Your Ad Here

Sunday, October 11, 2009

AutoKrypt v7.40


AutoKrypt v7.40 | 23.87 Mb

Data encryption software designed for automation. Automatically encrypt or decrypt, files and folders on a schedule. Encryption methods include password based, secret key, public key and private key, OpenPGP password, OpenPGP public and private key.

Improve your productivity and save time!
Easy to use: no programming and scripting required, graphical interface
Powerful, versatile, reliable and affordable
Run more than 1000+ tasks a day
Timely and Free technical support before and after you purchase

Features

Encryption Profiles allow you to quickly add encryption and decryption profiles. These files can be used in encryption or decryption tasks.

Encryption task allows you to encrypt files or an entire folder and its subfolders.

Decryption task allows you to decrypt files or an entire folder and its subfolders.

Key Generator can generate secret, public, private, OpenPGP public keys and OpenPGP private keys.

Key Store manager allows you to import or export keys for external use.

Email Notification for all tasks based on task exit code.

Dynamic variables are supported for most tasks. Most tasks also generate variables which can be used in other tasks. Create advanced automation solutions using our Automize tasks in conjunction with variables, directory/file monitors and our task chains.

Zip files and directories using wildcards on a schedule. Can append date/time to filename for archive purposes.

Copy files and directories using wildcards on a schedule. Can append date/time to filename for archive purposes.

Chain Task Integrator runs all supported AutoKrypt tasks in sequence, (with options depending on Exit codes).

----------------------------------------------------------------------------------------------------------
Encryption Tutorial

This very brief tutorial is for beginners who have not used encryption tools before.

Introduction
There are two types of encryption methods, symmetric and asymmetric.

1) Symmetrical Encryption - The same password (or key) is used to encrypt and decrypt the data (file). This method is useful to encrypt sensitive information for you own use, or for use by family, or a few trusted friends/coworkers.

2) Asymmetrical Encryption - A public key file is used to encrypt the data. The corresponding private key file is used to decrypt the data. Only you should have access to your private key. You can distribute your public key to anyone who needs to send you data.

Password Based Encryption
This is the simplest form of encryption. It is a symmetrical encryption method. The same password is used to encrypt and decrypt the file.

Secret Key Based Encryption
This is the simplest form of key based encryption. It is a symmetrical encryption method. The same secret key file is used to encrypt and decrypt the data.


Rapidhsare
Depositfiles

No comments:

Post a Comment

Your Ad Here

Disclaimer

This site does not infringe any Copyrights. It only lists through Freedom of Information Act what is listed on Search Engines.All files are found using legitimate search engine techniques. This site does not and will not condone hacking into sites to create the links it list. We will and do assume that all links found on the search engines we use are obtained in a legal manner and the webmasters are aware of the links listed on the search engines. If you find a URL that belongs to you, and you did not realize that it was "open to the public", please email on to notify the blogmaster of your request to remove it. This is not an invitation for webblog haters to spam with requests to remove content they feel that is objectionable and or unacceptable. Proof of URL ownership is required. None of the files shown here are hosted by this server. I do not upload any file , links are provided by users of this site and other websites. If you do not have enough rights to download them please don't download.

User Agreement

The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These Ebooks here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. IF YOU DO NOT AGREE TO THESE TERMS THEN LEAVE.