Menu

Syntax

v77
version 3.0.0

-= Syntax =-
ProxyCrypt [mount_point] -f file | -d [#]drive_number[,[partition]] [-r]
           [-c|-cr [size]] [-p partition] [-o offset] [-cp] [-sp] [-pa]
           [-k|-ko file] [-kn|-kon file] [-sc mem[,cpu]] [-scn mem[,cpu]]
           [-nm] [-ad time] [-ads] [-b backup_file] [-run "exe" "arg"]
           [-cw] [-pp ...] [-fp "arguments"] [-t threads] [-bio]
           [-v verbose] [-imdk] [-font ...]
ProxyCrypt -l
ProxyCrypt -ck file [-sc mem[,cpu]]
ProxyCrypt -bm [cipher[,cipher[,cipher]]] [-t threads]

 mount_point
        Specifies a drive letter (followed by a colon) or an empty directory
        located on a NTFS volume. If omitted, a drive letter is selected
        automatically.

 -f     Image File of the encrypted volume.

 -d     Number of physical Drive where the encrypted volume is located.
        Default partition is 1. If a comma is added without partition number,
        the partition table is ignored.
        Use # to replace the number by the signature. Use -l to retrieve it.

 -r     Mount a volume as Read-only.
       __
 -c     Create a new encrypted volume. If a size and a file name are specified,
        an image file of this size will be created. Use k, m, g or t as suffix
        to specify KB, MB, GB or TB.

 -cr    Same as -c but the content of the created volume (or file, if any) is
        filled with Random data.

 -p     Number of Partition (default: 1). Use 0 to ignore the partition table
        (if any) and to use the whole disk or image.

 -o     Offset to the encrypted volume inside the file/drive/partition.
        Use k, m, g, or t as suffix to specify KB, MB, GB or TB.

 -cp    Change Password.

 -sp    Show Password by default (can still be hidden with the Tab key).

 -pa    Use the Password Alternate input method.
       __
 -k     Key file. Must be at least 64 bytes. Up to 4 KB is read.

 -ko    Key file Only. Same as -k but password is not required.

 -kn    New Key file. Change or assign a key file on an existing volume.
        To remove key file assignment, use NUL as file name.

 -kon   New Key file Only. Same as -kn but without password needed for the new
        key file.

 -sc    SCrypt parameters. The first value adjusts the RAM and CPU required for
        the key derivation function, from 1 to 256 (default: 128). The second
        value only affects the CPU load, from 1 to 999 (default: 4).

 -scn   SCrypt New parameters. Same as -sc, but the volume header is rewritten
        with these new values.
       __
 -nm    No Mount. Allow operations such as password change without altering the
        volume.

 -ad    Auto-Dismount after a period of inactivity, in minutes.

 -ads   Auto-Dismount when system enters a Suspended state.

 -b     If backup_file does not exist, it will be created with the content of
        the volume header, encrypted with a new salt.
        If backup_file exists, the volume header will be overwritten with the
        first 576 bytes of backup_file.

 -run   Run an executable after the volume is mounted. If no argument is
        required, use an empty quoted string.
       __
 -cw    Close the console Window after mounting if no error occurred.

 -pp    Parameters entered at the Prompts can be put here. Use 3 parameters for
        volume creation, 1 otherwise, in same format and order than in the
        prompts. -cp, -kn and -kon must be put before this switch.

 -fp    Format Parameters. "arguments" is a quoted string passed to the format
        command.

 -t     Number of Threads used for decryption and encryption, from 1 to 63
        (the default value is the number of logical processors).

 -bio   Use Buffered I/O. Can fix compatibility issues with some hardwares.
       __
 -v     Verbosity level, from 0 to 2 (default: 1).

 -imdk  Force the use of ImDisk, in case of Arsenal Image Mounter, which is
        used by default, is also installed.

 -font  Change the current console font, its size and colors. Use "d" as
        argument to display current values and extra informations.
       __
 -l     Display a List of current physical drives and partitions, with location
        of first and last bytes.

 -ck    Create a new 512-byte Key file, filled with random data.

 -bm    Benchmark of available ciphers.
        A cipher number can be specified, with 1=AES, 2=Serpent and 3=SHACAL-2.
        Use 2 or 3 numbers, separated by commas, for cascaded ciphers.


-= Password editor usage =-
 Esc:   Quit without volume mounting.

 Tab:   Show/hide password.

 Enter: Used with an empty password, it disables low level access to the
        keyboard. This improves compatibility with some Input Method Editors
        but removes protection against keyloggers.