Képernyőképek:
Ismertető
This application allows easy folder compression and strong encryption simply by dragging and dropping folders. In addition to traditional passwords, encryption can also be applied using key files, providing enhanced security against password attacks. Unlike regular password-protected ZIP files that can be susceptible to password cracking software, this application uses AES256-bit encryption, making automated decryption difficult and keeping peace of mind. Encrypted files can be saved in two formats: as self-extracting EXE files or encrypted data files. Using the self-extracting EXE format, you can copy the encrypted file to a removable drive and easily extract it on any device without needing additional software. The authentication methods include traditional password authentication, file authentication, USB device authentication, authentication via specific computers. The decrypted encrypted folders have an interface similar to File Explorer, allowing you to easily drag and drop files, add new ones, and edit existing content. Any edits made to the decrypted folder are automatically re-encrypted and saved. The encryption process also includes compression, reducing the size of the encrypted data for convenient portability. For those who find setting passwords or key files during encryption cumbersome, the application features an automatic generation function. The EXE self-extracting executable file and the encrypted data file can be mutually converted. Furthermore, it also supports complete deletion of the original encrypted folder. Note: Due to its relatively minor status, this software employs specialized processing during the decryption and encryption of EXE self-extracting executable files. As a result, antivirus software may occasionally trigger false positives such as 'Suspicious behavior detected' during the decryption and encryption process. In such cases, it cannot be ruled out that the EXE self-extracting executable file might have been infected with a virus after its creation. If you have concerns, prioritize safety by converting the EXE self-extracting executable file to an encrypted data file before decryption.