Download mirrors for fsesetup.exe

Best Folder Encryptor 16.83 Download Mirrors

Setup file fsesetup.exe - 3.72 MB - Win2000,WinXP,Win7 x32,Win7 x64,Windows 8,Windows 10,WinServer,WinOther,Windows2000,Windows2003,Wind - Support
All files are original. Download3K does not repack or modify downloads in any way. Check SHA1 and MD5 for confirmation.
Buy or select mirror:

File information

  • Filename: fsesetup.exe
  • Size: 3.72 MB
  • License: Shareware
  • Date updated: 9/7/2015
  • Total Downloads: 564
  • Last week: 1

  • Short file info:
    PE32 executable for MS Windows (GUI) Intel 80386 32-bit

  • MD5 checksum:
    9a23649627b20224e6b2e2852888dd62

  • SHA1 checksum:
    503b2708300d0359c7bc6b55e927d82951b45244

  • Download time
  • Dialup 9 m (56k)
  • ISDN 4 m (128k)
  • DSL 59 s (512k)
  • Cable 29 s (1024k)
  • T1 20 s (1484k)

  • File section
    File Type: Win32 EXE
    MIME Type: application/octet-stream
    EXE section
    Machine Type: Intel 386 or later, and compatibles
    Time Stamp: 1992:06:20 01:22:17+03:00
    PE Type: PE32
    Linker Version: 2.25
    Code Size: 40448
    Initialized Data Size: 17920
    Uninitialized Data Size: 0
    Entry Point: 0xa5f8
    OS Version: 1.0
    Image Version: 6.0
    Subsystem Version: 4.0
    Subsystem: Windows GUI
    File Version Number: 16.8.3.0
    Product Version Number: 16.8.3.0
    File Flags Mask: 0x003f
    File Flags: (none)
    File OS: Win32
    Object File Type: Executable application
    File Subtype: 0
    Language Code: Neutral
    Character Set: Unicode
    Comments: This installation was built with Inno Setup.
    Company Name: DoGoodSoft
    File Description: Best Folder Encryptor
    File Version: 16.8.3.0
    Legal Copyright: Copyright © DoGoodSoft. All rights reserved.
    Product Name: Best Folder Encryptor
    Product Version: 16.83

Short description

Best Folder Encryptor is an encryption package to protect the content of any folder that you like. Files and folders can be encrypted using powerful algorithms that keep the information locked away. Five encryption methods may be used.... more
User rating
5/5 (5 votes)
Excellent
Your rating
Your review