Home > By category > Security & Privacy >Encryption Tools > Email Encryption End-to-End



Email Encryption End-to-End

  • Downloads: 
  • Views: 
  • Rating:

\'Email Encryption End-to-End\' is designed to make it easy to send and receive encrypted email securely. It can be used to encrypt a message to be sent via any email program (including Outlook Express) and any webmail that supports attachments (files attached to a message). The encrypted message consists of a text message (up to 60 KB in size) plus, optionally, an appended file of any type (up to 1.93 MB in size). The message (including any appended file) is encrypted, and is attached to an ordinary email message, before it leaves your PC to go to the mail server, and it remains encrypted during transmission to the recipient\'s ISP and while being downloaded to the recipient\'s PC. Thus the message is encrypted "end-to-end", and, if intercepted anywhere between your PC and the recipient\'s PC, cannot be read. The program uses a symmetric key method; thus the key used for decryption is the same as the key used for encryption. It is bilingual English/German and works with text in languages other than English.

Free download from Shareware Connection - This program is for sending and receiving encrypted email messages (optionally with an appended file) and is designed to be both secure and easy to use. It uses a symmetric key method. It works with any email program and is bilingual: English/German.

Publisher: Hermetic Systems | License: Shareware | Price: 39.75
Version: 11.52 | Size: 1512 KB | Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64
Released Date: 23-10-2013 | Rating: 0 | Title: Email Encryption End-to-End

Author Url: http://www.hermetic.ch/
Program Info Url: http://www.hermetic.ch/eee/eee.htm
Download Url: http://www.hermetic.ch/eee/eee_setup.zip
Screenshot Url: http://www.hermetic.ch/eee/screenshot.png

More downloads from Email Encryption End-to-End publisher Hermetic Systems:

Factorizer - A program to find prime numbers and pairs of primes, to decompose numbers into their prime constituents, to find all factors of any positive integer up to 2,147,483,645, and to plot Erdos-Kac and Palmen Color histograms.

Data Destroyer Disk Wipe - A disk wipe program which overwrites many times data in the free space on a disk and in all files and folders (except selected top-level folders) so that the data cannot be recovered. Purge type is specifiable. Provides an estimate of time needed.

Easy Graphics File Converter - Converts from GIF, JPG, PNG and BMP graphics files to JPG, PNG and BMP files. Allows single or multiple file conversion. Can convert to JPGs over a range of quality/compression values for optimization. Converted files displayed in your browser.

Chinese Calendrics - A program to convert between dates in various Chinese calendars and dates in the Gregorian and Julian calendars, and to find lunar new year's day and leap months for any year in the Chinese Calendar.

Data Destroyer - A program for secure file deletion and disk wipe which destroys (by overwriting) data in multiple files and multiple folders on floppy, ZIP or hard disk so that the data cannot be recovered. Single-file or batch-mode operation.

Email Encryption End-to-End keywords:
Email Encryption End-to-End related downloads:

End-to-End Encryption - Implements end-to-end data encryption between browser and the application or database server. HTTPS can only protect data up to the Web Server.

Java Web Example Guide End To End Chapter - This is an end to end example of how to use Builder JA (Java Builder) to create a full web application that utilizes data and WebFigures to display MATLAB Figurues on the Web in an interactive way

DotNet Web Example Guide End To End Chapter - This is an end to end example of how to use Builder NE (.NET Builder) to create a full web application that utilizes data and WebFigures to display MATLAB Figurues on the Web in an interactive way.

myIPTV - end-to-end IPTV solution on WEB - Open IPTV end-to-end solution.

BigQuery End-to-End Client - This mobile app is part of the sample application described in Chapter 8 of the book "BigQuery End to End". The source code for the application is available as part of the book downloads and is also hosted at http://bigquery-e2e.googlecode.com/. ...

Shareware Connection periodically updates pricing and software information of 'Email Encryption End-to-End' from company source 'Hermetic Systems' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft,  Using 'Email Encryption End-to-End' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of Email Encryption End-to-End.

New Reviews

DataLocker SkyCrypt - Storing data in external hard drive is what any PC user can resort to but Cloud storage is gaining popularity with time. It gives you more flexibility and you can avail free and cheaply priced data storage in cloud as well. The only aspect that ...

Adobe SpeedGrade - Adobe has been a long time player in video editing and post production sector, with apps like Premier Pro and AfterEffects winning accolades and keeping customers hooked for several years. To cater to a niche section of the target users, it has ...

Autodesk Smoke - Autodesk is the company well known for making some of the most feature rich and versatile tools for 3D modeling, animation and engineering design related work. Its Smoke is a Mac OS specific app that is aimed at professionals involved in ...

FileStream TurboBackup - Nowadays, data security and backup have become commonplace activity for nearly all PC users. You need to backup precious data either in external media or cloud storage services to evade circumstances like hard disk failure or malware invasion. ...

Apple Aperture - It is quite true that Macintosh users generally get fewer tools to pick from than Windows users but they have some solid and impressive software to work with. One such example is Apple’s professional image editing and organizing tool, ...

Spark Browser - Nearly every PC user needs to browse the web nowadays, irrespective of age and gender. Whether you use a laptop or desktop, it is mandatory to use a web browser to access web or download files. There was a time a majority of Windows users ...

Screenshot Captor - Nowadays, a lot of Windows users need to take screenshots for professional and personal usage needs. It may be required to share an interesting image from web site or part of web pages with friends, making tutorials etc. However, freeware screen ...

Reallusion iClone - Nowadays, there is no scarcity of 3D animation and modeling software in market. However, not all such apps are user friendly and easy on wallet. If you want an intuitive and capable tool for making 3D animations without requiring much time, give ...

DVDFab DVD Copy - While a lot of computer users are switching from optical media to external and cloud storage services, a section of them still counts on DVD for storage and movie watching. At times it also becomes necessary to copy those DVDs that are getting ...

Adobe Media Encoder - Almost every PC user faces a situation where he or she needs to convert an audio or video file fast into a format of choice. There are several free and commercial apps, but the abundance of options can actually make selection difficult. If you ...




New Downloads

PDF Postman

With PDF Postman, you can send
secure Outlook email messages
in a manner that is easy for
recipients to receive on any
...

HomeGuard Activity Monitor
64 bit

HomeGuard is an advanced
parental control and activity
monitoring tool for family and
child safety online and
offline. ...

ZenVPN

ZenVPN lets you access blocked
or geo-restricted websites,
protect your connection from
snooping by ISP and conceal
your ...

OpenVPN WatchDog

OpenVPN WatchDog is a program
designed to monitor your
OpenVPN connection and ensures
that you do not blow up your
...

WPSecurity

Malware Detection and
Blacklist FREE Checking Tool
New malware detection
techniques recently introduced
we will check ...

NoteGuardian

NoteGuardian securely stores
and organizes your sensitive
information in an encrypted
database. NoteGuardian is
ideal ...

360 Internet Security

360 Internet Security is a
powerful security solution
that aims to provide a full
spectrum of protection for
your system ...

iKeyMonitor

iKeyMonitor is a keylogger for
iPhone/iPad/iPod touch that
logs keystrokes, passwords,
calls, SMS, WhatsApp messages,
GPS ...

Spy Emergency

Anti-Spyware, Anti-Trojan,
Anti-Spam Solution that fast
and secure removes spyware,
viruses, spam and other
malware from ...

Secure Windows Auditor

Secure Windows Auditor A must
have windows security software
for information security
professionals to conduct
in-depth ...

ZenMate for Chrome

ZenMate Security & Privacy
VPN: Unblock geo-restricted
sites, hide your IP &
secure your browser by
encrypting ...

Webcam Zone Trigger

Traditional software simply
alerts you when motion is
detected within the camera\'s
view. Zone Trigger lets you
decide ...