Menu

Home

v77

Use ProxyCrypt without argument to get syntax help.


If you need to create encrypted spaces which can be partitioned like an ordinary hard drive, ProxyCrypt is also compatible with Arsenal Image Mounter. The driver, aimapi.dll and imdisk.cpl that are packed here are required.

A complete ready-to-use GUI has been released by another developer. See here for more information.

Upgrading to version 2? See the changelog and details here.


Example of use:
Here, we will see how to create a file where its entire content will be encrypted. This content will be directly accessed through a drive letter.

After downloading the full package, extract from the zip file the appropriate executable (for example, use ProxyCrypt64avx.exe if you use a 64-bit system and your CPU has the AVX instructions), and the 3 imdisk.* files.
Open a command prompt with administrative privileges, go to the folder where ProxyCrypt is located, and enter the following command (here, we assume you are using ProxyCrypt64.exe) :
ProxyCrypt64.exe -f test -c 100M
This command creates a 100MB file, named "test", in the current directory.
Next, enter 0 to use all space available in the created file, 1 to select AES, and 1 to select Whirlpool.
Now, enter a password (this one has to be entered 2 times). No need to choose a complicated one, since this is just a test.

The volume is now created and can be formated. If you are using Windows Vista or later, you should be automatically prompted to do that. For better security, do not use quick format (unless to use -cr instead of -c).

You can now use this new volume like a normal drive: copy files and folders, open them with any software... All data are automatically and immediately encrypted or decrypted, depending of what you are doing on this volume.
Once you are done, you can dismount the volume. Run imdisk.cpl with administrative privileges, select your drive in the list and then click on "Remove".

Next time, to mount this volume, enter the following command:
ProxyCrypt64.exe -f test
Enter your password, and the volume will be mounted with all the data you have previously written in.

About the command prompt, please note that this is not possible to retrieve the prompt for other commands. So, you can keep this window to check possible error messages, or close it: in this case, ProxyCrypt will continue to work in the background as long as the volume is mounted.

Check the syntax help to discover the other possibilities of ProxyCrypt.