Just run CNG32Setup.exe (32-bit) or CNG64Setup.exe (64-bit) and follow the installation process. All settings will be saved in the Windows registry. The installation process will create a shortcut on your desktop and folder CryptoNG on your Windows start menu.
Go to "Programs - Uninstall Program" applet in the Control Panel. Select CryptoNG and click "Uninstall" button. All created shortcut, folders and registry settings will be removed automatically.
It's easy - all it takes is a few simple steps!
CryptoNG is simply run by double-clicking the CryptoNG.exe file (default location: "C:\Program Files\CryptoNG\CryptoNG.exe") or one of the shortcuts on the desktop or in the start menu that you may have created during the installation of CryptoNG.
Open the folder with the files you need and select the files to be encrypted. To select multiple files hold down the Ctrl key. To select all files press the button Select All or Ctrl+A. Selecting a single file requires you to simply double click on the file. After you select needed objects, click the Encrypt button (Ctrl+E). Enter the encryption password in the Enter Password field of the dialog box and repeat the password in the Verify Password field. Click OK to encrypt the file. If you want to cancel the encryption, click the Cancel button.
Open the folder with the files you need and select the files to be decrypted. To select multiple files hold down the Ctrl key. To select all files press the button Select All or Ctrl+A. Selecting a single file requires you to simply double click on the file. After you select needed objects, click the Decrypt button (Ctrl+D). Enter the decryption password in the Enter Password field of the dialog box. Click OK to decrypt the file. If you want to cancel the decryption, click the Cancel button.
Open the folder with the files you need and select the files to be wiped. To select multiple files hold down the Ctrl key. To select all files press the button Select All or Ctrl+A. After you select needed objects, click the Wipe button (Ctrl+W). The operation of wiping takes time. By default, the program rewrites the file 3 times, but you can change this parameter. If you want to cancel the wiping, click the Cancel button.
Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information. The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption.
Advanced Encryption Standard (AES) is a specification for the encryption of electronic data. It has been adopted by the U.S. government and is now used worldwide. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. In the United States, AES was announced by National Institute of Standards and Technology on November 26, 2001 after a five-year standardization process in which fifteen competing designs were presented and evaluated before it was selected as the most suitable. It became effective as a Federal government standard on May 26, 2002 after approval by the Secretary of Commerce. AES is the first publicly accessible and open cipher approved by the National Security Agency for top secret information.
Galois/Counter Mode (GCM) is a mode of operation for symmetric key cryptographic block ciphers that has been widely adopted because of its efficiency and performance. It is an authenticated encryption algorithm designed to provide both data authenticity (integrity) and confidentiality. GCM is ideal for protecting packetized data, because it has minimum latency and minimum operation overhead. GCM has been proven secure in the concrete security model.
This is a legal agreement ("License Agreement") between you (either personal or corporate) and Vassil Arabadjiev ("Author") for the software product "CryptoNG" ("Software"). BY COPYING OR USING THE SOFTWARE IN ANY KIND, YOU AGREE TO BE BOUND BY ALL OF THE TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE, DO NOT USE OR COPY THE SOFTWARE.
The Software is owned exclusively by Vassil Arabajiev. The price paid by you for the Software is only for a license fee granting you only the rights set forth in this License. The rights granted in this License are limited to Vassil Arabajiev's intellectual property rights in the Software and do not include any other patents or intellectual property rights.
Vassil Arabajiev grants to you, and you accept, a limited, non-exclusive and revocable license to use the Software, in machine-readable, object code form only. You shall only use the Software only as authorized in this License. This License does not convey to you any ownership rights or any other interest in the Software.
This License allows you to install and use one copy of the Software on a single computer. A valid license must be purchased for each computer on which the Software is installed. You may not copy, adapt, translate, decompile, reverse engineer, disassemble, attempt to derive the source code of, modify, or create derivative works of the Software or any part thereof. You shall use all reasonable efforts to protect the Software from unauthorized use, modification, reproduction, distribution or publication. You may not lend, rent, lease or sublicense the Software or make any uses or copies of the Software that are not specifically authorized by the terms of this License Agreement.
This license will become effective on the date you acquire the Software and will remain in force until terminated. You may terminate the license, at any time, by removing the Software from your computer and destroying the original Software. This License will automatically terminate if you breach any of the terms or conditions set out in this License. Upon termination of this License for any reason, you shall immediately cease all use of the Software, remove the Software from your computer.
YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT USE OF THE SOFTWARE IS AT YOUR SOLE RISK AND THAT THE ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE, ACCURACY AND EFFORT IS WITH YOU. THE SOFTWARE IS PROVIDED "AS IS", WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR PERSONAL INJURY, OR ANY INCIDENTAL, SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES WHATSOEVER, INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, LOSS OF DATA, BUSINESS INTERRUPTION OR ANY OTHER COMMERCIAL DAMAGES OR LOSSES, ARISING OUT OF OR RELATED TO YOUR USE OR INABILITY TO USE THE SOFTWARE, HOWEVER CAUSED, REGARDLESS OF THE THEORY OF LIABILITY (CONTRACT, TORT OR OTHERWISE) AND EVEN IF THE AUTHOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME JURISDICTIONS DO NOT ALLOW THE LIMITATION OF LIABILITY FOR PERSONAL INJURY, OR OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION MAY NOT APPLY TO YOU.
If for any reason a court of competent jurisdiction finds any provision of this License, or portion thereof, to be unenforceable, the remainder of this License shall continue in full force and effect.