Cool File Encryption Software Released.

Do you have a question? Post it now! No Registration Necessary

Translate This Thread From English to

Threaded View
You can use this software to encrypt your important files
which you don't want others to see with AES encryption algorithm.

Cool File Encryption adopts the international standard cryptographic
algorithm--AES that has been proved to be secure by numerous attacks
and tests. Cool File Encryption is reliable and convenient,
which you can find when using it.

software download link:
http://www.dreamflysoft.com/download/coolfileencryption.exe
website: http://www.dreamflysoft.com

If you have any proposal or question,please feel free to contact us
through E-mail,I will answer you as soon as possible.
E-mail: snipped-for-privacy@dreamflysoft.com

Re: Cool File Encryption Software Released.

Quoted text here. Click to load it
Looks like I need Wine to run it. Will this work?

Quoted text here. Click to load it

Regards
 Heinz

Re: Cool File Encryption Software Released.

Quoted text here. Click to load it

--

Just had a lok at it:
7.Support all windows platform: ?Win9X,WinME,Win2000,WinXP,Win2003,WinNT
  
We've slightly trimmed the long signature. Click to see the full one.
Re: Cool File Encryption Software Released.
Quoted text here. Click to load it

You must be mad if you think people will trust cryptographic software
from someone who thinks that *any* software has been proven secure, or
that resistance to attacks indicates anything about the probability of
success of future attacks. An astonishing display of ignorance...

Re: Cool File Encryption Software Released.

Quoted text here. Click to load it
// SNIP

Or you could just grab this and compile it:

http://www.cr0.net:8040/code/crypto/aes /

Cheers,
Alf



Re: Cool File Encryption Software Released.
snipped-for-privacy@leshan.cc (DreamFly) writes:
Quoted text here. Click to load it

No, it hasn't.  It has only been proven to be secure against those
particular attacks.  (And not necessarily against other variations of
the same attacks.)

Site Timeline