Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 956 Categories, Downloaded 50.474.286 Times

DirCryptHide 1.58

Company: Gunnar Daehling
Date Added: July 21, 2012  |  Visits: 414

DirCryptHide
Full screenshot

Report Broken Link
Printer Friendly Version


Product Homepage
Download (414 downloads)



Any number of folders with all subfolders (even on different drives) can be moved in a highly scripted container file (created with TrueCrypt). This can be opened with password/USB-Device if needed, this container file will mount as another drive. When moving the data is first copied, while no error occurs, the original folder is deleted, at the direction of the container, the data can be shredded with the ERASER program. With automatically generated junctions stored in the container file folder in the PC file system are displayed. In this state you can work as normal with the stored data, En/decryption is performed "on-the-fly", the data in the container will always be encrypted. As long as an application accesses the lists of container file that TrueCrypt prevented the closure of the container, it is an indication, and the question whether the closing is to be forced, therefore accidental closure is not possible. The container file can be deactivated at any time, so that all folder invisible (junctions) are deleted, all data is securely encrypted in the container file. This also happens automatically when the PC after a normal stop or a crash starts up again, the container file has to be remounted in each case, a forgetting of the activation of the protection is thus excluded. Since surviving the junctions restart automatically when installing the automatic launching of DirCryptHide registered in the Registry. The program deletes the invalid junctions, and terminates immediately. The location of the container file can not be ascertained. After starting the program and entering the password/USB-Device written on the top left program window. The loss of the password means in any case, the loss of data in the container file.

Requirements: No special requirements
Release Date: July 21, 2012
Platforms: Win7 x32, Win7 x64, WinVista, WinXP
Keyword: Container Encryption Hide Hide Folder Invisible On The Fly Ordner Password Protect Safe Tresor Truecrypt
Users rating: 0/10

License: Freeware Size: 3.15 MB
USER REVIEWS
More Reviews or Write Review


DIRCRYPTHIDE RELATED
Programming  -  On-the-Fly .NET Compiler 1.0
On-the-Fly .NET Compiler - tool or library for compilation CLR language in real time, also in memory, and following execution. This can be used for desktop and web scripting, remote compilation, etc. It's free, written on C# and multiplatform.
8.73 KB  
Security Tools  -  CryptoExpert Lite 2010 7.14.0
CryptoExpert Lite is a free encryption software that uses an on-the-fly encryption system to encrypt and decrypt your data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly....
 
File Security  -  Free Hide Folder 3.2
Most everyone has files or folders on their computer that they do not want to share with others. The best way to protect your personal information is to make the folders visible ONLY to you. Free Hide Folder is a free computer security software to...
875.46 KB  
Arcade Style Games  -  Trip on the Funny Boat 1.4
Trip on the Funny Boat is a side scrolling shooter game starring a steamboat on the sea. Trip on the Funny Boat is side scrolling arcade shooter game on a steamboat equipped with a cannon and the ability to jump. The player will need to take...
3.8 MB  
Utilities  -  Linux on the WRT54G 0.61
Linux on the WRT54G is a mini-distribution for the router and access point Linksys wrt54g 802.11b/g It includes basic tools such as sh, syslog, telnetd, httpd (with cgi-bin support), vi, snort, mount, insmod, rmmod, top, grep, find, nfs modules,...
2.4 MB  
Games  -  Agatha Christie: Death on the Nile for Mac OS 1.0
Acting as the famous detective Hercule Poirot, find yourself in the middle of a murder mystery while sailing the Nile on the S.S. Karnak. It's up to you to navigate the ship room by room seeking hidden objects and collecting clues which will lead...
72.4 MB  
Utilities  -  Correct errors on the disk 1.0
Correct errors on the disk is a handy and reliable application designed to check for disk errors. The tool then tries to repair any that it finds. For example, Correct errors on the disk can repair problems related to bad sectors, lost clusters,...
 
Security Tools  -  Hide Folder HiBit 7.2.8
Program main functions: [1]-Protect any folder or file by : Hide, Lock, Encrypt or Fake it [2]-The protected folders or files still protected even in other computers [3]-You can lock files on a computer and unlock them on another computer [4]-The...
1.71 MB  
Book Collection Managers  -  Free Hide Desktop App Tool 1.2
Free Hide Desktop App Tool is a free utility which allows you to hide windows app on the task list. You can choose visible state of any window by clicking the window name from the list which shows all of your top-level windows. Hide Desktop Tool...
2.6 MB  
Utilities  -  Files 2 Folder ..0 Build 1
Files 2 Folder was developed to be a right-click shell extension that will automatically create a folder based on the selected filename and move that file into that folder. If you select multiple files, a box will pop up asking for a folder name....
358 KB  
NEW DOWNLOADS IN WINDOWS SOFTWARE, SECURITY TOOLS
Windows Software  -  iTop Screen Recorder 4.5.0.1385
iTop Screen Recorder is an all-in-one screen recorder, video editor, and screenshot tool. It helps capture anything on your PC screen to be a high-quality video file or screenshot, as well as edit the recorded videos and local videos to make them...
144.59 MB  
Windows Software  -  Lock Cursor Tools 7.0
Lock Cursor Tools simply locks the mouse cursor. You may choose a predetermined area, the primary or secondary monitor screen or part of the window of a particular application. Lock Cursor Tools makes your computer work more productively by...
1.34 MB  
Windows Software  -  Sync2 Cloud 2.10
Synchronizing Outlook between multiple sources now made easy with Sync2 Cloud, powerful Microsoft Outlook synchronization software. Sync Outlook Calendar, Contacts and Tasks between multiple sources. Share Outlook Calendar with others without...
28.29 MB  
Windows Software  -  WDZ Hash Generator 1.0
A simple program that can generate hashes such as md5, sha1, sha2 and many others. Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible...
2.27 MB  
Windows Software  -  WriterHelper 1
WriterHelper consist of WordNet Dictionary, WordNet Thesaurus, Plagairism Checker, Encryption using TripleDES, DES, and AES. WriterHelper helps you to search for dictionary, thesurus using WordNet Dictionary, Encrypt Text using AES, DES,...
223 KB  
Security Tools  -  WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:...
9.39 MB  
Security Tools  -  USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock...
11 KB  
Security Tools  -  Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and...
407 KB  
Security Tools  -  Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should...
29.53 MB  
Security Tools  -  Action1 Restart Remote Computer 2.5
Reboots multiple remote computers. This free remote reboot application restarts multiple computers remotely instead of performing command line restarts, running remote reboot commands to reboot Windows from command line or running PowerShell...
5.28 MB