keeping encrypted free software
Search results for tag «keeping encrypted»:
fSekrit 1.40
… programs, it would be a trivial matter for someone to retrieve your un-encrypted data, even though you has been deleted. This can't be done with fSekrit, though, since it never stores your un-encrypted data on disk.…
Private Pix 4.1
… es include name scrambling and variable key length. Private Pix has an easy to use interface that makes organizing and viewing of your pictures easier than ever before.
Try Private Pix worry free as it does not change any system settings.…
CrypSecure 1.0.1
… ssword.
You can create a many profiles for many peoples or group of peoples.
Send encrypted messages or texts.
Send encrypted Outlook Express Email with a single click of button.
Send encrypted files to FTP Server easily; Receive decrypted files.…
encrypted::Mail 2.0
… encrypted::Mail will allow users to send encrypted emails to anyone with ease, regardless of the users or recipients existing mail client. encrypted::Mail uses symmetric encryption and allows senders to add a pass phrase for additional security.…
Paragon Encrypted Disk 3.02
… side on a hard drive, on a network drive, on removable media such as CD/DVD, a USB flash memory drive etc. Once an encrypted disk image is created it can be mounted as a virtual drive anytime and anywhere later.
The disk image can be mounted only…
SkypePGP 2.1
… y one-to-one chats. That is, conference chats are not supported.
There is no way to get rid of the fancy encrypted ascii text in the Skype's chat dialog window.…
Encrypted Magic Folders 06.09.1
… s. EMF is so fast and transparent you'll soon forget you're using encrypted files.
Laptop users find Encrypted Magic Folders invaluable for protecting any business or personal data they wouldn't want a thief to have should their laptop be stolen.…
ID Data Encrypt 1.2
… ver your deleted files.
ID Data Encrypt provides a list of logging files in order to keep a better history of files that have been encrypted or decrypted. You can review the history in search for files or folders that have been encrypted/ decrypted.…
CryptoNote 4.0
… ata, legal or corporate documents
Store any private information in CryptoNote Files, such as Passwords and Account Logins or any kind of file, such as Office Documents
Prevent Spyware from reading your private data by keeping it in CryptoNote files…
MyID 3.5.5
… er will be used to encrypt your PIN, the PIN will be used to encrypt your password data file.
The encryption strength depends on the length of your PIN. The shareware version can be used for up to 8 entries without expiration or limitations.…
Related: