Advertisements
 
 
  You'll find a complete list of Encryption Tools software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
autorun mp3 images component

Encryption Tools

PREVIOUS     NEXT

Deltacrypt oneclick encryption Personnal Use  Deltacrypt oneclick encryption Personnal Use

 DeltaCrypt OneClick Personal does it all: This Public Key Encryption Software encrypts files, text and emails with 1024-bit RSA protection, digital signatures, andunalterable public keys. It offers the basic encryption functionalities FREE OF CHARGE. Select files and folders or a combination of both and let DeltaCrypt OneClick Personal secure your sensitive data. Forpersonal use only....

Privatefirewall  Privatefirewall

 Privatefirewall 4.0 is a Personal Firewall and Intrusion Detection Application that eliminates unauthorized access to your PC, at home, the office, or on the road. Privatefirewall is easy to install/use and provides reliable and high-performance protection right "out of the box". Privatefirewall's intuitive interfaces allow advanced users to easily adjust default settings to create custom configurations. Features include: Packet Filtering, Port Scanning, IP/Website Protection, Email Anomaly Detection, and Advanced Application Protection. Privatefirewall is high-performance desktop security that is affordable, feature-rich and simple to use....

CommuniCrypt2Go  CommuniCrypt2Go

 RSA encryption tool for eMail-, webmail & messenger communication. No installation required, should run from an USB-Stick and other temporarely devices. See www.communicrypt.com for details....

Password Recovery .MDB  Password Recovery .MDB

 Have you lost the Password of your database Access? Don't worry more, you can already recover it with this great program. Password Recovery. MDB is a program dedicated to that you can recover lost or forgotten Passwords of the protected databases of Microsoft Access 97/2000/2002-XP/2003. You only have to add the file *.mdb or *.mde to the program, and to pulse on the icon "to Obtain the Password". that simple. it also offers other tools to remove the Password, to change it for another new one, to open the file directly with Access or to copy the Password to the clipboard. In synthesis, a tool that can take us out of a difficulty in more than an occasion. The current version of Password Recovery .MDB will run on Windows 95, 98, Me, 2000, NT, XP. Trial period is endless. You will recover only 2 characters of the password and find out the password’s length while program in trial period. Password will be fully recovered after purchasing the program....

got password?  got password?

 'got password?' is a lightweight, feature-rich password manager. It combines security and convenience, simplicity and flexibility in one handy package. Designed to take a minimum of effort to configure and activate, it securely gives you access to your credentials with just a couple of key taps or mouse clicks. It can generate cryptographically secure passwords and uses 128-bit strong RC4 encryption algorithm to keep all your passwords secure. It can also organize your accounts by category for maximum ease of use. Here are some distinctive features that make it the easiest and most flexible password manager around: - Lightweight: doesn't take over your system's resources just to do its job. It stays out of your way until you need it. - Easy to access: no complicated key/mouse combinations to memorize. No awkward dragging of items from one window to another. A simple double key tap brings it to the foreground, a mouse-click away from entering your credentials. - Secure: all of your pass...

Time Interval Report  Time Interval Report

 The Time Interval Report is a plugin for the freeware MZL & Novatech TrafficStatistic. Time Interval Report produces detailed traffic statistics for any time interval. With the Time Interval Report the user can determine time period traffic statistics will be shown for, and analyse for example yesterday's traffic or last night's traffic. The user can query intervals of his data with a precision of one minute, eg 2004/02/25 04:25am to 2004/03/03 02:36pm. That can be usefull to inspect unexpected traffic or to count bandwidth consumption for a specific internet session. The report header shows summary traffic volumes for received and sent data while in the report's body detailed traffic data grouped by visited hosts, services and protocols. Thus, for knowing exactly what was happening to the computer's network connection, just calling this report and choosing the appropriate time interval gives complete information....

EldoS KeyLord  EldoS KeyLord

 EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information tree and export data to plain text file. You can configure information records to "expire" so that you are notified when it's time to go and change password or acount info. KeyLord integrates with your web browser and helps you store login information not in insecure Windows Password Storage (for which browsers and crackers exist), but in encrypted KeyLord file....
 Advertisements

iSpy Killer  iSpy Killer

 Find out if your boss, spouse, or even a criminal is spying on you. Have you noticed your computer running slower than ever? Have you ever downloaded any music, movie clips, or games? If yes then your computer may be infected with SpyWares and AdWares!Buy iSpy Killer and you find all the spyware, keylogger and adware gone....

FlashCrypt  FlashCrypt

 One of the key points that help you to ensure your privacy is data security. If you have private files on your computer, you must protect them. Do you trust the folks you share your computer with? And what about millions of Internet users - what if someone gets access to your machine remotely? The most secure way to protect your files is to encrypt them. Strong encryption makes it practically impossible to obtain the original files without providing the encryption key. FlashCrypt software by FSPro Labs allows you to encrypt the contents of any folder quick and easy. After smooth and fast installation it extends folder drop-down menu of Windows Explorer by adding “Protect with FlashCrypt” command. Just click right mouse button on the folder you wish to protect, select “Protect with FlashCrypt”, type your password and voila - all the files in the folder are now in the secure container (protected folder) and encrypted with one of the world’s best encryption algorithm - AES256! This contai...

OpenOffice Impress Password Recovery  OpenOffice Impress Password Recovery

 OpenOffice Impress Password Recovery provides you with a friendly interface to recover OpenOffice Impress passwords and remove document ReadOnly protection. A powerful combination of proven recovery methods ensures successful recovery results in most cases. OpenOffice Impress Password Recovery provides anyone, regardless of their knowledge of computers and recovery technologies, with a refreshingly simple tool to recover passwords and remove protection from documents created in OpenOffice.org Impress. In just a few clicks, you can recover an open-document password and remove document ReadOnly protection. The program supports the following document formats: OpenDocument Presentation (*.odp, *.sxi) and OpenDocument Presentation Template (*.otp, *.sti)....

Dekart Private Disk Light  Dekart Private Disk Light

 Based on Dekart's popular Private Disk solution, Private Disk Light allows you to create a secure space for all your work, exchange encrypted data with others, and feel sure that your information is safe from external and internal manipulation. Important note: Dekart Private Disk Light contains No spyware, No adware, No viruses and it's freeware....

Tray Safe  Tray Safe

 Tray Safe password manager allows you to forgot passwords! While there are a lot of password keeping solutions out there, none comes close to Tray Safe password manager in terms of safety and convenience. Tray Safe password manager is a proud holder of the world's most secure password keeper title because of its unique hardware ID feature. Basically, it means that the program works only on a single PC (yours). Should someone access your PC or make a copy of your hard-drive, they won't be able to launch or hack the program. In addition, Tray Safe offers a wide choice of wold's most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray Safe password manager does not just store pas...

Agent Password  Agent Password

 Agent Password is your trusted password informer. The program is intended for automatic saving of all logins and passwords entered. It can be used not only as password keeping software but as a password spy, too. The manufacturer is not responsible for any inappropriate use of the program. We simply provide top notch, high quality software applications. It's up to you how to use the software, folks. The software is quite ingenious but very simple. All entries in the login and password fields are logged. This means if you forgot your login or password, you can simply look it up. Handy, isn't it? Also, this way you can look up other passwords entered on your computer. And theoretically speaking, you could also install the software on other computer and find out passwords of other people. But this is probably illegal and, as a law-abiding citizen, you surely would not want to do this, would you? AgentPassword provides you with the following benefits: It automatically logs passwords, makin...

Webcam Watchdog  Webcam Watchdog

 Webcam Corp. has released Webcam Watchdog, a Windows application that provides around-the-clock surveillance for your home or business. When Webcam Watchdog detects motion in the area being monitored by your web camera, it can sound an alarm, e-mail you the captured image, and increase the recording frame-rate speed to capture more high-quality images. Because Webcam Watchdog uses the Internet along with its built-in Java capability, there is no need to buy and install any software to view the images being captured. All surveillance images can be viewed using Internet Explorer 4 or 5, or Netscape 4 or 5. Capturing 320-by-240 images at one per second, a 40 GB hard drive will hold ten days of video. Webcam Watchdog can automatically delete the oldest video files, allowing you to capture data forever in a maintenance-free mode. The program's built-in web server makes it easy to retrieve your video archives securely and remotely. There is even a log that keeps track of who accessed We...

Advanced Password Generator  Advanced Password Generator

 Advanced Password Generator is a Windows based application designed to generate passwords of any length or character content. This application is used by network administrators, internet service providers and others to create and administer passwords. It is fast, small and easy to use. Advanced Password Generator gives users a choice of random number generators that produce extremely random seed values. Random number generators are best written in low-level languages. Some that are built into this application are impossible to write in a high-level language like Basic, Pascal, C++ or others. Advanced Password Generator will create alphabetic, numeric, alphanumeric or all keyboard character passwords of user-defined lengths. Passwords can be generated in lowercase or mixed case.All passwords can be printed....

Computer Lock Up  Computer Lock Up

 Computer Lock Up utility enables to lock computer access quickly as well as efficiently by means of password protection at the time the user is absent. At the moment when computer is locked up all hot keys and the mouse are switched off and the locking screen is showed. The transparent locking is also possible, during which the current screen stays unchanged. The computer locking can be initiated by different ways, such as pressing the special hot key or double-clicking the program icon. Also it's possible to lock up the computer at Windows startup or when the program is launched. The program also maintains the hidden mode in which the fact that the program has been launched is concealed. The unique technology of key spy protection makes password capturing absolutely impossible at the time when the password is entered....

FlashDrive Crypto  FlashDrive Crypto

 Removable storage is widely used all over the world. It is easy to use, however the data is not secure. Do you care about someone accesses your data by stealth? Flash Drive Crypto is the very solution. It is able to encrypt the disk drives using FAT or NTFS file system. FlashDrive Crypto is an easy-to-use, reliable, user-friendly and smart program that lets you encrypt the disk partitions (drive letters) to keep your private and confidential data secure. It almost supports all kind of removable storage, ex. floppy disks, usb hard drive, usb flash memory disk, pcmcia hard drive, compact flash memory, SD, MMC, memory stick, etc. Once encrypted, the removable drive will display an error message and cannot be accessed when used on another computer. The user will take misunderstanding that the driver damaged but not protected. This approach has the advantage of being more secure, however it limits the portability of the data somewhat....

Password Keeper  Password Keeper

 Password Keeper can help you to remember the username and password for a variety of occasions. From website logins to bank pin numbers and door access codes, you can now keep track of all of your security access requirements in one software application....

Cryptime  Cryptime

 The Cryptime program is intended for information encryption. You can set the password and TimerLock and encrypt any files. The TimerLock is supposed to set the time when it will be possible to decrypt the file encrypted. Apart from the time set the files encrypted cannot be decrypted, even if the password is known. Plus, you can set decrypting of files from the given computer only and delete the original files irrevocably after encryption / decryption. Together with encryption there goes the process of Zip -compression of files which allows to reduce the size of the encrypted files....

P-Encryption Lite  P-Encryption Lite

 P-Encyption Lite is a free program which allows you to encrypt your private files into one encrypted file(archive). P-Encryption Lite can also encrypt/decrypt text. P-Encryption Lite uses AES encryption to encrypt files and blowfish encryption to encrypt text. P-Encryption Lite is CadabraSoftware's freeware alternative to P-Encryption Suite....

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>