blowfish files security encypt files free software


Search results for tag «blowfish files security encypt files»:

Cipherlok 2.1 Cipherlok 2.1
… when, for example, travelling with a notebook computer. A secure file delete function ensures that deleted files cannot be retrieved. Cipherlok works either with traditional passwords or for extra security can use our USB Cipherlok Tokens.… 

USA Shield 2.15 USA Shield 2.15
…  shredder - Matches and exceeds DOD specifications (U.S. Department of Defense). No back doors or escrow keys - There is absolutely no way of recovering your information without the correct password, so be careful not to forget your password.… 

BlowFish 2000 3.1 BlowFish 2000 3.1
… ly encrypted and decoded directly from the MS Windows Explorer by using the pop-up context menu. This utility uses the Blowfish encryption algorithm. BlowFish can be configured to optionally place its program icon in the taskbar notification tray.… 

Computer Security 1.5 Computer Security 1.5
… lcomed quests". Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with a random number of layers of data.… 

VBSecure 2.0 VBSecure 2.0
… fish as its main encryption engine, allowing you to protect private and sensitive data from potential unauthorized access. Software registration and security doesn't get any easier than this. Download our free trial and see you for yourself.… 

Crypter 1.2 Crypter 1.2
… onger than DES. Fast and secure, it uses a 'Shared Secret' key. This encryption utility is small enough (814k) that you can keep it on a floppy disk, and therefore use it anywhere; there's nothing to install. Nothing complicated to learn.… 

ABI- CODER 3.6.1.4 ABI- CODER 3.6.1.4
… ption algorithm - 256 bit AES encryption algorithm Warning ABI- CODER 3.6.1 is not compatible with versions 2.2, 3.0 or 3.01 ABI- CODER 3.6.1 3DES algorithm is also not backwards compatible with any previous versions except version 3.5.9… 

Cryptonight 1.0 Cryptonight 1.0
… nd decrypt messages and files. It uses state of the art encryption technologies to ensure that your data remains safe. Keep your passwords and credentials in the Cryptonight safe. Methods used to encrypt: Blowfish DES Triple DES Rijndael… 

Cryptgine Windows Plugin 1.0 Cryptgine Windows Plugin 1.0
… nfolocks.com including blowfish, twofish, skipjack, GOST, and DES. The Cryptgine Security Engine also incorporates a method of securely deleting files. The method is based on several different methods to wipe the file from your computer.… 

Data Stash 1.5 Data Stash 1.5
… can hide sensitive document files into a bitmap file, and retrieve them later. Opening the bitmap file would only show the image of the bitmap, and not the files that are stored in it. You can hide files into .exe, .com, .mpg, and so on.… 


Related: