9/12/2023 0 Comments Droplr vs.dropbox![]() In fact, if you have 10 “self-decrypting” files, you have 10 copies of AxCrypt on your computer. In actual fact it’s still AxCrypt, it’s just a version of AxCrypt that has the data tacked on at the end of itself and reads it from there. The recipient does need AxCrypt, in all situaitons, it’s just with the “self-decrypting” your perception is that you don’t need AxCrypt – because it’s “self-derypting”. I’m thinking that it’s quite a bit about the perception – not the actual situation here. I prefer AxCrypt as it’s simpler to use than BCArchive but the lack of a self-decrypting feature in version 2 is a deal-breaker. Someone on here recommended BCArchive and that does all the same stuff as AxCrypt 1.7 and AxCrypt 2. I’d even pay for AxCrypt Premium as it has features that I want, like AES-256. If AxCrypt reintroduced the self-decrypting feature in version 2, or somehow allowed a user to bundle an AXX into the portable edition so that it’s a single file, then I’d make the switch to version 2. It can literally contain any level of bad.” *”Since it by definition contains strongly encrypted information, for example another executable software, it is impossible to screen by anti virus software. I send the password via WhatsApp (which itself is encrypted). Then if it’s lost I don’t need to worry about my data being viewed by a thief. I’ll encrypt the file, burn it to DVD and post it. Rarely I’ll be asked to send something by post.It’s secure, doesn’t require me to have AxCrypt installed and I can use it on almost any computer. My other use for the self-decrypting file is for sticking private files on a USB for backup or for opening on another computer.I have no difficulties sharing EXE files. He clicks the link, downloads the AxCrypt self-decrypting file and that’s it. You can then share a public or private link with your friend. It’s like Dropbox but is primarily for sharing screenshots and GIFs however you can also upload and share any file. AXX file is encrypted and can only be scanned by AV software once the file has been successfully decrypted? The same applies for the EXE file surely? Your argument* that an EXE can “contain any level of bad” seems circular to me.Double-click, enter password and it’s done The recipient needs less technical skill.The recipient doesn’t have to run (or install) AxCrypt.Some of my friends don’t have installation rights but they can run the self-decrypting EXE. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |