Menu

Syntax

v77
version 3.0.0

-= Syntax =-
ProxyCrypt [mount_point] -f file | -d [#]drive_number[,[partition]] [-r]
           [-c|-cr [size]] [-p partition] [-o offset] [-cp] [-sp] [-pa]
           [-k|-ko file] [-kn|-kon file] [-sc mem[,cpu]] [-scn mem[,cpu]]
           [-nm] [-ad time] [-ads] [-b backup_file] [-run "exe" "arg"]
           [-cw] [-pp ...] [-fp "arguments"] [-t threads] [-bio]
           [-v verbose] [-imdk] [-font ...]
ProxyCrypt -l
ProxyCrypt -ck file [-sc mem[,cpu]]
ProxyCrypt -bm [cipher[,cipher[,cipher]]] [-t threads]

 mount_point
        Specifies a drive letter (followed by a colon) or an empty directory
        located on a NTFS volume. If omitted, a drive letter is selected
        automatically.

 -f     Image File of the encrypted volume.

 -d     Number of physical Drive where the encrypted volume is located.
        Default partition is 1. If a comma is added without partition number,
        the partition table is ignored.
        Use # to replace the number by the signature. Use -l to retrieve it.

 -r     Mount a volume as Read-only.
       __
 -c     Create a new encrypted volume. If a size and a file name are specified,
        an image file of this size will be created. Use k, m, g or t as suffix
        to specify KB, MB, GB or TB.

 -cr    Same as -c but the content of the created volume (or file, if any) is
        filled with Random data.

 -p     Number of Partition (default: 1). Use 0 to ignore the partition table
        (if any) and to use the whole disk or image.

 -o     Offset to the encrypted volume inside the file/drive/partition.
        Use k, m, g, or t as suffix to specify KB, MB, GB or TB.

 -cp    Change Password.

 -sp    Show Password by default (can still be hidden with the Tab key).

 -pa    Use the Password Alternate input method.
       __
 -k     Key file. Must be at least 64 bytes. Up to 4 KB is read.

 -ko    Key file Only. Same as -k but password is not required.

 -kn    New Key file. Change or assign a key file on an existing volume.
        To remove key file assignment, use NUL as file name.

 -kon   New Key file Only. Same as -kn but without password needed for the new
        key file.

 -sc    SCrypt parameters. The first value adjusts the RAM and CPU required for
        the key derivation function, from 1 to 256 (default: 128). The second
        value only affects the CPU load, from 1 to 999 (default: 4).

 -scn   SCrypt New parameters. Same as -sc, but the volume header is rewritten
        with these new values.
       __
 -nm    No Mount. Allow operations such as password change without altering the
        volume.

 -ad    Auto-Dismount after a period of inactivity, in minutes.

 -ads   Auto-Dismount when system enters a Suspended state.

 -b     If backup_file does not exist, it will be created with the content of
        the volume header, encrypted with a new salt.
        If backup_file exists, the volume header will be overwritten with the
        first 576 bytes of backup_file.

 -run   Run an executable after the volume is mounted. If no argument is
        required, use an empty quoted string.
       __
 -cw    Close the console Window after mounting if no error occurred.

 -pp    Parameters entered at the Prompts can be put here. Use 3 parameters for
        volume creation, 1 otherwise, in same format and order than in the
        prompts. -cp, -kn and -kon must be put before this switch.

 -fp    Format Parameters. "arguments" is a quoted string passed to the format
        command.

 -t     Number of Threads used for decryption and encryption, from 1 to 63
        (the default value is the number of logical processors).

 -bio   Use Buffered I/O. Can fix compatibility issues with some hardwares.
       __
 -v     Verbosity level, from 0 to 2 (default: 1).

 -imdk  Force the use of ImDisk, in case of Arsenal Image Mounter, which is
        used by default, is also installed.

 -font  Change the current console font, its size and colors. Use "d" as
        argument to display current values and extra informations.
       __
 -l     Display a List of current physical drives and partitions, with location
        of first and last bytes.

 -ck    Create a new 512-byte Key file, filled with random data.

 -bm    Benchmark of available ciphers.
        A cipher number can be specified, with 1=AES, 2=Serpent and 3=SHACAL-2.
        Use 2 or 3 numbers, separated by commas, for cascaded ciphers.


-= Password editor usage =-
 Esc:   Quit without volume mounting.

 Tab:   Show/hide password.

 Enter: Used with an empty password, it disables low level access to the
        keyboard. This improves compatibility with some Input Method Editors
        but removes protection against keyloggers.

Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.