The program for the protection of data Files Crypto

Affiliates: 0,28 $how to earn
Pay with:
i agree with "Terms for Customers"
Trial version: download
Sold: 0
Uploaded: 13.10.2004
Content: files_crypto.exe 108 kB

Product description

Program file encryption Files Crypto 1.0

The program is designed for organizations and individuals who do not want their confidential information (or information that they consider confidential) fell into the wrong hands. The program used is resistant to cracking the block encryption algorithm. The program works in different modes:
- File encryption;
- File encryption with subsequent archiving;
- Decrypt files;
- File decompression and decryption.

There are now a great number of programs designed to encrypt data in various formats, because now the information - one of the most important forms of ownership. Programs of this kind are used for data transfer via e-mail, stored on any storage media for a limited number of people, etc. Generally, the range of applications of this type of software is constantly growing. The proposed program runs on the basis of one of the most stable in the moment of encryption algorithms. The algorithm uses a 256-bit key and the volume key space is 1.1579208923731619542357098500869e + 77. None of the currently existing or proposed to be implemented in the near future, the electronic device can not find the key for a time less than many hundreds of years. Backing up data is based on modifications of the algorithm LZ, the algorithm on which work all popular compression types Zip, Rar, and so on.

The demo version of the program Files Crypto 1.0 can be downloaded at In this version there is a restriction on the amount of data to be encrypted. The program encrypts and backs up only 1 megabyte file them. When purchasing products this restriction is removed.


No feedback yet.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)