blowfish files security encypt files shareware downloads


Search results for «blowfish files security encypt files»:

Cipherlok 2.1 Cipherlok 2.1
… when, for example, travelling with a notebook computer. A secure file delete function ensures that deleted files cannot be retrieved. Cipherlok works either with traditional passwords or for extra security can use our USB Cipherlok Tokens.… 

BlowFish 2000 3.1 BlowFish 2000 3.1
… ly encrypted and decoded directly from the MS Windows Explorer by using the pop-up context menu. This utility uses the Blowfish encryption algorithm. BlowFish can be configured to optionally place its program icon in the taskbar notification tray.… 

USA Shield 2.15 USA Shield 2.15
…  shredder - Matches and exceeds DOD specifications (U.S. Department of Defense). No back doors or escrow keys - There is absolutely no way of recovering your information without the correct password, so be careful not to forget your password.… 

Computer Security 1.5 Computer Security 1.5
… lcomed quests". Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with a random number of layers of data.… 

VBSecure 2.0 VBSecure 2.0
… fish as its main encryption engine, allowing you to protect private and sensitive data from potential unauthorized access. Software registration and security doesn't get any easier than this. Download our free trial and see you for yourself.… 

Crypter 1.2 Crypter 1.2
… onger than DES. Fast and secure, it uses a 'Shared Secret' key. This encryption utility is small enough (814k) that you can keep it on a floppy disk, and therefore use it anywhere; there's nothing to install. Nothing complicated to learn.… 

Cryptonight 1.0 Cryptonight 1.0
… nd decrypt messages and files. It uses state of the art encryption technologies to ensure that your data remains safe. Keep your passwords and credentials in the Cryptonight safe. Methods used to encrypt: Blowfish DES Triple DES Rijndael… 

CipherNote 1.0 CipherNote 1.0
… ormation in a secure way without incurring the overhead of most secure systems. It allows you to informally jot down ideas, keep some private names and numbers handy or just to store any private information without worry. The Blowfish algorithm p… 

Cryptgine Windows Plugin 1.0 Cryptgine Windows Plugin 1.0
… nfolocks.com including blowfish, twofish, skipjack, GOST, and DES. The Cryptgine Security Engine also incorporates a method of securely deleting files. The method is based on several different methods to wipe the file from your computer.… 

Data Stash 1.5 Data Stash 1.5
… can hide sensitive document files into a bitmap file, and retrieve them later. Opening the bitmap file would only show the image of the bitmap, and not the files that are stored in it. You can hide files into .exe, .com, .mpg, and so on.… 


Related: blowfish files security encypt files  security files  security for files and folders  encryption security security file utilities encryption tools shredder utility hide files hide folder  Batch Split PDF Files into Multiple Files