CryptoNG is stable, reliable, and easy to operate file encryption software for personal and professional security. It allows you to protect the privacy of sensitive files by encrypting them with AES-GCM 256-bit authenticated encryption algorithm which simultaneously provides both data authenticity (integrity) and confidentiality. AES-GCM is the best performing authenticated encryption combination. GCM can detect both accidental modifications of the data and intentional, unauthorized modifications. This makes the encryption very secure. What is authenticated encryption? Authenticated encryption, is the process of both encrypting and authenticating data. The process will associate an authenticator, also known as a tag, with the data. Plain text is transformed into cipher text with an authenticator. When it comes time to decrypt the data, the cipher text is validated using the tag. Main features: * Encrypting and decrypting files of any type on any media using the AES-256 bit key length algorithm in Galois/counter chaining mode (GCM). * Hashing files (SHA-256 algorithm). SHA-256 is one of the strongest hash functions available. * Permanently wiping files. Three pass overwriting algorithm: first pass - with zeroes, second pass - with ones and the last pass with random bytes. * Large files (4GB and more) support. * Works with multiple files. * No unencrypted temporary files ever created. * No encryption passwords are saved within the encrypted files. * The software does not include any backdoor. No one will be able to get access to the encrypted data. Hence, do not forget your password. * Microsoft Windows 7 and 8 compatible. * Available in 32-bit and 64-bit versions. * Friendly interface, easy to operate. * All user settings are automatically saved. * Does not allow multiple instances. * Guaranteed high speed. * The program does not contain any form of malware (such as spyware, adware, viruses, trojans and backdoors).
Other Windows Software of Developer «Vassil Arabadjiev»:
CryptoNG (32-bit) CryptoNG is stable, reliable, and easy to operate file encryption software for personal and professional security. It allows you to protect the privacy of sensitive files by encrypting them with AES-GCM 256-bit authenticated encryption algorithm which simu
RawPrint RawPrint is a tool for sending text files (*.txt, *.prn) directly to a Windows printer, bypassing the printer driver. In this case printer drivers formatting routines are ignored. The main purpose of RawPint is to be used as a printing tool for text editor
RawPrint (64-bit) RawPrint is a tool for sending text files (*.TXT and *.PRN) directly to a Windows printer, bypassing the printer driver. In this case printer drivers formatting routines are ignored. The main purpose of RawPint is to be used as a printing tool for text edi
ShredIT Whether you're looking to destroy company records, credit card details or personal correspondence, ShredIT offers a simple, effective answer. With 4 different methods of shredding, to provide different levels of security and recovery provention, ShredIT is
Web Surfer Watcher Record which Web sites have been viewed on your computer. Web Surfer Watcher operates hidden in the background, recording Web site titles and URLs (addresses) of Web sites viewed using Internet Explorer or America Online. The program can record only the ti
Link Advisor CallingID Link Advisor is a safe browsing solution that checks links in a browser, email and instant messenger before you follow them, encourages you to deal with reputable sites and to avoid questionable and fraud sites. When the mouse is placed over a li
HydraCrypt HydraCrypt allows to Encrypt/Decrypt standard Ascii256 by randomly converting it to a string of numbers. The string of numbers is created using a specified password. This password can be any length the users desires. HydraCrypt also allows Encryption/Decry
Program Sentry Program Sentry provides computer-access control and usage management. It allows you to create either a list of blocked programs or of allowed programs. In the blocked programs mode, any program on the list you create is blocked. In the allowed programs mod
SecureCD Creator KernSafe SecureCD Creator is an advanced and powerful, full-featured CD encryption software. Create, edit, modify iso9660 files, and mount to virtual CD-ROM emulator or burning into a password protected CDs. CDR is the best choice for offline digital backu
Cryptola Cryptola is a powerful yet easy-to-use file encryption tool for Windows XP and Vista. Cryptola uses cryptographic technology designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. I wrote
iPig Server PRO Edition Set up a VPN server in less than 1 minute. Free client software. iPig creates a secure tunnel that protects your inbound and outbound communications (Email, Web, IM, VOIP, calls, FTP) at any Wi-Fi hotspot or wired network. iPig works with any kind of Inter
CryPteR CryPteR, is a very small and portable Application / Tool that allows Texts/Messages to be easily Encrypted or Un-Encrypted in no Time.
Tested in Windows 7 and 8! (may work in Xp, Vista and 10).
The application is very small and it is portable, you ca
Windows NT Invalid RDP Data Memory Leak Vulnerability The Windows 2000 Terminal Service and Windows NT 4.0 Terminal Server Edition contains a memory leak in one of the functions that processes incoming Remote Data Protocol data via port 3389. Each time an RDP packet containing a specific type of malformation
Supported Operating Systems:
Windows 7 |
Windows 8 |
Comments on CryptoNG (64-bit):
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10