Question Ax crypt: is it good or just a complete waste of time

Please provide comments and solutions that are helpful to the author of this topic.

Frogish

Level 1
Thread author
May 3, 2022
17
I use to have this software on my pc a long time ago but tbh i have no idea how reliable it is. So my basic question is: is it even worth bothering with it. I run wind11 at the moment and don have access to EFS unless im terrible misstaken. And i use it to encrypt folders with sensetive information more or less.


Thanks in advance
 
  • Like
Reactions: I Walk MY Way

Bot

AI-powered Bot
Apr 21, 2016
3,641
Ax Crypt is a reliable encryption software that you can use to secure your sensitive data. It provides strong encryption that can protect your files from unauthorized access. However, it's always a good practice to have multiple layers of security, so you might want to consider using other security measures, such as two-factor authentication or access controls. Overall, Ax Crypt can be a valuable addition to your security toolkit.
 
  • Like
Reactions: I Walk MY Way

Frogish

Level 1
Thread author
May 3, 2022
17
Ax Crypt is a reliable encryption software that you can use to secure your sensitive data. It provides strong encryption that can protect your files from unauthorized access. However, it's always a good practice to have multiple layers of security, so you might want to consider using other security measures, such as two-factor authentication or access controls. Overall, Ax Crypt can be a valuable addition to your security toolkit.
I use 2fa all over the place but are you telling me i can set it up with axcrypt as well ?
 

Bot

AI-powered Bot
Apr 21, 2016
3,641
I use 2fa all over the place but are you telling me i can set it up with axcrypt as well ?
Apologies for the confusion in my previous response. Ax Crypt does not offer built-in support for two-factor authentication (2FA) or access controls. However, you can use Ax Crypt in combination with other tools or programs that support 2FA or access controls to enhance the security of your encrypted files.
 
  • Like
Reactions: Frogish

Frogish

Level 1
Thread author
May 3, 2022
17
Apologies for the confusion in my previous response. Ax Crypt does not offer built-in support for two-factor authentication (2FA) or access controls. However, you can use Ax Crypt in combination with other tools or programs that support 2FA or access controls to enhance the security of your encrypted files.
Would you be kind enough to recommend preferably a free version of a software that applies that function ?
 

Bot

AI-powered Bot
Apr 21, 2016
3,641
Would you be kind enough to recommend preferably a free version of a software that applies that function ?
There are several free software options that you can use in combination with Ax Crypt to add 2FA or access control functionality to your encrypted files. Here are a few options:

1. Veracrypt - this is an open-source encryption software that works similarly to Ax Crypt but provides additional features such as multiple authentication factors and access controls.

2. AxCrypt Premium - while there is a free version of AxCrypt, the premium version offers some additional functionality such as password-protected key sharing and two-factor authentication.

3. Cryptomator - this is a free, open-source encryption tool that works by creating encrypted virtual drives. It supports two-factor authentication for additional security.

Keep in mind that these tools may have different levels of functionality and security, so be sure to thoroughly research and compare the options to find the one that best fits your needs.
 

Frogish

Level 1
Thread author
May 3, 2022
17
Ive be
There are several free software options that you can use in combination with Ax Crypt to add 2FA or access control functionality to your encrypted files. Here are a few options:

1. Veracrypt - this is an open-source encryption software that works similarly to Ax Crypt but provides additional features such as multiple authentication factors and access controls.

2. AxCrypt Premium - while there is a free version of AxCrypt, the premium version offers some additional functionality such as password-protected key sharing and two-factor authentication.

3. Cryptomator - this is a free, open-source encryption tool that works by creating encrypted virtual drives. It supports two-factor authentication for additional security.

Keep in mind that these tools may have different levels of functionality and security, so be sure to thoroughly research and compare the options to find the one that best fits your needs.
en using veracrypt for years and i had no idea it had that kind of functionality. Tbh if they all suppors AES im happy.
 

Bot

AI-powered Bot
Apr 21, 2016
3,641
en using veracrypt for years and i had no idea it had that kind of functionality. Tbh if they all suppors AES im happy.
Yes, all the tools I mentioned support AES encryption, which is one of the strongest encryption algorithms used for securing data. Veracrypt is a popular choice for its robust encryption and additional features such as multiple authentication factors and access controls. It's great to hear that you've been using it for years!
 
  • Like
Reactions: I Walk MY Way

Frogish

Level 1
Thread author
May 3, 2022
17
I have an odd problem btw. Everytother time i turn on the pc its extremely slow and wont boot after i provide the password for veracrypt. Then i reboot and everything is fine. Its getting a bit on my nerves since i have to boot up the pc twice every time i need to use it.. got a clue whats going on ? Fast boot is on and secure boot is enabled as well
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top