews

Most popular Encryption Tools downloads

ArmorTools

25.8.1 download

... ArmorTools allows you to create secure virtual disks encrypted using AES128/AES256 algorithms, encrypt files and folder contents using any file as ... the following tools: Extra Disks, File Shredder, File Encryptor, Objects Eraser, System Tweaker. ArmorTools: Extra Disks is ...

New Version

ArmorTools Home x64

25.8.1 download

... ArmorTools allows you to create secure virtual disks encrypted using AES128/AES256 algorithms, encrypt files and folder contents using any file as ... the following tools: Extra Disks, File Shredder, File Encryptor, Objects Eraser, System Tweaker. ArmorTools: Extra Disks is ...

New Version

Active CHAOS

5.0 download

... a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can ... active public keys that anyone can use to encrypt messages. No other software is required. These active ...

Abacre File Encryptor

1.0 download

With Abacre File Encryptor you may encrypt any files or folders by using 39 advanced encryption algorithms (CAST, Blowfish, Twofish, Rijndael and others). Files maybe encrypted into either one single file either individually. It's ...

5 award

ArmorTools Pro

25.8.1 download

... Pro allows you to create secure virtual disks encrypted using AES128/AES256 algorithms, encrypt files and folder contents using any file as ... the following tools: Extra Disks, File Shredder, File Encryptor, Objects Eraser, Scan Files and Folders, Scan Registry ...

New Version

DiskCryptor

1.1.846.118 download

... under GNU General Public License (GPLv3), which offers encryption of all disk partitions, including the system partition. ... open-source software is the availability of its source code under one of the open source licenses. The ...

CryptSync

1.4.11.515 download

... by Stefan Küng, is a robust and user-friendly encryption tool designed to seamlessly integrate with your existing ... At its core, CryptSync operates by creating encrypted copies of your files, which can then be ...

Leawo SWF Encrypt for Mac

1.0.30 download

Leawo SWF Encrypt for Mac is a professional SWF encryption tool designed to protect Flash SWF files from ... files can be accomplished with this powerful SWF Encrypt Mac in several clicks. Various SWF encryption ways ...

EaseFilter Auto File Encryption

5.6.1.1 download

Atuo file encryption tool performs real-time I/O encryption and decryption of the files in any block data with 16 bytes. The encryption uses a 256 bits symmetric key to encrypt or decrypt the data with AES encryption algorithm. ...

Textcrypt

1.6 download

Text Encryption Application. Uses a costly method in-processing. The strength of the encryption is configurable, so it can be adapted according ... the size of the text to get appropriate encryption times (long enough to deter brute force attacks ...