security algorithm shareware downloads


Search results for «security algorithm»:

Cipherlok 2.1 Cipherlok 2.1
… when, for example, travelling with a notebook computer. A secure file delete function ensures that deleted files cannot be retrieved. Cipherlok works either with traditional passwords or for extra security can use our USB Cipherlok Tokens.… 

Computer Security 1.5 Computer Security 1.5
… lcomed quests". Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with a random number of layers of data.… 

DataGuard 2.0 DataGuard 2.0
… DataGuard protects your applications or clients' sensitive information with a security control that has a powerful byte/binary encryption algorithm. Encrypt any type of file as well as strings with one line of code. Key codes can be… 

CipherNote 1.0 CipherNote 1.0
… ormation in a secure way without incurring the overhead of most secure systems. It allows you to informally jot down ideas, keep some private names and numbers handy or just to store any private information without worry. The Blowfish algorithm p… 

Secure Disk 2.22 Secure Disk 2.22
…  and proven Blowfish cryptographic algorithm will make your encrypted disk unconquerable Very fast encryption. You may even not notice the time it used. Easy to use. Both the creation of a new container and the mount process are very simple. Su… 

ShadowSecurityScanner 7.55 ShadowSecurityScanner 7.55
… ithm based on a patented “intellectual core”. SSS performs the system scan at such a speed and with such a precision so as to be able to compete with the professional IT security services and hackers, attempting to break into your network.… 

MrG File Encryption 2.0 MrG File Encryption 2.0
… n program, you can take your secret to antwhere with no worry. The perfact ability got Mr.G File Encryption high value in the customer group.Mr.G File Encryption was used broadly under personal and commercial. Limitations 15 days trial… 

CypherZIP 1.0.0 CypherZIP 1.0.0
… (SHA256), safer than the 128/160 bits used by others. CypherZIP is very affordable since it can also be called through the MS-Windows Explorer context menu. If you need privacy in ZIP files, you need CypherZIP! Limitations 30 day trial… 

EugeneShredder 1.20 EugeneShredder 1.20
… s with single pass wiping and also use most secure NSA erasure algorithm. EugeneShredder makes it easy to: - Quickly wipe private data within a few minutes. - Wipe secret data using more secure algorithm (NSA). Limitations 7 days trial… 

Aes-Up 2.0 Aes-Up 2.0
… rity, usability and cost. Aes-Up's unique combination of features and technology defines a new point on this three-way relationship, creating a compelling proposal designed to meet the security needs of modern businesses. Limitations 30 day trial… 


Related: security algorithm  disable programs security parental control security audit  algorithm and  algorithm  algorithm for