Use ProxyCrypt without argument to get syntax help.
A complete ready-to-use GUI has been released by another developer. See here for more information.
Upgrading to version 3? See the details here.
Example of use:
Here, we will see how to create a file where its entire content will be encrypted. This content will be directly accessed through a drive letter.
After downloading the full package, extract from the zip file the appropriate executable (for example, use ProxyCrypt_avx.exe if your CPU has the AVX instructions), and all the other files.
Open a command prompt with administrative privileges, go to the folder where ProxyCrypt is located, and enter the following command (here, we assume you are using ProxyCrypt_avx.exe) :
ProxyCrypt_avx.exe X: -f test -c 100M
This command creates a 100MB file, named "test", in the current directory.
Next, enter 0 to use all space available in the created file, 1 to select AES, and 1 to select Whirlpool.
Now, enter a password (this one has to be entered 2 times). No need to choose a complicated one, since this is just a test.
The volume is now created and can be formated. For better security, do not use quick format (unless to use -cr instead of -c).
You can now use this new volume like a normal drive: copy files and folders, open them with any software... All data are automatically and immediately encrypted or decrypted, depending of what you are doing on this volume.
Once you are done, you can dismount the volume. In another elevated command prompt, run the following command: aim_ll.exe -D -m X:
Next time, to mount this volume, enter the following command:
ProxyCrypt_avx.exe -f test
Enter your password, and the volume will be mounted with all the data you have previously written in.
About the command prompt, please note that this is not possible to retrieve the prompt for other commands. So, you can keep this window to check possible error messages, or close it: in this case, ProxyCrypt will continue to work in the background as long as the volume is mounted.
Check the syntax help to discover the other possibilities of ProxyCrypt.