volume encryption shareware downloads


Search results for «volume encryption»:

BestCrypt Volume Encryption 5.12.3 BestCrypt Volume Encryption 5.12.3
… e sectors' data can be saved to file or restored from file. BestCrypt volume encryption supports a special technology allowing an easy translating the software to any language. Adding new text file to "Language" subfolder (in the folder where the s… 

Solid Encryption 1.21 Solid Encryption 1.21
… efore you decide to order this encryption software. There are no backdoors of any kind, we have no "secret" information that will help anyone brake your codes. File encryption - and clipboard data encryption software Limitations 30 days… 

CryptoExpert Express 2.1 CryptoExpert Express 2.1
… ion algorithms! No access possible under any circumstances. If you do not remember the password you cannot access the encrypted contents. There is no special procedure, secret code, or hidden entry method to fall back on. Limitations 30 days trial… 

Deltacrypt OneClick Public Key File Encryption 2.1 Deltacrypt OneClick Public Key File Encryption 2.1
… by simulating decryption process in real decryption time when used with a false private key. It encrypts binary units of information, therefore it can cipher any file formats with its 768-character key and has no encryption volume limitation.… 

A-one Folder Encryption 3.08 A-one Folder Encryption 3.08
… features of "A one Folder Encryption": Fastest and Simplest, with one-click Encryption and Decryption When Folder Encrypted, folder not only can't be accessed, but can't be copied, deleted, and moved , renamed .... Provide password setting f… 

Rohos Disk Encryption 1.16 beta Rohos Disk Encryption 1.16 beta
… Rohos Disk Encryption creates virtual, encrypted and hidden volumes on your computer. To access this volume you can use password or USB flash drive with a password key. Rohos disk integrates with… 

CryptoExpert 2007 Professional 7.1.1 CryptoExpert 2007 Professional 7.1.1
… e encrypted contents. There is no special procedure, secret code, or hidden entry method to fall back on. Looks like normal hard drive Requirements Pentium 166 based IBM PC compatible computer (or higher) 32 Mb of free memory About 1900 Kb fr… 

StealthDisk 2004.1.909 StealthDisk 2004.1.909
… ations The evaluation version of StealthDisk has a password limitation of only 2 characters. This is highly insecure and very easy to guess. It is meant for testing and evaluation purposes only. Otherwise, everything else is fully functional.… 

Encryption Workshop 3.2 Build 060220 Encryption Workshop 3.2 Build 060220
… tion algorithms exist on the market. While they all employ the same ideas they don't necessarily have to be binary compatible. Therefore, it may happen that files encrypted by Encryption Workshop will not be decrypted by other software or vice versa.… 

mariahash the 64-bit encryption 1.0.1 mariahash the 64-bit encryption 1.0.1
… is a fast 64-bit encryption using proprietary hashing method. Cyphering quality depends on a prime keypair and password contents and length. Password must be stored in password.txt and contain not less then 50 and no more than 100 characters.… 


Related: volume encryption  BestCrypt Volume Encryption  encryption security security file utilities encryption tools shredder utility hide files hide folder  md5 rfc1321 encryption encryption  transparent encryption on the fly encryption