version 3.0.0
-= Syntax =-
ProxyCrypt [mount_point] -f file | -d [#]drive_number[,[partition]] [-r]
[-c|-cr [size]] [-p partition] [-o offset] [-cp] [-sp] [-pa]
[-k|-ko file] [-kn|-kon file] [-sc mem[,cpu]] [-scn mem[,cpu]]
[-nm] [-ad time] [-ads] [-b backup_file] [-run "exe" "arg"]
[-cw] [-pp ...] [-fp "arguments"] [-t threads] [-bio]
[-v verbose] [-imdk] [-font ...]
ProxyCrypt -l
ProxyCrypt -ck file [-sc mem[,cpu]]
ProxyCrypt -bm [cipher[,cipher[,cipher]]] [-t threads]
mount_point
Specifies a drive letter (followed by a colon) or an empty directory
located on a NTFS volume. If omitted, a drive letter is selected
automatically.
-f Image File of the encrypted volume.
-d Number of physical Drive where the encrypted volume is located.
Default partition is 1. If a comma is added without partition number,
the partition table is ignored.
Use # to replace the number by the signature. Use -l to retrieve it.
-r Mount a volume as Read-only.
__
-c Create a new encrypted volume. If a size and a file name are specified,
an image file of this size will be created. Use k, m, g or t as suffix
to specify KB, MB, GB or TB.
-cr Same as -c but the content of the created volume (or file, if any) is
filled with Random data.
-p Number of Partition (default: 1). Use 0 to ignore the partition table
(if any) and to use the whole disk or image.
-o Offset to the encrypted volume inside the file/drive/partition.
Use k, m, g, or t as suffix to specify KB, MB, GB or TB.
-cp Change Password.
-sp Show Password by default (can still be hidden with the Tab key).
-pa Use the Password Alternate input method.
__
-k Key file. Must be at least 64 bytes. Up to 4 KB is read.
-ko Key file Only. Same as -k but password is not required.
-kn New Key file. Change or assign a key file on an existing volume.
To remove key file assignment, use NUL as file name.
-kon New Key file Only. Same as -kn but without password needed for the new
key file.
-sc SCrypt parameters. The first value adjusts the RAM and CPU required for
the key derivation function, from 1 to 256 (default: 128). The second
value only affects the CPU load, from 1 to 999 (default: 4).
-scn SCrypt New parameters. Same as -sc, but the volume header is rewritten
with these new values.
__
-nm No Mount. Allow operations such as password change without altering the
volume.
-ad Auto-Dismount after a period of inactivity, in minutes.
-ads Auto-Dismount when system enters a Suspended state.
-b If backup_file does not exist, it will be created with the content of
the volume header, encrypted with a new salt.
If backup_file exists, the volume header will be overwritten with the
first 576 bytes of backup_file.
-run Run an executable after the volume is mounted. If no argument is
required, use an empty quoted string.
__
-cw Close the console Window after mounting if no error occurred.
-pp Parameters entered at the Prompts can be put here. Use 3 parameters for
volume creation, 1 otherwise, in same format and order than in the
prompts. -cp, -kn and -kon must be put before this switch.
-fp Format Parameters. "arguments" is a quoted string passed to the format
command.
-t Number of Threads used for decryption and encryption, from 1 to 63
(the default value is the number of logical processors).
-bio Use Buffered I/O. Can fix compatibility issues with some hardwares.
__
-v Verbosity level, from 0 to 2 (default: 1).
-imdk Force the use of ImDisk, in case of Arsenal Image Mounter, which is
used by default, is also installed.
-font Change the current console font, its size and colors. Use "d" as
argument to display current values and extra informations.
__
-l Display a List of current physical drives and partitions, with location
of first and last bytes.
-ck Create a new 512-byte Key file, filled with random data.
-bm Benchmark of available ciphers.
A cipher number can be specified, with 1=AES, 2=Serpent and 3=SHACAL-2.
Use 2 or 3 numbers, separated by commas, for cascaded ciphers.
-= Password editor usage =-
Esc: Quit without volume mounting.
Tab: Show/hide password.
Enter: Used with an empty password, it disables low level access to the
keyboard. This improves compatibility with some Input Method Editors
but removes protection against keyloggers.