Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.
torhash.net is just a torrent search engine, no torrents are hosted here.
Smart Encryptor 2.1.1
Infohash:
C5E9EF08889852A29474883338FBBD766BEE226D
Type:
Applications
Title:
Smart Encryptor 2.1.1
Category:
Applications/Windows
Uploaded:
2008-10-10 (by mcfilthynasty )
Description:
Smart Encryptor 2.1.1
Select between two advanced encryption algorithms
AES - Advanced Encryption Standard. The new Federal Information Processing Standard (FIPS) for use by U.S. Government organizations to protect sensitive information. It is a symmetric key encryption algorithm which replaced the commonly used DES standard. It was the result of a worldwide call for submissions of encryption algorithms issued by NIST (National Institute of Science and Technology). AES provides strong encryption in various environments: standard software platforms, limited space environments, and hardware implementations.
Blowfish - block cipher using 64-bit blocks and keys of up to 448 bits. It's fast, compact, simple, and secure.
Store all your confidential files and folders in one archive maintainig the folder tree
Ease of operation - Windows Shell integration
You can encrypt your files or folders directly from Windows Explorer. Just right click on the item you want to encrypt and use the menu.
Send encrypted files to friends and partners - Self-decrypting executables
What if you want to send some secret information over the Internet but the recipient does not have SmartEncryptor installed? The answer is a Self Extracting Archive. A self-extracting file is one that includes the encrypted data along with the software to automatically decrypt it. You do not need to have your own copy of SmartEncryptor in order to extract the files. Once the self-extracting file is downloaded, you simply double click it and enter the password.
Optionally wipe the source files
The software has the option to shred the original file after it has been enciphered. Shredding a file means writing over the contents with meaningless data. This is much more secure than simply deleting the file. The operation of deleting a file can often be undone by a malicious computer expert or a forensic computer examination.
patch is included into this file
instructions:
Install
Close program
Run he patch
Done
Scanned with Kaspersky - Clean
Enjoy
Files count:
1
Size:
624.81 Kb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
Comments:
Ov4ar (2008-10-11)
Thanks ;)SikKiDD (2008-10-14)
Nice it worked great mcfilthynasty (2008-10-25)
I woulnt load it if it didnt work.For those whom use this,there is much easier ways of encryting and decryting peoples work and or programs.I'll be loading a pdf file on how to do so as soon as I stop being lazy = P
Enjoy