DirCryptHide 1.58

Any number of folders with all subfolders (even on different drives) can be moved in a highly scripted Container file (created with TrueCrypt). This can be opened with password/USB-Device if needed. In this state you can work normal with the stored data, En/decryption is performed "on-the-fly", the data in the container will always be encrypted. ...

Author Gunnar Daehling
License Freeware
Price FREE
Released 2011-03-11
Downloads 540
Filesize 3.15 MB
Requirements Standard
Installation Install and Uninstall
Keywords Encryption, truecrypt, on the fly, hide folder, safe, tresor, container, hide, ordner, password, invisible, protect
Users' rating
(12 rating)
DirCryptHideEncryption ToolsWindows 7 x32, Windows 7 x64, Windows Vista, Windows XP
Our rating 5 award
DirCryptHide program protection - Download Notice

Using DirCryptHide Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of DirCryptHide on rapidshare.com, depositfiles.com, megaupload.com etc. All DirCryptHide download links are direct DirCryptHide full download from publisher site or their selected mirrors.
Avoid: program protection oem software, old version, warez, serial, torrent, DirCryptHide keygen, crack.
Consider: DirCryptHide full version, program protection full download, premium download, licensed copy.

DirCryptHide program protection - The Latest User Reviews

Most popular Encryption Tools downloads

GiliSoft File Lock Pro

13.7.1 download

... a protected folder inherit the same level of protection. It can also lock folders on USB drives ... exclude list to omit certain system files or programs from being locked and a log to record ...

Any File Encryptor

3.4.25 download

... a software designed for robust data encryption and protection. Here are the key features of this software ... end. Prevent Duplication: The software includes advanced copy protection technology to prevent unauthorized duplication of media files. ...

InTouch Lock

3.7 download

... being copied, removed or modified Prevent any program from launching NEW Lock out users from ... etc.) Quick activate and deactivate InTouch Lock protection Import/Export security profiles. It is extremely useful ...

5 award

File Encryption XP

1.7.395 download

... data stored with removable drives? File Encryption eXtra Protection (XP) does all that and more! File Encryption eXtra Protection (XP) is password protection software for Windows. Files are encrypted with hack-proof ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, in ... only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of ...

Easy File Protector

5.134 download

... and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, in ... only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of ...

abylon BASIC

23.60.1 download

The protection of your sensitive data is often disregarded. But ... an automatically overwrite mechanism (Shredder-Level adjustable). Also the program offer a CRYPT-ASSISTANT and a surface for compressed ZIP-files. For professional ...

ArmorTools

25.5.1 download

... operating system in the field of security and protection of user confidential information. ArmorTools allows you to ... file using a wallpaper image or the Calculator program as a key. Having transferred the information to ...

ViewPoint

5.01 download

... to conceal confidential pictures, he can use various programs for protection. Meanwhile these programs do not allow use of the concealed data ... as you can with normally unprotected files. Our program is not available obviously. It is hidden inside ...

5 award