using encrypted free software


Search results for tag «using encrypted»:

encrypted::Mail 2.0 encrypted::Mail 2.0
… encrypted::Mail will allow users to send encrypted emails to anyone with ease, regardless of the users or recipients existing mail client. encrypted::Mail uses symmetric encryption and allows senders to add a pass phrase for additional security.… 

Paragon Encrypted Disk 3.02 Paragon Encrypted Disk 3.02
… side on a hard drive, on a network drive, on removable media such as CD/DVD, a USB flash memory drive etc. Once an encrypted disk image is created it can be mounted as a virtual drive anytime and anywhere later. The disk image can be mounted only… 

Encrypted Magic Folders 06.09.1 Encrypted Magic Folders 06.09.1
… t encryption! Select folders whose files you want encrypted and EMF not only makes those folders and files completely invisible to others but decrypts and encrypts the files automatically and transparently as you use them. You won't even know you're using encrypted files as EMF does all the work beh… 

BladeBox Iron Edition 1.1 BladeBox Iron Edition 1.1
… ecrypted to a temporary folder, instead they're encrypted/decrypted in real-time while you write/read them. Limitations BladeBox Iron Edition allows you to create up to 4 virtual, encrypted volumes, and each can contain up to 30mb of data.… 

MY ENCRYPTED DISK 1.10 MY ENCRYPTED DISK 1.10
… malicious delete. virtual encrypted partition can be formatted to the file system which operating system supports (FAT, FAT32, NTFS); full plug and play,max 4 scsi removeable disk can use at one time. you can simple stop device when logout.… 

fSekrit 1.40 fSekrit 1.40
…  unless you use secure file wiping programs, it would be a trivial matter for someone to retrieve your un-encrypted data, even though you has been deleted. This can't be done with fSekrit, though, since it never stores your un-encrypted data on disk.… 

Encrypted Briefcase Personal 2.6 Encrypted Briefcase Personal 2.6
…  you're done. But not with EBP. EBP intercepts all reads and writes to your encrypted folders and files and decrypts/encrypts the data instantly on the fly as the data is read or written. It's so fast, easy, and transparent you'll soon forget you're using encrypted files at all! Encrypted Briefca… 

CryptArchiver Lite 3.1.0.0 CryptArchiver Lite 3.1.0.0
…  are accessible and visible only to you! Secure your important files and folders - get CryptArchiver today! Limitations Nagscreen after 15 days, 20 MB Encrypted drive size.… 

JvCrypt 1.0 JvCrypt 1.0
… se passwords can be used when running JvCrypt from the command line or during normal interactive mode. You can even setup JvCrypt to require a password when starting! This will prevent anybody else from accessing your stored password database.… 

Encrypted Content Management System (CMS) 2004-07-18 Encrypted Content Management System (CMS) 2004-07-18
… Encrypted Content Management System (CMS/Database - HTTP/SSL Server) with built-in Search-engine, E-Mai… 


Related: