Logo
Any Windows Shareware

ArmorTools Home 22.7.1


Categories:



Search For Shareware:

ArmorTools Home 22.7.1New File Number: 258851 |  Submitted: Aug 1, 2022 |  File size: 1654KB |  Uninstaller: No

Author: EMail |  Price: 29.99 |  License: Shareware
O/S: Win 11 32Bit | Category: Disk Tools |  Downloads: 0

Requirements: MS Windows, 1024x768 resolution, 16Mb free space


Description:

ArmorTools is a set of tools that expands the capabilities of the MS Windows operating system in the field of security and protection of user confidentialrmation. ArmorTools allows you to create secure virtual disks encrypted using AES128/AES256 algorithms, encrypt files and folder contents using any file as a password. ArmorTools removes traces of the user's work on theputer, clears the history of visiting sites, deletes confidentialrmation without the possibility of recovery. It also has a set of additional settings for the MS Windows operating system. ArmorTools contains the following tools: Extra Disks, File Shredder, File Encryptor, Objects Eraser, System Tweaker. ArmorTools: Extra Disks is a tool designed to create virtual disks on yourputer. With Extra Disks you can create three types of virtual disks - encrypted disks, file-based disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret and privatermation. File-based virtual disks are designed to make it easier to work with many small files when moving them fromputer toputer. For example, when copying many photos or music. Folder-based virtual disks make it easier to ess the contents of deeply nested subfolders. For example, a folder with music can be connected as a drive m:\ or a folder with photos can be mounted as disk p:\. ArmorTools: File Encryptor is a tool designed to encrypt files or folder contents. As a password, you can set your own or use any file as a key to encryption. For example, when sending secretrmation by mail, you can encrypt the transmitted file using a wallpaper image or the Calculator program as a key. Having transferred thermation to the recipient, he will be able to decrypt the encrypted file using this picture from the same version of the operating system.


Back To Top