encrypted data freeware downloads


Search results for «encrypted data»:

fSekrit 1.40 fSekrit 1.40
…  a tiny self-contained program file, removing the need to install a special application to view your data. This makes fSekrit ideal for keeping encrypted notes on, for example, USB flash drives. Another advantage of using fSekrit is that your un-encrypted data is never stored on your harddisk. W… 

encrypted::Mail 2.0 encrypted::Mail 2.0
… encrypted::Mail will allow users to send encrypted emails to anyone with ease, regardless of the users or recipients existing mail client. encrypted::Mail uses symmetric encryption and allows senders to add a pass phrase for additional security.… 

BladeBox Iron Edition 1.1 BladeBox Iron Edition 1.1
… d as if they were disk drives (with a DOS drive letter too). What you get is a container in the form of a virtual disk that you can use exactly as any other disk in your system, but the difference is that BladeBox volumes are secure, unbreakable, encrypted data storages. On-the-fly cryptograp… 

LockDisk 3.0 LockDisk 3.0
…  Just drag and drop any file into the LockDisk Vault. It is automatically encrypted. It's that simple! LockDisk vaults can only be viewed, accessed, browsed or modified by the user who has the key to open it. At other times, the files are invisible!… 

My data 1.0 My data 1.0
… ormation safe. You can create a user name with password and then you can edit the data inside a very simple text editor. All your data is kept in a highly encrypted environment. It uses powerful RC4 encryption algorithm to encrypt your data!… 

CryptoExpert 2007 Lite 7.1.1 CryptoExpert 2007 Lite 7.1.1
… Expert Lite is a free encryption software that uses an on-the-fly encryption system to encrypt and decrypt your data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantan… 

TrueCrypt 5.0a TrueCrypt 5.0a
… ound here). No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: LRW.… 

Antilop Info Organizer 1.00 Antilop Info Organizer 1.00
…  to clipboard and clear clipboard automatically encrypt whole directories with subdirectories backup your data with full or part backup import all your favourite Urls from IE import files or whole directories to Antilop Info Organizer… 

EFSDump 1.02 EFSDump 1.02
… o access encrypted files. Full source code is included. Usage: efsdump [-s] -s Recurse subdirectories. EFSDump takes wildcards e.g. 'efsdump *.txt'.… 

TigerCrypt 3.2 TigerCrypt 3.2
… ommon purposes) Triple-DES (slow and not more secure than AES or Twofish) Requirements Java VM (will run on all common systems)… 


Related: