AutoKrypt v7.40 | 23.87 Mb
Data encryption software designed for automation. Automatically encrypt or decrypt, files and folders on a schedule. Encryption methods include password based, secret key, public key and private key, OpenPGP password, OpenPGP public and private key.
Improve your productivity and save time!
Easy to use: no programming and scripting required, graphical interface
Powerful, versatile, reliable and affordable
Run more than 1000+ tasks a day
Timely and Free technical support before and after you purchase
Features
Encryption Profiles allow you to quickly add encryption and decryption profiles. These files can be used in encryption or decryption tasks.
Encryption task allows you to encrypt files or an entire folder and its subfolders.
Decryption task allows you to decrypt files or an entire folder and its subfolders.
Key Generator can generate secret, public, private, OpenPGP public keys and OpenPGP private keys.
Key Store manager allows you to import or export keys for external use.
Email Notification for all tasks based on task exit code.
Dynamic variables are supported for most tasks. Most tasks also generate variables which can be used in other tasks. Create advanced automation solutions using our Automize tasks in conjunction with variables, directory/file monitors and our task chains.
Zip files and directories using wildcards on a schedule. Can append date/time to filename for archive purposes.
Copy files and directories using wildcards on a schedule. Can append date/time to filename for archive purposes.
Chain Task Integrator runs all supported AutoKrypt tasks in sequence, (with options depending on Exit codes).
----------------------------------------------------------------------------------------------------------
Encryption Tutorial
This very brief tutorial is for beginners who have not used encryption tools before.
Introduction
There are two types of encryption methods, symmetric and asymmetric.
1) Symmetrical Encryption - The same password (or key) is used to encrypt and decrypt the data (file). This method is useful to encrypt sensitive information for you own use, or for use by family, or a few trusted friends/coworkers.
2) Asymmetrical Encryption - A public key file is used to encrypt the data. The corresponding private key file is used to decrypt the data. Only you should have access to your private key. You can distribute your public key to anyone who needs to send you data.
Password Based Encryption
This is the simplest form of encryption. It is a symmetrical encryption method. The same password is used to encrypt and decrypt the file.
Secret Key Based Encryption
This is the simplest form of key based encryption. It is a symmetrical encryption method. The same secret key file is used to encrypt and decrypt the data.
Improve your productivity and save time!
Easy to use: no programming and scripting required, graphical interface
Powerful, versatile, reliable and affordable
Run more than 1000+ tasks a day
Timely and Free technical support before and after you purchase
Features
Encryption Profiles allow you to quickly add encryption and decryption profiles. These files can be used in encryption or decryption tasks.
Encryption task allows you to encrypt files or an entire folder and its subfolders.
Decryption task allows you to decrypt files or an entire folder and its subfolders.
Key Generator can generate secret, public, private, OpenPGP public keys and OpenPGP private keys.
Key Store manager allows you to import or export keys for external use.
Email Notification for all tasks based on task exit code.
Dynamic variables are supported for most tasks. Most tasks also generate variables which can be used in other tasks. Create advanced automation solutions using our Automize tasks in conjunction with variables, directory/file monitors and our task chains.
Zip files and directories using wildcards on a schedule. Can append date/time to filename for archive purposes.
Copy files and directories using wildcards on a schedule. Can append date/time to filename for archive purposes.
Chain Task Integrator runs all supported AutoKrypt tasks in sequence, (with options depending on Exit codes).
----------------------------------------------------------------------------------------------------------
Encryption Tutorial
This very brief tutorial is for beginners who have not used encryption tools before.
Introduction
There are two types of encryption methods, symmetric and asymmetric.
1) Symmetrical Encryption - The same password (or key) is used to encrypt and decrypt the data (file). This method is useful to encrypt sensitive information for you own use, or for use by family, or a few trusted friends/coworkers.
2) Asymmetrical Encryption - A public key file is used to encrypt the data. The corresponding private key file is used to decrypt the data. Only you should have access to your private key. You can distribute your public key to anyone who needs to send you data.
Password Based Encryption
This is the simplest form of encryption. It is a symmetrical encryption method. The same password is used to encrypt and decrypt the file.
Secret Key Based Encryption
This is the simplest form of key based encryption. It is a symmetrical encryption method. The same secret key file is used to encrypt and decrypt the data.
Rapidhsare
Depositfiles
No comments:
Post a Comment