You are now being logged in using your Facebook credentials
seo

Featured App:


Google Talk 1.0.0.104 Beta


Votes:0 | Download Count: 410

The Google Talk downloadable application for Windows offers many features for communicating with your friends and family. Instant messaging - Chat with all of your Google Talk and Gmail contacts in real time. Free PC-to-PC voice chat - You can talk to anyone else for free who's online and has...

своими руками

Newly Added Applications

1. BTCNaira for Android
    Category: Android-Finance
    Created: 16 April 2017
2. Fake PokemonGO GPS for...
    Category: Android-Utilities
    Created: 25 July 2016
3. PokemonGO for Android
    Category: Android-Casual
    Created: 25 July 2016
4. Dude Car Prank
    Category: Android-Productivity
    Created: 12 March 2016
5. RokFlix for Android
    Category: Android-Entertainment
    Created: 07 February 2016
Show more...

Top Rated Applications

RankName
Show more...

TrueCrypt 7.1a

Alternate Download Link
Uploaded
2012-09-17
Alternate Downloads
439
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space).

This software is highly recommended for securing data on laptops.

TrueCrypt performs the following tasks:

Creates a virtual encrypted disk within a file and mounts it as a real disk.
Encrypts an entire partition or storage device such as USB flash drive or hard drive.
Encrypts a partition or drive where Windows is installed (pre-boot authentication).
Encryption is automatic, real-time (on-the-fly) and transparent.
Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.
Images (1)
Mobile Version | Standard Version