Advertisements
 
 
  You'll find a complete list of Encryption Tools software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
protection optimize editor notification

Encryption Tools

PREVIOUS     NEXT

Masking Password Generator Pro  Masking Password Generator Pro

 An industrial strength password or number generator for the individual home computer user or the large corporation or organization. Generating strong, difficult-to-crack random numbers or passwords has never been easier! Create one or many millions of passwords using simple wizards or a complex and very flexible masking syntax. Generate extremely obscure passwords, pronounceable passwords, or even passwords derived from words of the included dictionary. Have the generator obscure them as much or little as you like so they are very secure but still easy to memorize. Define a mask that incorporates your company security policy and generate passwords as often as you need without any more worry about password policy compliance. The program can reside in the Windows system tray, with a hot-key and default mask defined so that passwords can be generated and copied to the clipboard from within any application. Never before has a password generator included so many sophisticated and useful too...

Top Secret Crypto Gold  Top Secret Crypto Gold

 Top Secret Crypto Gold includes Top Secret Chat and Top Secret Journal, along with file and e-mail encryption. Includes the Sentry Spell Checking Engine for spell checking of your e-mail, journal, and chat messages. Conduct an encrypted peer-to-peer, computer to computer, secure chat over the Internet. Maintain an encrypted journal, or diary, of you daily thoughts, ideas, notes, etc. Free for personal private use. Commercial use requires an inexpensive license. Five new spell checking dictionaries: Danish, French, German, Italian, and Spanish. Now easy to use with any e-mail program including Yahoo! Mail, MSN Hotmail, Gmail, IncrediMail, or FoxMail. Visit the new support forum to get your questions answered. Select from 180 different smileys that can be inserted into your e-mail messages, journal entries, and chat sessions. Insert pictures into your e-mail messages and journal entries. Use the Virtual Keyboard that protects against keyboard logging and password sniffing programs to ent...

ATS Warning! The Boss!  ATS Warning! The Boss!

 Do you need to hide applications or windows from others? To surf the net without anyone seeing the contents of the sites you connect to? To keep a conversation by means of a messenger (such as ICQ)? To enter the number of your bank account with total privacy? Warning! The Boss! will let you preserve your privacy, hiding applications and windows, the icons in the systray, the icons in your desktop and silencing your PC. English and Spanish...

SuperEncryptor  SuperEncryptor

 SuperEncryptor is a powerful professional encryption tool. Tt provides the safest way to store your information or sensitive data and protect them against malicious or unintended intrusions. SuperEncryptor is designed to be easy to use with a nice and friendly interface. If you know how to use Windows Explorer, you know how to use it. Main functions: Encrypt Object, Encrypt into Host File, Encrypt to SDX, Encrypt EXE Files, Disguise Folder, Hide Folder, Password-Protect Folder, Lock Folder, Hide Disks, Password Management, Add Items to The Right Mouse Menu, ..., etc. Characteristic features: 1. It can encrypt files of any type or length. The encrypted file can be used without decrypting by SuperEncryptor. Double-click the file, then a password input box will popup. After putting in the correct password, you can open, edit or save the file. After closing it, it is still in encrypted state, and there is no need to encrypt it again. 2. It applies password protection to folders. With passw...

Digital Secure Disk  Digital Secure Disk

 SafeIT Secure Disk is a user-friendly program that allows you to prevent unauthorized access to restricted documents. The program makes a part of your current hard disk a secure disk. All private and confidential information stored on this disk will be protected using strong encryption. Now with unlimited disk size - store over 100 GB on a secure disk. Your secure disk is only accessible by entering the correct password. The program is easy to install and the step-by-step guides will walk you through the process of creating your own secure disk. After installation, the user friendly interface makes securing a file as easy as copying it. The encryption technology used supports several encryption algorithms, including the new AES-standard Rijndael with key length of 256 bits. If you prefer, you can also use Blowfish with a key length of 480 bits. Main features - Your ultimate solution for a laptop or workstation where you have a lot of sensitive information and you are looking for an eas...

Exe Wrapper  Exe Wrapper

 ( www.533soft.com ) Exe Wrapper allows you to protect any Exe-file with its own password from non- authorized execution. And it can modify the main icon of the .exe file. If you mean to keep people out of your personal stuff, add or modify the icon of executable file, add fixed argument to the execution, then Exe Wrapper is your right selection. Password is stored directly in the Exe-file. It is extremely easy to add any password to a program. An attempt to run a program that's wrapped will result in a dialog box launching asking for password. Failure to provide the correct password prevents the program from fully launching. Password is protected with high strength encryption algorithm. So do not forget your password. Exe Wrapper can change the main icon of executable file. Even if you move the file to another computer, the new icon will be displayed anyway. If you add an blank password and change the main icon, then no password dialog box will launch. So you can change the icon o...

AES Pro  AES Pro

 AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages....
 Advertisements

Advanced Outlook Password Recovery  Advanced Outlook Password Recovery

 A program to recover lost or forgotten passwords (including multilingual ones) to protected Personal Storage Files (*.pst) used by Microsoft Outlook (all versions: 97, 98, 2000, XP, 2003) to store emails, contacts etc. The program can also recover passwords to mail accounts created in Outlook 98/2000/XP/2003. All passwords are recovered instantly....

Secret Notes  Secret Notes

 Do you write passwords and other important information on paper? If you do, you are at risk. If you lose the paper, or worse, if someone saw or stole the paper with all of your important information, you will have to go through great deal of trouble getting into your accounts and setting things back to normal. Secret Notes enables you to have a secure place to keep your passwords, credit card information, and other important information. Secret Notes uses the same DES encryption used by the U.S. National Security Agency (NSA), banks, and military to encrypt your data to insure that only you have access to it. When you create a new Secret Notes file, you will be asked to enter a Master Password. This is the only Password that will allow access to your Secret Notes file....

Encrypt My Information  Encrypt My Information

 Encrypt My Information allows you to hide folders and encrypt files with on-the-fly AES encryption. Just create one or more encrypted secure folders from local folders and move your sensitive files into these specified folders and they will be encrypted/decrypted in real-time. You can work with the files as usual, and when you finish, lock the secure folder, which will store the files securely and also hide the entire folder from view....

The Panic Button - Privacy Software  The Panic Button - Privacy Software

 Privacy software to instantly clean your screen! Then restore your data later without losing anything; you can start again just where you left off. Just a keypress, mouse click or our unique screenwipe is all that is needed to keep your private data from prying eyes! The Panic Button is the ideal application for anybody concerned about privacy when using their computer in an environment where others may overlook their screen. * Keep personal matters private when at work * Avoid your children viewing unsuitable material * Guard commercial secrets * Hide or close applications instantly * Hidden windows do not show on taskbar/applications list * Optional password protection * Stealth Mode * Define windows to ignore or open new application * FREE 14-DAY TRIAL...

DeviceShield  DeviceShield

 Deviceshield acts as firewall that works on the INSIDE to control access to ALL Removable Media Devices. It protects your data from inside security breaches by removeable media devices such as USB memory sticks, CD/DVD drives, Firewire etc. DeviceShield iprotects the integrity of your company’s confidential data without restricting access to these files by any authorised employees – files can be automatically encrypted so they can even be taken out of the office in safety. You protect your network from invasive Viruses and Spyware by installing the very latest firewall and anti-virus protection, yet the security of your organization’s most sensitive information and intellectual property may remain totally exposed and vulnerable from the inside. Unless you have protection in place, massive amounts of sensitive data and intellectual property can simply be downloaded and removed without company knowledge. Client lists, account information, bids, contracts, R & D strategies, marketing ...

PlexCrypt Compression-Encryption  PlexCrypt Compression-Encryption

 PlexCrypt protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original document has not been maliciously or accidently altered. PlexCrypt can create self-decrypting files, which can be transfered to other users and can be decrypted without installing PlexCrypt. PlexCrypt can also shred or deletes documents securely. It supports MD5WithRSAEncryption, SHA1WithRSA/ISO9796-2, MD2WithRSAEncryption, RIPEMD160WithRSAEncryption, SHA1WithRSAEncryption, RIPEMD160WithRSAEncryption, MD5WithRSA/ISO9796-2 RIPEMD160WithRSA/ISO9796-2, RIPEMD160WithRSA/ISO9796-2 algorithms for digital s...

Spyware Medic  Spyware Medic

 Spyware Medic for Windows will protect the privacy of your personal information by removing Spyware, Adware, Key Loggers, Browser Hijackers, Malware and other dangerous programs that hide on your system and spy on you without your knowledge. Imagine someone peeping into your house, watching what you do and then telling others about it. This would be disturbing, annoying, and even dangerous, and this is exactly what Spyware does. What can Spyware on your system do? * Steal personal information about you * Steal your credit card details * Lead to Identity Fraud * Create Popup advertisements, making web browsing disturbing * SPAM people in your address book * Steal email message from Outlook or other email programs * Slow down your computer * Cause your web browser to crash frequently * Add unwanted icons to your desktop or Start Menu * Place unauthorized sites into to your internet favorites * Hijack your default home page and settings in a way that prevents you from changing them back *...

Privacy.ACCESS v3.6  Privacy.ACCESS v3.6

 Privacy.ACCESS is an access and authentication application that enables organizations and individuals to easily integrate access control capabilities into their existing networking systems, providing a secure NT logon enviroment for Windows 9x/Me - No more shared desktops or pressing escape to logon. Privacy.ACCESS is an easy to install, user friendly security application that ensures that only authorized users have access to proprietary computer systems, applications and information. Privacy.ACCESS is designed to provide optional password and fingerprint biometric authentication for enhanced security and administrative control. Privacy.ACCESS is a smart card technology based application. Smart cards are an ideal vehicle for authentication and access control. They contain a microprocessor in addition to ROM and RAM storage capabilities. These attributes enable smart cards to be customized for storing user profile information including passwords, digital certificates and biometrics. Pri...

RoboNanny  RoboNanny

 You cannot always be there for your children 100%. Whether they are old enough to be on their own or not, you are constantly worrying about what are they doing right now. We’ve got a perfect solution, which will finally give you the peace of mind you longed for. What you need is a home security system. RoboNanny will help you make sure your children are always safe, with Internet broadcasting and activity recording. RoboNanny is a computer home security and baby monitoring software. It monitors sound level in your room via your computer microphone, broadcasts audio from the microphone over the network, and records surrounding audio, and fires sound alarms. While connected to the Internet (even a 28.8 modem will do, but DSL or Cable is certainly better), RoboNanny can continuously broadcast your room's sounds. You can listen to what's happening in your home by simply connecting to your home IP with Windows Media Player. If configured, RoboNanny can save all sounds louder than a user-def...

High Power Encryption  High Power Encryption

 High Power Encryption software securely and easily protects all proprietary data on PC 100% of the time without users having to think about security. Any user, from individuals to enterprises, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this product....

Cresotech PocketSafe  Cresotech PocketSafe

 CRESOTECH POCKETSAFE provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data as well as other confidential information. The records in database are stored encrypted and password-protected. The mobile world requires mobile solutions with data confidentiality protected: PocketSafe gives you this full protection. PocketSafe allows you to secure important data of 8 basic types: a specific template for each particular type makes data entry more convenient. The database file and each data entry within the database can be password-protected, thus providing more security. Strong DES encryption algorithm and double password protection make sure that your confidential information is for your eyes only! PocketSafe also allows you to store information in several different files. It is quite handy to structure all the information you need for your employees, colleagues, kids or spouse. Customizable interface and other adjustable fe...

Clock Guard  Clock Guard

 Clock Guard is a Windows 95/98/2000/ME/XP/NT software program that prevents tampering with the computer clock. It can be used for various purposes. A few examples are: 1) Preventing files from being given falsified time/date stamps by manually resetting the system clock and then saving the file. 2) Prevent employees who are using a computer-based time clock from altering the time to allow themselves to "punch in" at a falsified time. 3) Prevent users who have time limited programs (programs that can only be used at certain times) from accessing these programs at improper times. 4) Prevent people who are paying for computer use on a time basis from resetting the clock to reduce the amount of time they pay for. 5) Prevent people who are restricted to a certain amount of computer time per day (usually children) from resetting the computer clock to give themselves more time....

Trivia Standard  Trivia Standard

 Trivia Standard allows creation of virtual encrypted drives that are accessible only after the correct password insertion. The virtual disk created with Trivia is visible as a normal logical partition in the system and may be used as usual....

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>