You are now being logged in using your Facebook credentials
seo

Featured App:


LeechCraft


Votes:0 | Download Count: 243

LeechCraft is a cross-platform modular "internet-client" application. It has plugins that allow one to browse the web, chat via instant messaging (like Jabber or IRC), read RSS/Atom feeds, download files via BitTorrent, Direct Connect and other protocols, play media files and much...

своими руками

Newly Added Applications

1. BTCNaira for Android
    Category: Android-Finance
    Created: 16 April 2017
2. Fake PokemonGO GPS for...
    Category: Android-Utilities
    Created: 25 July 2016
3. PokemonGO for Android
    Category: Android-Casual
    Created: 25 July 2016
4. Dude Car Prank
    Category: Android-Productivity
    Created: 12 March 2016
5. RokFlix for Android
    Category: Android-Entertainment
    Created: 07 February 2016
Show more...

Top Rated Applications

RankName
Show more...

TrueCrypt 7.1a

Alternate Download Link
Uploaded
2012-09-17
Alternate Downloads
424
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space).

This software is highly recommended for securing data on laptops.

TrueCrypt performs the following tasks:

Creates a virtual encrypted disk within a file and mounts it as a real disk.
Encrypts an entire partition or storage device such as USB flash drive or hard drive.
Encrypts a partition or drive where Windows is installed (pre-boot authentication).
Encryption is automatic, real-time (on-the-fly) and transparent.
Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.
Images (1)
Mobile Version | Standard Version