encryption technology shareware downloads


Search results for «encryption technology»:

Stealth Encryptor 6.2 Stealth Encryptor 6.2
… Blowfish encryption. It features an extremely flexible and easy to use interface. Files and folders can be encrypted, decrypted or shredded right from the Windows Explorer when you right click.… 

Private Encryptor 7.1 Private Encryptor 7.1
… Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an encrypted email message does not have to buy the program.… 

Encryption Workshop 3.2 Build 060220 Encryption Workshop 3.2 Build 060220
… tion algorithms exist on the market. While they all employ the same ideas they don't necessarily have to be binary compatible. Therefore, it may happen that files encrypted by Encryption Workshop will not be decrypted by other software or vice versa.… 

K-Crypt AES Encryption 2.5 build 6 K-Crypt AES Encryption 2.5 build 6
…  file you wish to encrypt, provide a password to encrypt the file, and click on 'Encrypt!'. Only the correct password will descramble the encrypted file back into its original state.Value your data! Don't allow your privacy to be compromised.… 

WinEncryptor 1.3 WinEncryptor 1.3
… am. Built-in tutorial. No 'back doors'. No 'footprint' or ghost copies of unencrypted files left on the hard disk. No storage of your encryption password...not in the registry, not in the file.... nowhere! Limitations 11 Free Uses… 

Solid Encryption 1.21 Solid Encryption 1.21
… efore you decide to order this encryption software. There are no backdoors of any kind, we have no "secret" information that will help anyone brake your codes. File encryption - and clipboard data encryption software Limitations 30 days… 

A-one Folder Encryption 3.08 A-one Folder Encryption 3.08
… features of "A one Folder Encryption": Fastest and Simplest, with one-click Encryption and Decryption When Folder Encrypted, folder not only can't be accessed, but can't be copied, deleted, and moved , renamed .... Provide password setting f… 

Rohos Desktop security 1.11 Rohos Desktop security 1.11
… ly any Application. Rohos provides individuals a simple, easy-to-use desktop encryption solution to protect digitally stored information with an integrated solution based on strong, broadly accepted security technology. Limitations 40 days trial… 

G-Soft Encryptor 2006 1.1.0 G-Soft Encryptor 2006 1.1.0
… ns either by "keygenning" it, or "bruteforcing" it. HSkey is not yet been 100% inprented here, but the encryption methods still works, and are quite usefull against unwanted people to read or access your files. Requirements MS VB Runtime files… 

RightClick-Encrypt 1.4 RightClick-Encrypt 1.4
… cognition of file contents using revolutionary icon-overlay technology! - All algorithms improved in safety using key-vectoring and other key management technologies developed by ZaberSoft. - Create SelfDecrypting files - USB Hardware interface… 


Related: encryption technology  encryption security security file utilities encryption tools shredder utility hide files hide folder  md5 rfc1321 encryption encryption  transparent encryption on the fly encryption  technology the