Software Listing: Encryption Tools

USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network - like the Internet- and still remain secret. Later, the information can be decrypted into its original form. USA Shield integrates the strongest cryptography available today into the Windows environment..

  • Platform: Win2000, Windows Server, WinOther

AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt answer-back messages with the proper password. No other software is required. These active AES-files are ideal for safe electronical distribution of the information because they contain multiple compressed and encrypted files and folders. This feature is especially convenient for sending encrypted files to people who do not have PGP or CHAOS Public Key installed.

  • Platform: Win2000, WinOther

Touch Crypto is the best encryption tools designed specially for touch screen mobile. It uses 128bits AES algorithm to encrypt your private files - photos, multimedias, audios, videos, songs, voice - all confidential documents on your mobile! It is safe, fast and easy! Without password, no one can access your encrypted data. Nowadays, smart mobile has the massive storage capacity to contain all your digital documents and medias, including those security sensitive ones. Do you have any security document which mustn't be read by others? Do you have any images or videos, that shouldn't be watched by others? If yes, you need file encryption tool to protect your contents, Touch Crypto is the smart encryption tool just for you.

  • Platform: Symbian

Update to 1.80! Touch Crypto is the best encryption tools to protect your private files - photos, multimedias, audios, videos, songs, voice - all confidential documents on your mobile! It uses 128bits AES algorithm to encrypt your files. Without password, no one can access your encrypted data.

Just find your file, tap a button, encrypt it! The Safe File Index records and collects all your encrypted file indexes, by which you can process all your encrypted files in just the Safe File Index in a centralized way

Features:
- 128bits AES algorithm for file encryption
- Encrypt or decrypt files in batches
- All founction has shortcut, fast operation
- Safe File Index:
- Encrypt or Decrypt operation on a file in the folder view will add an index into - Safe File Index
- Encrypt and Decrypt operation on...

  • Platform: WinOther

Update to 1.80! Touch Crypto is the best encryption tools designed specially for touch screen mobile. It uses 128bits AES algorithm to encrypt your private files - photos, multimedias, audios, videos, songs, voice - all confidential documents on your mobile! It is safe, fast and easy! Without password, no one can access your encrypted data.

Nowadays, smart mobile has the massive storage capacity to contain all your digital documents and medias, including those security sensitive ones. Do you have any security document which mustn't be read by others? Do you have any images or videos, that shouldn't be watched by others? If yes, Touch Crypto is the smart encryption tool just for you.

  • Platform: WinOther

Dowbload free news and current events, opinion, religion, crimes, economics, energy, environment, military, politics,society, weather, CHMOD calculator, security & privacy software, encryption tools. US News and Current Events. Article Point US News and Current Events.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther, WinVista

Dowbload free news and current events, opinion, religion, crimes, economics, energy, environment, military, politics,society, weather, CHMOD calculator, security & privacy software, encryption tools. US News and Current Events. Article Point US News and Current Events.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther, WinVista

Dowbload free news and current events, opinion, religion, crimes, economics, energy, environment, military, politics,society, weather, CHMOD calculator, security & privacy software, encryption tools. US News and Current Events. Article Point US News and Current Events.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther, WinVista
  • hcrypto
  • License: Freeware
  • Price: 0.00
  • Rating

Command-line strong encryption tools including: triple cascaded encryptor, multiple hash calculator and multiple block cipher encryptor. Supports AES, Serpent, Twofish, SHA-512, RIPEMD-160, MD5 and other algorithms..

  • Platform: Linux, Unix, WinOther
  • dzsutils
  • License: Freeware
  • Price: 0.00
  • Rating

A set of very useful utilities from icon extraction tool for everyday use to free encryption tools and sound analysis software aimed at any healthcare professional interested in improving his/her cardiac auscultation skills.
dzsutils License - Public Domain.

  • Platform: WinOther

Free download health, bodybuilding, nutrition, yoga, medical conditions, fitness, pregnancy, holistic alternative, aids, cancer, hair loss, skin, acne, asthma, heart, diabetes, CHMOD, CHMOD calculator, security & privacy, access control, encryption tools, software..

  • Platform: Win2000, Windows Server, WinOther, WinVista

File encryption/decryption tools with strongest AES algorithms. Can generate the hash of the source file as password for symmetric encryption(64 digits password). Encryption strength AES Rijndael: 256 bit / Hash: SHA-256.

  • Platform: Win2000, Windows Server, WinOther

Xidie it's a complete security suite with many modules integrated into a single application. By acquiring Xidie you have: Xidie steganography: is one of the most complete, innovative and complex application in steganography branch. Offer over 40 carrier types including many new technologies like ADS, Microsoft Office carrier, Registry keys etc.Most of carrier types implemented in Xidie are unique: Tiff and Word, Excel workbooks, Access databases Registry keys, Microsoft console documents, Event log files Cookies, subtitles, dictionary and PDF documents Alternate data streams and attaching method with multiple files carrier.

  • Platform: Win2000, WinOther

This encryption software is easy to use,and it have many power features.The features as the following:It can encrypt files of any type or length. The encrypted file can be used without decrypting by Encryption Shield. Double-click the file, then a password input box will popup. After putting in the correct password, then you can open it, edit or save the file. After closing it, it is still in encrypted state, and there is no need to encrypt it again.Using powerful algorithms to encrypt files/folders: Rijndael with 256 bit key (AES 256, now it is Advanced Encryption Standard), Blowfish, DES, 3DES, and there is no possibility for decryption.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Encrypting/Decrypting E-Mail Messages, Encrypting/Decrypting Text Messages, Encrypting/Decrypting Files. Antum stand alone program. Based on AES 256 Bit Encryption. Advanced Add-In (Ribbon) for Outlook 2007/2010 Fast Encrypt/Decrypt Online Tools for Social Networking and much more..

  • Platform: WinOther

Extremely fast and reliable image file encryptor/decryptor with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form..

  • Publisher: AMBITWARE
  • Date: 10-06-2004
  • Size: 4927 KB
  • Platform: Unix, Win2000, WinOther

Antivirus Program, Personal Firewall, Encryption Application TrustPort Phoenix Rebel Workstation is a security platform consisting of an antivirus program, personal firewall, encryption application, digital signature and on-line encryption tools. It is designed for the protection of individual workstations in the network as well as those of separate users. Phoenix Rebel Workstation combines the following programs into one system:

 - TrustPort Antivirus: Antivirus program that protects workstations from malicious software attacks.
 - TrustPort Personal Firewall: Personal firewall that defends the computer against attacks of hackers and Internet worms.

  • Platform: Win2000, WinOther

The Problem Most of the .NET code proctection tools out there either fall into the obfuscator category or shell-encryption tool category. A plain obfuscator is simply too weak and far from a decent protection, shell-encryption tools are a lot more secure than obfuscators thus you could see better .NET protection tools often come with obfuscation and encryption. The problem with these tools is they could only protect you to a certain level but still a determined cracker could still dump your code (MSIL to be precise) from the memory and reverse-engineer from there. How do you exactly put an end to this? Enter Maxtocode, along with the standard obfuscation and encryption methods, we employ an unique technology that protects your code real-time when your software are executed at your end users computer.

  • Publisher: Maxtocode
  • Date: 03-06-2007
  • Size: 3552 KB
  • Platform: Win2000, Windows Server, WinOther

Everybody has a right to privacy. Your confidential information can be saved as a file (photo, document, program, music or video file etc.). You do not want anyone to know your secret and anyone to suspect you have a secret. Insider allows the user to conceal details (of their private life or business) from unauthorized viewers. If the user needs to conceal confidential files, he can use various programs for protection. Meanwhile these programs do not allow use of the concealed data as easily and safely as you can with normally unprotected files. Our program is not available obviously. It is hidden inside another, absolutely inconspicious program (file compression utility).

  • Platform: Win2000, WinOther
  • CrypGen
  • License: Shareware
  • Price: 34.95
  • Rating

CrypGen is a universal file encryption and decryption tool. Its is: Ultimately Safe: CrypGen uses an AES based algorithm that has NEVER been Cracked; Representing the strength of AES, and a lot of improvements. Incredibly Fast: CrypGen has probably the fastest implementation of AES algorithm available today. It encrypts and decrypts in a blink of an eye! Easy to Use: It is easy to use. Its fabulous user interface gives you complete control over the encryption process, but keeps everything easy and ready to go. You don't need to know anything about the complications of encryption process, Crypgen handles everything for you, but if you want to take more control over the process, Crypgen gives you the necessary tools you need to do so Multi-Platform: Crypgen is available on Windows and Linux, having exactly the same user-interface in...

  • Platform: Linux, Linux Gnome, Win2000, Win7 x32, WinOther, WinVista

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


AM Browser

AM browser is a freeware browser from 2009, which markets itself allowing you to surf the web in a more comfortable, less confusing way. Once you install and open AM browser, the first thing you will notice is how out dated the look of it is. Most ...


Arkout 3D Deluxe

Arkout 3d deluxe (or as we'll say from here on, simply arkout 3d) is a three dimensional re imagining of the classic concept of arcanoid, also known as brick or breakout. In the original arcanoid game, the aim is the move your baton across the ...


Smart Defrag 2

From right back in the early days of Windows, there has always been a disk defragmenter included as standard, called (funnily enough) Disk Defragmenter. Its changed a lot as times have moved on and Microsoft upgraded Windows. There are many ...


Screencatch

There are numerous occasions when you need to take screenshot of anything on your computer. A screenshot is used for serving many purposes like tutoring, in eBooks, as electronic proofs etc.Taking screenshots is a relatively tedious task without ...


Access Controller

Access Controller is an application that helps secure your computer desktop whilst your away from it. When you're away from your computer, you can enable Access Controller so that a password is required to unlock your desktop and continue ...


Windows WinBest

Windows WinBest is an application, created to speed up your computer and remove junk files from your system. Right from the second I opened Windows WinBest, I become very skeptical about whether I’d like this application. Almost instantly, I ...


Joomla

Nowadays, most people use Joomla, Wordpress or Drupal to make their websites. Creating websites by the use of CMSs is an easy yet effective way as one does not require to code heavily. We’ll be talking about Joomla, a powerful Content ...


Vehicles 2

Vehicles 2 is a great example of innovation in a game, from the very beginning cut scene (which explains the general back story to the game in a very light, humorous way) to the gameplay style, it has a lot of influence from other games in the ...


FinalFortress

Final fortress is a free downloadable demo for the full game final fortress. Final fortress is  fixed location shooter mixed with RPG elements, which isn't a completely unique concept, but is done in a fairly unique way, with your large ...



New Downloads

Excel Add-in for MySQL

Devart Excel Add-in for MySQL
allows you to use powerful
Excel capabilities for
processing and analysis of
data from ...

Active@ Partition Recovery

Active@ Partition Recovery
provides you with everything
that you need to recover
deleted or damaged partitions.
It ...

True Burner

True Burner is a compact, easy
to use and powerful burning
software, which enables you to
make and burn standard, ...

dbForge Source Control for
SQL Server

dbForge Source Control for SQL
Server is a SSMS add-in for
managing SQL Server database
changes in source control. The
...

Polls Module for Directy
CMF

The Poll core module allows
administrator to create simple
polls. You ask a question,
provide possible answers, and
let ...

Usability Studio

No one likes to use tricky,
hard-to-comprehend websites
and programs. To determine
what specific problems does
user face ...

Zebra Total Video Converter

Zebra Total Video Converter is
capable of converting nearly
all popular videos formats
like AVI, MP4, WMV, MKV, MOV,
MPG, ...

Hardwipe

Hardwipe is a slick data
sanitization toolset used by
activists, journalists, IT
technicians and anyone needing
to ensure ...

TimeTrex Time and
Attendance

Web-based Time And Attendance
suite which offers Employee
Time and Attendance
(timeclock, timesheet) and
Payroll all in ...



Related Searches

Demand Encryption Tools
Acer Encryption Tools
Des Encryption Tools
Opensource Encryption Tools Windows
Simplified Aes Encryption Tools
Steganography Encryption Tools
Css Encryption Removal Tools
Data Encryption Removal Tools
Encryption Comparison Tools
Encryption Removal Tools
Encryption Shell Tools
Encryption Technology Tools