encrypted list free software


Search results for tag «encrypted list»:

Easy Email Encryption 6.39 Easy Email Encryption 6.39
… nding and receiving encrypted email (optionally with attached files), and is designed to be easy to use. It works with any email program, including Outlook Express. Easy Email Encryption uses a symmetric key method, and keys are maintained in an encrypted list of keys for easy access. When a… 

encrypted::Mail 2.0 encrypted::Mail 2.0
… encrypted::Mail will allow users to send encrypted emails to anyone with ease, regardless of the users or recipients existing mail client. encrypted::Mail uses symmetric encryption and allows senders to add a pass phrase for additional security.… 

Paragon Encrypted Disk 3.02 Paragon Encrypted Disk 3.02
… side on a hard drive, on a network drive, on removable media such as CD/DVD, a USB flash memory drive etc. Once an encrypted disk image is created it can be mounted as a virtual drive anytime and anywhere later. The disk image can be mounted only… 

Encrypted Magic Folders 06.09.1 Encrypted Magic Folders 06.09.1
… s. EMF is so fast and transparent you'll soon forget you're using encrypted files. Laptop users find Encrypted Magic Folders invaluable for protecting any business or personal data they wouldn't want a thief to have should their laptop be stolen.… 

BladeBox Iron Edition 1.1 BladeBox Iron Edition 1.1
… ecrypted to a temporary folder, instead they're encrypted/decrypted in real-time while you write/read them. Limitations BladeBox Iron Edition allows you to create up to 4 virtual, encrypted volumes, and each can contain up to 30mb of data.… 

ID Data Encrypt 1.2 ID Data Encrypt 1.2
… ver your deleted files. ID Data Encrypt provides a list of logging files in order to keep a better history of files that have been encrypted or decrypted. You can review the history in search for files or folders that have been encrypted/ decrypted.… 

MY ENCRYPTED DISK 1.10 MY ENCRYPTED DISK 1.10
… malicious delete. virtual encrypted partition can be formatted to the file system which operating system supports (FAT, FAT32, NTFS); full plug and play,max 4 scsi removeable disk can use at one time. you can simple stop device when logout.… 

fSekrit 1.40 fSekrit 1.40
…  unless you use secure file wiping programs, it would be a trivial matter for someone to retrieve your un-encrypted data, even though you has been deleted. This can't be done with fSekrit, though, since it never stores your un-encrypted data on disk.… 

Encrypted Briefcase Personal 2.6 Encrypted Briefcase Personal 2.6
… out the leaking of sensitive business data if the computer is stolen. This file and folder encryption software runs under Windows 2000/XP/Server 2003 and supports FAT/FAT32/NTFS. It still works under Windows Safe Mode. Limitations 20 days… 

CryptArchiver Lite 3.1.0.0 CryptArchiver Lite 3.1.0.0
…  are accessible and visible only to you! Secure your important files and folders - get CryptArchiver today! Limitations Nagscreen after 15 days, 20 MB Encrypted drive size.… 


Related: