When the user creates a key file, EncryptPad generates a random sequence of bytes, asks the user for a passphrase, encrypts the generated sequence and saves it to a file. The format of the file is OpenPGP. When EncryptPad generates a new key file, it is roughly equivalent to the following gpg2 command. It will ask for the passphrase to encrypt the sequence. When you use this key to encrypt test3. The first gpg2 process decrypts foo. When EncryptPad opens the encrypted file protected with foo.
Passphrase only passphrase is used to protect a file but no keys are specified. The file is an ordinary OpenPGP file. Key only passphrase is not set but a key file is used for protection. The file is a WAD file. WAD is a simple format for combining multiple binary files in one. You can open a WAD file in Slade. It contains two files internally:. Protected with passphrase and key. Consider this use case scenario: you travel with your laptop and open an encrypted file on the laptop.
If you protect the file with a passphrase and a key and your laptop is lost or stolen, the perpetrator will be able to make a brute force attack on your file because the key is also stored on the laptop. To avoid this, EncryptPad takes the following steps:.
If this file gets into the hands of a wrongdoer, he or she will need to brute force the passphrase first to be able to obtain the key URL and the authentication parameters. Since a brute force attack takes a lot of time, the user will be able to remove the key or change the authentication so the previous parameters become obsolete.
Run it without arguments to see available parameters. Below is an example of encrypting a file with a key:. Portable binaries are available for Windows and macOS.
They can be copied on a memory stick or placed on a network share. Alin Andrei from webupd8. See instructions below on how to install them. Ideally, you need to be familiar with the PPA concepts.
Download one of the changes files below depending on your distribution. The package version was 0. Please replace it with the latest version you are installing. The SHA hashes should match.
I personally modify bash. Run configure. To build everything:. Pixeloid is a unique encryption tool that allows you to encrypt typed text, images or text files inside a small Pixeloid graphic, that resembles a matrix of colored pixels.
You can drag and drop an image or text file or Secure Archive is a data compression and encryption utility that allows you to create encrypted, password protected archives to store your sensitive files and data. CTI Text Encryption is a text encryption program that you can use to encrypt any text that you type into the editor, paste from the clipboard or load from a text file.
Once encrypted the text will appear as a meaningless array WinAES is a portable encryption tool that you can use to encrypt and password protect your sensitive files. Simply drag and drop one or more files onto the GUI, set a password and click a button to create encrypted copies. Quick Crypt is a small and portable tool that offers bit file encryption to protect your sensitive files and documents.
The program offers some unique features that make it stand out of the crowd. You can encrypt files DeepSound is a steganography tool that enables you to hide secret data in an audio file. After your secret data is inserted, the audio file can be played as usual - there is no indication that it contains any hidden Simply select The stuffed JPG image can be viewed like any other image without giving away the fact that it contains a hidden file.
It can Granite Portable is a launch menu and secure storage solution for portable USB drives. The program allows you to organize your portable applications, documents and links into folders which are then accessible from the launch Secret Sharp is a unique security tool that enables you to encrypt a short, text based secret that can only be decrypted with two or more keys, which basically act as passwords.
Let's say you require 3 shared keys - you AxCrypt is an easy to use file encryption program. It integrates directly with Windows Explorer, enabling encryption, decryption, viewing and editing of any file with just a few clicks of the mouse.
AxCrypt uses bit AES Toolwiz BSafe enables you to create secure, password protected storage containers that are encrypted with bit AES encryption. To access your files, simply select a container, enter the proper password and the program will You can select any file documents, image etc. TrueCrypt is an open-source encryption software that enables you to create a virtual encrypted disk within a file and mount it as a virtual drive, that can be accessed via a drive letter.
Any file that is stored on this Code Master is a simple encryption program that enables you to type or paste text into an input form and then encrypt it with your choice of algorithm. You can then paste the encrypted text into an email message or chat LockNote is a portable memo pad that enables you to store text information, using bit AES encryption. You can type any text you want, e. These cookies ensure basic functionalities and security features of the website, anonymously.
The cookie is used to store the user consent for the cookies in the category "Analytics". The cookies is used to store the user consent for the cookies in the category "Necessary". The cookie is used to store the user consent for the cookies in the category "Other. The cookie is used to store the user consent for the cookies in the category "Performance".
It does not store any personal data. Functional Functional. Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance Performance. Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. Analytics Analytics. Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. Advertisement Advertisement. Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns.
These cookies track visitors across websites and collect information to provide customized ads. Others Others. Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
0コメント