Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1643)
- Business (3971)
- Communications (1197)
- Desktop (222)
- Development (607)
- Education (291)
- Games & Entertainment (731)
- Graphic Apps (698)
- Home & Hobby (108)
- Network & Internet (593)
- Security & Privacy (536)
- Servers (69)
- System Utilities (31267)
- Web Development (297)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
CrococryptMirror Portable 1.43b
Security & Privacy :: Encryption Tools
CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Additionally, a ZIP compression for storage space optimization is used. For reasons of performance the synchronization of source and destination folder is done in the background. A backup copy of the keyfiles has to be stored at a secure place. Without the keyfile the containers cannot be decrypted. In the portable version of CrococryptMirror keyfile and settings are stored together with the application folder. Hence, the complete application can be transported on an external storage device. Moreover, the folder "container" can be used to store portable containers. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly. Features: Copying and synchronizing of files/folders/directories (recursive) to encrypted folders, Encryption of filenames, Source folders can be stored in multiple destination containers at the same time (e.g., USB disk drive and Cloud storage), Network drives can be used as sources and destinations, Explorer view to read encrypted containers. CrococryptMirror is a free software without registration, without activation, without limitations and without ads.
Specifications:
Version: 1.43b |
Download
|
Similar Products:
Security & Privacy :: Encryption Tools
A professional system for licensing and protecting executable files for Windows. The Enigma Protector is an essential tool for every developer of commercial software and shareware for Windows. The Enigma Protector includes a wide range of unique features aimed at protecting executable files from illegal copying, hacking, modification, and analysis. The supported formats include almost all types of 32- and 64-bit executable files.
Windows | Demo
Read More
ARMORTOOLS PROFESSIONAL 24.10.1
Security & Privacy :: Encryption Tools
ArmorTools Professional is a set of tools that expands the capabilities of the MS Windows operating system in the field of security and protection of user confidential information. ArmorTools allows you to create secure virtual disks encrypted using AES128/AES256 algorithms, encrypt files and folder contents using any file as a password. ArmorTools removes traces of the user's work on the computer, clears the history of visiting sites...
Windows | Shareware
Read More
System Utilities :: File Compression
Who knew file compression could be so quick and easy? The world?s most popular zip utility, WinZip®, now includes 4 brand-new WinZip Pro apps that provide streamlined tools including a better PDF reader, image management, secure file backup, and expanded sharing. With a few simple clicks, our latest features allow you to combine and export files faster, add a watermark to your images, and keep a safe copy of your files in the Cloud.
Windows | Shareware
Read More
Security & Privacy :: Encryption Tools
Need a military grade file encryption software? Would you like to delete (shred) files and be 100% sure they can't be "undeleted"? How about protecting data stored with removable drives? File Encryption XP does all that and more! File Encryption XP is password protection software for Windows. Files are encrypted with hack-proof Blowfish algorithm. This tool works with USB drives, flash memory cards, HDDs, ZIP drives, and works with any Windows PC
Windows | Shareware
Read More