Portable CryptoLock
- Downloads:
- Views:
- Rating:

CryptoLock provides quick and easy encryption for all of your files. The easy to use interface allows you to simply drag and drop your files between CryptoLock and Windows Explorer to add or extract files from an encrypted archive.
Files stored in a CryptoLock Encrypted Archive are first compressed to save space and then encrypted with the password you provided. The whole process is done behind the scenes and only requires you to provide the password to use and the files to encrypt, CryptoLock does all the rest. The only way to retrieve the files from the encrypted archive is with the correct password, your files are locked away from prying eyes.
When you need to access the documents stored in your encrypted archive, you just open the archive with CryptoLock and extract them back to your PC. Opening the archive will of course require you to enter the password you provided to encrypt the files.
Then you can use drag and drop to extract a file, or group of files from the archive to your Desktop or any other folder in Windows Explorer. Don't want to use drag and drop? CryptoLock supports full copy and paste functionality and provides toolbar and menu items for extracting the selected files, or groups of files to a specific directory.
Here are some key features of "Portable CryptoLock":
* Data within the encrypted archive can not be viewed without a valid password.
* Drag and Drop interface allows for encryption and decryption of files and entire directories.
* Choose from 6 different encryption methods and 2 different compression methods.
* Create Self Extracting Archives which can be decrypted on any Microsoft Windows based computer without installing CryptoLock on the destination computer.
* Encryption and Compression methods can be disabled by network administrators to ensure CryptoLock will only allow creation of archives that adhere to your network security policies.
Free download from Shareware Connection - CryptoLock provides quick and easy encryption for all of your files
Version: 1.0.0.959 | Size: 1751 KB | Platform: Win2000, WinOther, WinVista
Released Date: | Rating: 0 | Title: Portable CryptoLock
Author Url: http://www.rtsz.com
Program Info Url: http://www.rtsz.com
Download Url: http://support.rtsz.com/downloads/cryptolock/CryptoLock_Setup.exe
Cryptainer LE Gratis Encryptie Software
Hotspot Shield Elite
Folder Lock Free
SmartHide
Folder Password Expert
Touch Hider for S60 E5/Symbian ^3
Touch Crypto for S60 E5
Touch Hider for S60 E3
GiliSoft USB Stick Encryption
CryptoForge
Touch Crypto for S60 E5/Symbian^3
USB Encryptor
imlSoft USB Disk Guard
File Encryption XP
Recover Lost Files Pro - Recover Lost Files ( Recommended by Microsoft(R) ). How to recover lost files? Recover deleted files with the lost file recovery software, Recommended by Microsoft(R) Corporation. Recover Lost Files - Download software at Recover-Lost-Files.org !
How to Organize Music Files - How to Organize Music Files - now with new technologies it is clear how to organize music files. Special tool, designed by our programmers will show how to organize music files automatically! Learn how to organize music files.
Password Angel - Password Angel is an elegant solution to a problem of storage, structuring, and protection of sensitive data. Super-secure encryption (AES 256-bit) of the password database. Just one master password. Excellent password manager.
Recover Files from Recycle bin - Recover Files from Recycle bin - How to recover files from Recycle bin? Recover deleted files from Recycle bin with the Recycle bin recovery software. Recover Files from Recycle bin - Download software at Recover-Files.ca
Find Duplicate Files Platinum - Find Duplicate Files - easily with the Software, Recommended by Microsoft(R) Corporation as the BEST software to find duplicate files on any computer. Find file duplicates, delete and remove duplicates - Download software at Find-Duplicate-Files.net
Shareware Connection periodically updates pricing and software information of 'Portable CryptoLock' from company source 'cryptostick.com' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'Portable CryptoLock' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of Portable CryptoLock.
PictBear - Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime ...
WWPass BlackBook and Personal Secure Storage - With time, PC security is turning out to be more complex and tedious matter. You can no longer rely on security apps but ensuring privacy of data is also important. While many password manager apps offer secure data encryption options, losing the ...
Avira Ultimate Protection Suite - With time the importance of PC security has gone up by leaps and bounds. Earlier, people used to rely on standalone antivirus software. However, security conscious users prefer having a more robust form of protection. They opt for Internet ...
Poser - The concept of 3D animation and modeling may seem amazing to the viewers but those who are into the industry know it is no cakewalk. Majority of 3D animation and modeling software known for some of the amazing animations and CGI work in films ...
F-Secure SAFE 2014 - Not so long back, a majority of people used either desktop or laptop for web access and general computing needs. However, things have changed a lot in recent years. Nowadays, it is not uncommon to find people who use laptop, desktop and tablet ...
PCMark 8 - Not every PC user would have penchant for running new benchmarks and benchmarking software in their computers. It is only hardcore gamers and seasoned users who like tinkering around with various settings in PC benchmarking tools. Such apps also ...
CyberFence - Technological innovations play a pivotal role in changing human lives but they also come with their pitfalls. Perhaps, nothing can be a bigger example of this than the web. You need the internet for education, work, monetary transactions and ...
KeePass Password Safe - Using password becomes mandatory for performing various online operations, at both home and workplace. For accessing email accounts, shopping online, making banking transactions and similar tasks it is necessary to use user ids and passwords ...
Autodesk MotionBuilder 2015 - 3D animators and post production setups need to use Motion capturing technology extensively for making stunning films, ads and tutorials etc. Over the years, both software and hardware technology used in this segment have evolved by leaps and ...
Stellar Speedup Mac - While Macintosh computers are known for their stellar speed and multitasking prowess they also become subjected to pitfalls of usage. After prolonged use, junk files pile up and bits of installed apps remain scattered on the hard disk. These, ...


