AEScrypt
- Downloads:
- Views:
- Rating:

Small stream encryption program for Unix
Free download from Shareware Connection - Small stream encryption program for Unix
Version: 0.7 | Size: 61 KB | Platform: Linux, Unix
Released Date: 13-06-2012 | Rating: 0 | Title: AEScrypt
Author Url: http://aescrypt.sourceforge.net
Program Info Url: http://aescrypt.sourceforge.net
Download Url: http://netcologne.dl.sourceforge.net/project/aescrypt/aescrypt/0.7.0/aescrypt-0.7.tar.gz
Cryptainer LE Gratis Encryptie Software
Hotspot Shield Elite
Folder Lock Free
SmartHide
Folder Password Expert
Touch Hider for S60 E5/Symbian ^3
Touch Crypto for S60 E5
Touch Hider for S60 E3
GiliSoft USB Stick Encryption
CryptoForge
Touch Crypto for S60 E5/Symbian^3
USB Encryptor
imlSoft USB Disk Guard
File Encryption XP
Anti-Spam & Anti-Spy Tools
Covert Surveillance
Encryption Tools
Firewalls
Internet Security
Online Privacy
Other
Password Managers
Pop-Up Killers
Freeware Password Encryption Unix
Encryption Java Mobile Small
Small Media Player Dvd Stream
Unix Program
Auto Unix Emulator Program
Shareware Connection periodically updates pricing and software information of 'AEScrypt' from company source 'aescrypt.sourceforge.net' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'AEScrypt' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of AEScrypt.
Trend Micro HouseCall - With time, PC users find it increasingly difficult to keep their systems free of malware and rogue apps, despite using latest and feature packed security software. This is mostly owing to the evolving nature of malware and newer types of ...
NovaBench - PC performance benchmarking is something that may not interest average users much but tech savvy lot resort to such apps to find out prowess and capability of their laptops and desktops. While there are quite a few PC benchmarking apps in market, ...
PureSync Personal - When you use computers, there is no way you can escape using specialized third party software. These need to be used for various needs including office productivity, web access, taking back-up and ensuring proper synchronization across multiple ...
360 Internet Security - Using a computer without having capable Security software installed is equivalent to sleeping with your house’s main door wide open. Whether you use a PC at home or manage a network of computers at the workplace, PC security suite has ...
SeaTools for Windows - Among all the hardware components used in a desktop or laptop, the hard disk is a prime one. In the hard disk is not in good shape, even a PC with powerful CPU and lots of RAM will malfunction or run sluggishly. Hard disk failure can lead to data ...
ArtSage - PC users often need to make use of third party applications for making slideshows. While Windows inbuilt utility for viewing images and running slideshows keeps getting better with time, for many users third party apps seem better option. If you ...
Norton Security with Backup - Symantec is an old time player in PC security and its various security suites with Norton brand name are used all over the world. With time, Norton security apps have been tweaked to consume fewer resources and they come with several bells and ...
Bitcasa - The way computing technology evolves is quite amazing. Even a few years back data backup was limited mostly to external hard drives and DVDs. However, the proliferation of high speed internet access and emergence of cloud storage services have ...
Windows Live Family Safety - Using parental control applications has become a necessity for those people who have tech savvy kids and computers at home. In fact, you should use such software even if your kid is not tech savvy. Needless to say, children depend on internet for ...
Emsisoft Emergency Kit - The way malware creators and hackers are adapting to newer measures to sneak past PC security, it is no longer enough to stay complacent after installing a standalone antivirus. You never know when a stealthy malware sneaks past its scan and ...

