Batch File Encryptor icon
Batch File Encryptor icon

Batch File Encryptor

Encrypt and decrypt whole files or their parts using AES, 3-DES, RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic keys (vectors) instead. You can change key bit length for better protection.

Batch File Encryptor screenshot 1

Cost / License

  • Paid
  • Proprietary

Platforms

  • Windows
-
No reviews
2likes
0comments
0news articles

Features

Suggest and vote on features
  1.  Portable
  2.  Batch conversion
  3.  Batch processing

Batch File Encryptor News & Activities

Highlights All activities

Recent activities

Show all activities

Batch File Encryptor information

  • Developed by

    US flagBinaryMark
  • Licensing

    Proprietary and Commercial product.
  • Alternatives

    14 alternatives listed
  • Supported Languages

    • English
Batch File Encryptor was added to AlternativeTo by binarymark on and this page was last updated .
No comments or reviews, maybe you want to be first?
Post comment/review

What is Batch File Encryptor?

Encrypt and decrypt whole files or their parts using AES, Triple-DES (3DES), RC2, and DES symmetric algorithms.

  • You can encrypt files with a single password or specify cryptographic keys (vectors) instead.
  • You can change key bit length for better protection.
  • You can select specifically which bytes in a file should be encrypted/decrypted, though by default the whole file is processed.
  • Process 1000s of files using multiple CPU cores in manual, automatic/continuous, triggered/scheduled, or console modes, or directly from Windows Explorer right-click menu.
  • Save files to output directory specified using either absolute or relative path, with original or new name defined by a mask.
  • Select files for processing based on their name, dates, size, and contents using advanced file search supporting RegEx and advanced wildcards.
  • Optionally merge together, split all, or zip processed files.
  • Perform different operations on different files with conditional processing and process branching.
  • Detailed processing logs are available in both user interface and log files.
  • Run multiple program instances simultaneously.