Advertisements
 
 
  You'll find a complete list of Encryption Tools software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
convert screenshot dll ipod converter

Encryption Tools

PREVIOUS     NEXT

Advanced WordPerfect Office Password Recovery  Advanced WordPerfect Office Password Recovery

 A program to recover lost or forgotten passwords to Corel WordPerfect Office documents: WordPerfect (*.wp, *.wpd), QuattroPro (*.qpw, *.wb?, *.wq1, *.wq2), Paradox (*.db). All versions of WordPerfect Office and its components and protection modes are supported; the passwords are being recovered instantly or in a matter of minutes. Multilingual passwords are supported....

Crypt4Free  Crypt4Free

 Crypt4Free (freeware) is files encryption software with ability to encrypt files and text messages. Support for ZIP files and ability to secure delete sensitive files. Skinnable user friendly interface....

CryptDecrypt  CryptDecrypt

 CryptDecrypt provides an easy way to protect your sensitive information. CryptDecrypt encrypts your data with a password that you select. CryptDecrypt includes several encryption algorithms to protect your data: AES (USA Government Standard) Triple-DES, GOST, RC2, RC4 and Windows Data Protection API. Strong encryption ensures that your information will not be stolen from your computer by hackers or viewed by anyone else but you. Note: if you forget your password then you will not be able to decrypt data and all information would be unrecoverable - there are no backdoors to decrypt your data in this software....

Message Smuggler Pro  Message Smuggler Pro

 Message Smuggler Pro is a total privacy and cleaning solution for individuals who share very sensitive data with colleagues, family, or friends, and require that data to remain secure and stay their PC privacy clean. Images created with Message Smuggler Pro are not only undetectable, but irretrievable as well. Enhanced version of Message Smuggler with over 1 million downloads. This software gives you: - end of censorship - absolute security - end of any suspicions - free choice of transfer method - system cleaner and many more. Main Features: - Send confidential data and files securely over the Internet by storing it in images with special certified encryption method based on 256-bit encryption algorithm and password protected. - Password isn't stored within file. - Images containing hidden messages and files are fully functional and are identical to the original one. Images absolutely don't lose on quality. - more supported formats: GIF, JPG, PCX, BMP, PNG, TGA, WMF, EMF, JPEG2000, WB...

Crypto4 PKI  Crypto4 PKI

 Crypto4 PKI is set of tools designed for management of X.509 certificates, Certificate Revocation Lists and Certificate Signing Requests. 1. Certificate Generator is a wizard-like application that lets you generate certificates and certificate requests. Certificate Generator can create both self-signed certificates and certificates, signed by other (CA) certificates. Certificate can be built from scratch (when you enter all information manually) or using pre-generated Certificate Request. Certificate Generation Profiles are used to generate more than one certificate based on common template. Certificate Generator lets you specify algorithms and key length, intended uses of certificates and Certificate Revocation List location. You can save the certificate in CER, PEM (base64-encoded DER), PFX (PKCS#12) and SPC/PVK formats. 2. Certificate Converter lets you take a certificate (and, if needed, private key) in one format and save it in other format. Certificate conversion is a frequent ta...

HandyCrypto  HandyCrypto

 HandyCrypto allows you to hide folders and encrypt files with on-the-fly AES encryption. Just create one or more encrypted secure folders from local folders and move your sensitive files into the specified folder and they will be encrypted/decrypted in real-time. You can work with the files as usual, and when you're done, lock the secure folder, which will store the files securely and also hide the entire folder from view. Additional features include a password-protect interface, supports for FAT/FAT32/NTFS, and protection under Windows Safe Mode. Laptops users will find this tool to be very useful. With HandyCrypto, you will not worry about leak of sensitive business data any longer in case of the computer was stolen. This tool is foolproof, easy-to-use, and self-protected....

XorIt  XorIt

 Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) XorIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a "one-time pad" and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted a...
 Advertisements

Kryptel  Kryptel

 Kryptel is an easy-to-use single-click solution making encryption of files and folders no more complex than copying or moving. On the other hand, Kryptel includes a number of advanced features like creating encrypted filesets or batch mode processing. By default, Kryptel uses the newest Advanced Encryption Standard for data encryption. Other strong ciphers can be selected in the Crypto Settings panel. The encrypted backup feature and efficient data compression make Kryptel an ideal tool for archiving sensitive data. The integrated file shredder provides reliable deletion of sensitive files in accordance to DoD 5220.22-M specification. Kryptel Encryption Suite well-suited for both home and corporate use and can satisfy most demanding security needs. Free trial version can be obtained directly from the Kryptel Web site http://www.kryptel.com...

Keyboard Monitor  Keyboard Monitor

 Police the activities that take place on your computer with this handy program. Turn it on and it records all the keys that are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the Keyboard Monitor are safely password protected. Keyboard Monitor can be run as an invisible background process and it can be set so that it turns on automatically when the machine starts up....

HB Crypt Source DLL  HB Crypt Source DLL

 HB Crypt Source DLL features 12 cryptographic algo''s, compiled in C++. viz. Blowfish, Twofish, Rijndael, Skipjack, Serpent, Gost, RC4, TEA, DES, ARA, AES, RODTHA. This compact C++ DLL saves many man months of a programmers valuable time in R&D. The DLL can be distributed with commercial licenses mentioned on the website of the algorithm developers. Most developers allow commercial distribution. Source code is available wth every purchase....

Password Notebook Plus 1.0.2.0  Password Notebook Plus 1.0.2.0

 Password manager that does not take data safety and security for granted. Password Notebook offers data encryption, database password protection with emergency recovery options, multiple layers of backups and easy management....

Hara-Kiri  Hara-Kiri

 "Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely erased (without the possibility of reconstructing them with utilities like "UnErase" and "Undelete"). Once it deletes the folders it will delete itself from the disk so that the perpetrator has no idea that there was once sensitive data on the disk! Uses: This program is useful in the case that your computer is stolen, Or if your computer is infiltrated by unwanted users. Imagine several situation, when "Hara-Kiri" may be useful for you: 1. Your PC is stolen Malefactor runs your computer with hope to profit by important secrets of your firm... But he don't know that it is nece...

Bliss Exploit Dialers Backdoor Agent  Bliss Exploit Dialers Backdoor Agent

 Bliss Exploit Dialers Backdoor Agent - Protection against: spyware, adware, spyware trojans, keyloggers, identity theft, hijackers, tracking threats, spybots, rogue anti-spyware, unwanted software, phishing, pop-ups, and bad Web sites. Starter Edition is a free version of Spyware Doctor, with full scan and remove, some real-time and no time limit. Secure your privacy by destroying all hidden activity information such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb....

ZoneAlarm Free  ZoneAlarm Free

 ZoneAlarm installs easily. A simple setup wizard helps you configure standard Web applications, such as your e-mail client and Web browser, to access the Web without the need to fiddle with port addresses or proxy settings. After the wizard has finished doing its job, you're up and surfing. When other programs or processes attempt to access your Internet connection, a window pops up that prompts you to permit or deny access....

Absolute CHAOS  Absolute CHAOS

 Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive privacy tools including file/folder compression, file/folder shredder....

NeoExec Professional  NeoExec Professional

 NeoExec is an operating system extension for Windows 2000/XP that allows the setting of Administrative privileges at the application level rather than at the user level. NeoExec is the ideal solution for applications that require elevated privileges to run as the privileges are granted to the application, not the user....

Folder Protection  Folder Protection

 Folder Protection is security software that lets you control access to your folders. Secure your documents to prevent people from viewing, printing, or altering them. You can protect folders located on your hard drive, as well as on external USB and removable drives. If the drive is connected to another PC, your folders still remain protected. Folder Protection is ideal for notebooks. Prevent confidential information from ending up in the wrong hands. A folder can be protected simply by right-clicking on it within Windows Explorer. Attempting to open the folder will bring up the Folder Protection password dialog. The protected folders cannot be copied or deleted while they are locked....

ArchiCrypt Live  ArchiCrypt Live

 ArchiCrypt Live offers real-time encryption and protection for sensitive private or business data. ArchiCrypt Live lets you encrypt all file types on your PC and laptop. That way only you will be able to access your confidential information.Unauthorized access is effectively prevented. ArchiCrypt Live is your last line of defense in the digital world. As private or corporate user you collect, create and store more and more confidential data on your PC, laptop or network every day. At the same time the threat towards your sensitive data rises everyday. Hackers, hijackers, competitors, nosy friends or relatives: Many people may be interested in accessing your data. If you keep your data unprotected chances are they will be successful. With ArchiCrypt Live you will no longer need to worry about the privacy of your data. ArchiCrypt Live is the perfect tool to safeguard your data and privacy. It is extremely easy to use. Even at this simplicity ArchiCrypt Live gives you state-of-the-art pro...

XPCSpy Pro  XPCSpy Pro

 XPCSpy Pro is the most powerful surveillance and monitoring solution for home or office use. This easy-to-use spy software allows you to monitor and record all activities on your computer in absolutely stealthy mode. And you can read the activities log report at anytime even if you are not around your computer, because XPCSpy Pro can create reports and send them to the email address you predefined or upload them to other computer via ftp....

All-In-One Spy  All-In-One Spy

 All-In-One SPY is the program that allows monitoring and recording all actions that are performed with a computer. All-In-One SPY records all keys that were pressed, remembers addresses of Internet pages that were visited, and maintains log file for applications that were run on the computer. It can create screenshots with the specified time period and record sounds from the computer's microphone to a sound file. With All-In-One SPY you can disable certain applications and web site addresses. The program runs in the stealth mode and is completely invisible on the computer. The log files with the program work results can be securely transferred to another computer over a local area network or send to a certain address via e-mail. You can configure the program to start automatically every time the computer starts....

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>