ProxyCrypt 2.6.3

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. It works as a 'proxy' for the ImDisk driver, which is included in the full package. If you need to create encrypted spaces which can be partitioned like an ordinary hard drive, it is also compatible with Arsenal Image Mounter. ...

Author v77
License Freeware
Price FREE
Released 2022-03-06
Downloads 253
Filesize 467 kB
Requirements - ImDisk or Arsenal Image Mounter - Administrative privileges - CPU with SSE2
Installation No Install Support
Keywords volume, encryption, imdisk, command line
Users' rating
(24 rating)
ProxyCryptEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
ProxyCrypt serpent - Download Notice

Using ProxyCrypt Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of ProxyCrypt on rapidshare.com, depositfiles.com, megaupload.com etc. All ProxyCrypt download links are direct ProxyCrypt full download from publisher site or their selected mirrors.
Avoid: serpent oem software, old version, warez, serial, torrent, ProxyCrypt keygen, crack.
Consider: ProxyCrypt full version, serpent full download, premium download, licensed copy.

ProxyCrypt serpent - The Latest User Reviews

Most popular Encryption Tools downloads

BestCrypt Volume Encryption

5.12.7 download

... a variety of strong encryption algorithms, including AES, Serpent, and Twofish. This flexibility allows users to choose the level of security that best fits their needs. 4. **Compatibility**: BestCrypt ...

Aloaha Crypt Disk

6.0.16 download

... with second smart card - Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Requirements - Windows XP, Vista, 2008, 7, 8, 2008(r2), 2012 - Encryption Certificate ...

BestCrypt Volume Encryption

5.12.3 download

... utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes. By working with volumes, Jetico's disk encryption is the best ...

TrueCrypt

7.2 download

... hidden operating system. * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. ...

DiskCryptor

1.1.846.118 download

... Choice to select an encryption algorithm (AES, Twofish, Serpent), including their combinations. * Full support for external storage devices. o Full support for encryption of external USB storage devices. ...

VeraCrypt

1.26.15 download

... core, VeraCrypt offers advanced encryption algorithms, including AES, Serpent, and Twofish, either individually or in combination, to create a virtually impenetrable barrier around your data. The software enhances the security ...

Paranoia Text Encryption for PC

15.0.4 download

... strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. A steganography ...

S.S.E. File Encryptor for Mac

15.0.6 download

... strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. Cross-Platform (Windows, ...

VeraCrypt Portable

1.26.20 Rev 3 download

... a wide range of encryption algorithms, including AES, Serpent, and Twofish, allowing users to choose the level of security that best suits their needs. The user interface of VeraCrypt ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... SAFER, 3-WAY, GOST, SHARK, SQUARE, SKIPJACK, TWOFISH, MARS, SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to ...