EFSDump 1.02
Windows 2000 introduces the Encrypting File System (EFS) so that users can protect their sensitive data.
|
Windows 2000 introduces the Encrypting File System (EFS) so that users can protect their sensitive data. Several new APIs make their debut to support this factility, including one - QueryUsersOnEncryptedFile - that lets you see who has access to encrypted files. EFSDump is an applet that uses the API to show you what accounts are authorized to access encrypted files. Full source code is included.
Usage: efsdump [-s]
-s
Recurse subdirectories.
EFSDump takes wildcards e.g. 'efsdump *.txt'.
Download EFSDump 1.02
Similar software
EFSDump 1.02
Mark Russinovich
Windows 2000 introduces the Encrypting File System (EFS) so that users can protect their sensitive data.
Cryptic Disk 5.3.2
EXLADE Inc
Cryptic Disk will provide a simple and affordable way to protect disks and disk partitions by encrypting them.
Paragon Encrypted Disk 3.02
Paragon Technologie GmbH
Paragon Encrypted Disk - protect private and sensitive data from potential unauthorized access.
ShareCrypt 2.1
SecurStar
ShareCrypt will protect sensitive data on shared disks or folders, allowing simultaneous access to different users.
Encrypted Briefcase Personal 2.6
Yoys Software
Encrypted Briefcase Personal is a useful folder encryption utility that lets you to hide folders and encrypt files with on-the-fly AES encryption.
CryptArchiver Lite 3.1.0.0
WinEncrypt Encryption Software and Security Solutions
It's really easy to hide, encrypt and password protect data with CryptArchiver.
Uconomix Encryption Engine 1.0
Uconomix Technologies Private Limited
Uconomix Encryption Engine is an easy to use file encryption software for Windows.
MY ENCRYPTED DISK 1.10
3dosoft inc.
Real powerful plug and play ,encrypted virtual disk.
Codelock 2.0
Website Creations Ltd
Codelock is a PHP and HTML code Encryptor for protecting your source code from thieves.
Encrypted Password Repository 1.0
Advanced Reliable Software
Encrypted Password Repository is a security solution which addresses the problem of identify theft and fraud, which frequently occurs when criminals gain access to sensitive information kept on personal and corporate computers.