FCrypt 1.1

  • USD
    • RUB
    • USD
    • EUR
Affiliates: 1 $how to earn
i agree with "Terms for Customers"
Sold: 0
Uploaded: 18.08.2003
Content: fcrypt_1.zip 284,53 kB

Product description


Encrypt a file - hence making it available only to authorized users, so you must use some method of identification. A person can be identified by fingerprints, iris, having his key (common key, a magnetic card, an electronic key. Key file), encryption program, which is also a key. However, it is assumed that the attacker has the encryption program, and identification methods other than the key file unacceptable.
If the key generator creates a certain key (e.g., a random number generator), it can be selected enumeration initial values \u200b\u200bused generator. If the key is smaller than the image, it can be picked up by a bust that usually requires no small time and resources. At last the vast majority principle based encryption software that determines their vulnerability. Also, if the key is limited in size, it is necessary to remember or write down, respectively, has the potential to detect key or forget the key. Moreover, the program code encryption is closed, respectively, can not say exactly what this program does exactly what it says in the instructions.
This program uses the files on your computer, larger than a file as encrypted keys, respectively, the key can not be picked up.
Most encryption software, encryption process is associated with algorithms for solving problems of "full backpack" Such a complex encryption method is used to complicate the selection key. However, in this program it uses modulo two, because the selection key is impossible, and the use of complex algorithms do not affect the fundamental nevskryvaemost cipher. Furthermore, the use of modulo-two greatly speeds the process of encryption.
So, in principle nevskryvaemost cipher, easy to understand completely open source, the speed of encryption, simple and nice interface, program size, the ability to encrypt files of unlimited size - this is not a complete list of its advantages.
To transfer data over a network is possible to use a mechanism similar to the principle of PGP, sometimes called a suitcase with two loops (two keys), or "goat wolf cabbage", and the key is not transmitted over the network, and during transmission over the network is always encrypted file . This protection can also be used to transfer applications over a network.

Additional information

The program is provided with detailed and easy to understand helpom, and updated regularly.
At the same time it is extremely simple to use.
You get all future updates up to and including version 3.0 for free.

Feedback

0
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.