encrypted freeware downloads


Search results for «encrypted»:

encrypted::Mail 2.0 encrypted::Mail 2.0
… encrypted::Mail will allow users to send encrypted emails to anyone with ease, regardless of the users or recipients existing mail client. encrypted::Mail uses symmetric encryption and allows senders to add a pass phrase for additional security.… 

BladeBox Iron Edition 1.1 BladeBox Iron Edition 1.1
… older, instead they're encrypted/decrypted in real-time while you write/read them. Limitations BladeBox Iron Edition allows you to create up to 4 virtual, encrypted volumes, and each can contain up to 30mb of data.… 

fSekrit 1.40 fSekrit 1.40
… , it would be a trivial matter for someone to retrieve your un-encrypted data, even though you has been deleted. This can't be done with fSekrit, though, since it never stores your un-encrypted data on disk.… 

Portable HTML Encrypter 1.0 Portable HTML Encrypter 1.0
… ible. For that reason your encrypted webpage is saved as YOURFILE_encrypted.html PLEASE SAVE YOUR ORIGINAL FILES!… 

LockDisk 3.0 LockDisk 3.0
…  encrypted. It's that simple! LockDisk vaults can only be viewed, accessed, browsed or modified by the user who has the key to open it. At other times, the files are invisible!… 

CryptoText Mail 1.0.1004 CryptoText Mail 1.0.1004
… ess to your email account (POP3 incoming and SMTP outgoing). This is typical, the kind of email service usually included with your internet service (also the kind of email account you probably have if you use Microsoft's Outlook Express).… 

Encryptor 1.0 Encryptor 1.0
… pt to a minimum (75 Kb) so you can easily send the program along with your encrypted message as an attachment to the recipient. Easy one button encrypt/decrypt process.… 

Encrypted Button Generator for PayPal 1.25 Encrypted Button Generator for PayPal 1.25
… spammers). However, you should not consider this a real security measure, since software tools like IE Booster can easily decode the Java or HTML `encryption`. Requires a valid PayPal account. PayPal (tm) does not endorse this product.… 

Crypto-Lock 2.02 Crypto-Lock 2.02
… d during encryption is processed with SHA-1 if it is less than 36 characters long. The resultant key is then used to encrypt either part of the file (minimum encryption) or the whole file (maximum encryption). For both encryptions, the part to be encrypted is compressed first to deter cryptoanaly… 

ProxyShare Client 1.184 ProxyShare Client 1.184
… tage of internet proxy servers to hide your IP and gain speedy downloads. Every client in this network can act as a proxy server. What are the key advantages from other P2P software? very high download speeds instant downloads security full encrypted network full designed for broadband cab… 


Related: