LSDTech PackIt 2.11
Ever wanted to make distribution package for you data or programs quickly and easily? Have files and folders that you need to transfer between several computers over and over? Need to quickly encrypt and password protect your work? If you've answered Yes on at least one of the questions, PackIt can help you. With help of its Package Wizard you can complete all of the above tasks in few simple steps just in one minute!
See also: COMPRESSION, DISTRIBUTION, PACKAGE, INSTALLATION, UTILITIES, FILE, PACKIT, LSDTECH, ENCRYPTION, SECURITY
Encryption for email and attachments, or store private files on public servers. PackMan (Package Manager) stores files within it's own compressed and ciphered file format.
See also: encrypt, cipher, zip, compress, compression, PackMan, package, editor, RTF, contact, privacy, email, encryption
AsMask can encrypt and hide all format secret files or text messages into an image. Encryption method based on 256-bit encryption algorithm. The solution is reliable and you can set a password to protect the encryption files and text messages. You can view the image hidden files and text messages as same as normal image. Nobody can aware of messages hidden in the image. AsMask can hide files and text messages into any format images.
See also: encryption software, file encryption, data encryption, encrypt file, security, image, message, keep, smuggler, picture, secret, hidden, message smuggler, encryption, top secret, encryption, password protect, censorship, encryption package
Ken Messenger 5.0.2
Ken Messenger is an Instant Messaging software. Works either with our free public server or with your own private Instant Messenger Server. It allows companies, organisations, institutions and dispersed workgroups to create and control their own private messaging network (Free up to 5 connected users) without having to use and depend on public IM servers.
See also: training, distance learning, distance, learning, colleges, college, universities, university, schools, school, educational, education, dispersed, privacy, private, IM network, networks, network, networking, extranet, VPN, intranet, internet, economical, cost-effective, cost effective, return on investment, ROI, compliance, compliant, finance, financial, medical, HIPAA, rules, SEC, NASD, off-line, offline, on-line, online, file transfer, files, file, message, messages, traffic, encryption, encrypted, security, secure, non-profit, Sonork EIM, GTV, Sonork, organizational, organization, industry, government, business, company, professional, EIM, enterprise instant messaging, enterprise, messenger, messaging, instant, instant messenger, instant messaging, Instant Messenger Server, KenMessenger Server, Ken Messenger Server, Instant Messenger, Messenger, KenMessenger, Ken Messenger, Wilcom2, collaboration, collaborating, work-group, workgroup, webapp, web application, web applications, application, applications, webapps, conference, conferencing, chat, chatting, chatrooms, peer-to-peer, p2p, peer to peer, server, servers
CryptoExpert 2006 Professional 6.6.5
The system mounts a volume file to create a "virtual drive" that appears to applications like any other physical drive. User needs to enter a password to mount this container file as drive and can unmount it instantly by pressing special hot key. This PRO version additionally allows you to mount the container file that is stored on another computer over a local network. Encrypted drive can also be shared between local network users.
See also: container, drive, des, wipe, shred, volume, drive, virtual, disk, cast, blowfish, encryption, protect, password, fly, encrypt
Advanced Archive Password Recovery 3.01
Advanced Archive Password Recovery is a program to recover lost or forgotten passwords for ZIP/PKZip/WinZip, ARJ/WinARJ, RAR/WinRAR and ACE/WinACE archives. Supports the customizable brute-force attack, effectively optimized for speed (for ZIP, up to 15 million passwords per second on Pentium 4), dictionary-based attack, and very fast and effective known-plaintext attack. Supports strong WinZip encryption (AES). Multilangual user interface.
See also: compression, encryption, AES, attack, dictionary, plaintext, brute-force, archive, WinRAR, RAR, WinArj, ARJ, PKZip, WinZip, ZIP, recovery, password
SecurityPlus is a powerful encryption and decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on the fly encryption, decryption. SecurityPlus is very fast and will not take long to encrypt, decrypt even large files including files on CD-ROM. Current passwords (keys) can be quickly cleared and files can be safely deleted (shredded
See also: securityplus, plus, confidential, data, protect, protection, key, show, slide, slideshow, shred, shredded, option, JPG, file, password, viewer, CRC, thumbnails, files, secure, security, decrypt, encrypt, decryption, encryption, softbyte, folder
Scripts Encryptor (ScrEnc) 126.96.36.199
Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files
See also: cryptography, security, shredding, message digest, hashing, decryption, encryption, cipher
ViPNet Safe Disk Mobile 1.2
ViPNet Safe Disk for Pocket PC is your preemptive line of defence against cunning criminals, business competitors or nosy people who can easily learn your secrets from the lost or stolen PDA. With this program, you can hide your sensitive files in secret folders which are password-protected and encrypted by AES or GOST algorithms. Your files remain inaccessible even when your PDA is switched off or in the "stand-by" mode. Encryption.
See also: security tool, security utility, ViPNet, password, key, safe disk, secure disk, virtual disk, encryption, hided disk, on-the-fly
Security Toolkit 0.6
The Security Toolkit allows you to create encrypted virtual drives, encrypt your hard drives, USB (flash) drives and CD/DVD?s. Also included is a secure file shredder, Internet & Application History shredder, encrypted password manager, random password creator, spyware remover and more. You can even create your own deletion algorithms and spyware removal routines with the fully scriptable deletion engine. Freeware for non-profit use.
See also: internet history, shred, delete, protect, lock, secure, file, folder, password manager, password protect, encrypt cd, encrypt usb, encryption, spyware, security, internet explorer, firefox history, wipe history
Dekart Private Disk Multifactor 1.22
Easy-to-use, secure and reliable AES 256-bit disk encryption software. Creates one or more virtual encrypted disks on your hard drive. Supports such portable storage devices like FDD, CD, CD/R, CD/RW, MO, MD, ZIP-disks, flash drives, all types of flash memory cards. Makes your important files invisible and protected from unauthorised access. Provides 100% protection of your private information.Can perform three-factor authentication.
See also: biometric authentification, smart card authentification, transparent encryption, strong disk encryption, AES encryption, virtual encrypted disk, encrypted disk, disk encryption, AES 256-bit encryption, data protection
Super Flexible File Synchronizer 2.60
This software is used to back up data and to synchronize PCs, servers, and notebooks. Users can choose between Wizard Mode and Advanced Mode. The settings are stored in multiple profiles, and the software comes with support for FTP and secure FTP servers, ZIP compression, data encryption, and a scheduler for automated backups. On Windows NT/2000/XP, or 2003 Server, the scheduler can run as a service without users logging on.
See also: Encryption, Scheduler, FTP, ZIP, Synchronize, Backup
Genie Backup Manager 5.0
A very easy to use yet powerful software that can backup and restore files, documents, emails, settings, and programs to virtually any storage device
Novice users will find it easy to create their first backup job within minutes, and advanced users will appreciate the software's extended flexibility and features such as preserving Alternative Data Streams, encryption, self-executable backup sets, unattended backups, and scripting
See also: increment, outlook express, outlook, archive, restore, backup, encryption
1 Click Encrypt File Folder Encryption 1.4.1
1 Click Encrypt is the encryption utility that brings military strength encryption power at your fingertips, assuring that your files are secured and protected from intruders and spies. It can encrypt or securely hide any type of file, allowing you to relax a bit knowing that it is practically impossible to break the algorithms that where used in our application. Decryption methods are within the same utility that brings the encryption solution.
See also: blow fish, wipe, easy, cryptographic, secure, encryption software, data security, cypher key, protect documents, protection, file security, email security, file encryption, encrypt email, encryption, algorithm, disk, transparent, secret, Safe, File, Filesystem, encrypt, privacy, encrypt files, cryptographic library, email encryption, AES, gamma, ghost, cipher key, crypto
Puffer is a general purpose 256-bit AES encryption utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with wipe functions.
See also: steganography, stego, AES, public key, wipe, email, security, encryption, compression, archive, puffer
Max Folder secure 1.0
Folder secure is a user-friendly program for password-protecting files and folders. It prevents unauthorized access to users' important information and programs. The software makes the protected folders completely invisible, inaccessible or accessible in the read-only mode. Protected folders and their contents are prevented from being renamed, modified, deleted, copied, moved, accessed or even seen on the system.
See also: hidden, protection, password, hide file, guard services, folder password, hide folder, folder lock, security guard, protect file sharing program, protect file sharing, Folder Secure, shield, secret, secure, locker, ata encryption, password-protecting
XtremeSafe File Lock 1.0
A file encryption/decryption tool. It provides a better solution for protecting your privacy and business secret.
See also: encryption
NATO-Russia Military Dictionary 998492176X
This NATO-Russia Military and Political Dictionary provides a comprehensive guide to military and political terminology, and is ideal for all military personnel, those learning English and Russian for military purposes or anyone in related industries dealing with the military and politics.
It is especially useful for newcomers to the field, students, journalists and those without a military background.
See also: dictionary, glossary, sharshakov, 998492716X, Accounting, Adjustable Mortgage Loan, Adjustable Rate Loans Mortgages, Animation, Annuities, Annuity, Antivirus, ARM, Asset Management, Assessment, ATM, Banking, Bankruptcy, Best Refinance Mortgage Rate, Bill Debt Consolidation, Brokerage, Bullion, Cash Settlement, Cash Flow, Cash Loan, Check Processing, Checking Account, Coding, Commercial loan, Commodities Futures Trading, security, Consolidated Debt, Consumer Credit, Credit Advice, Credit Analysis, Credit Card, Credit Debt, Credit Insurance, Credit Line, Credit Management, Currency Trading Account, Data Acquisition, Data Clearing, Data Communications, Data Encryption, Data Exchange, Data Management, Data Processing, Data Protection, Data Recovery, Data Retrieval, Data Storage, Database Administrator, Database System, Debit Card, Debt and Loan Consolidation, Debt Collection, Debt Consolidation, Debt Consolidation Loan, Debt Management, Debt Recovery, Debt Relief, Debt Settlement, Debugger, Deposit Account, Electronic Trading System, Equities, Equity Loan, Equity Mortgage, Equity Refinance, Financial Investing, Financial Investment, Fixed Assets, Fixed Equity Loans, Fixed Rate Mortgage, Foreign Exchange Trading, Forex, Forex Investing, Forex Broker, Forex Trading, FX Trading, Insurance, Insurance Agents, Internet Security, Investing, Investment, Investments, Investor, Lawyer, Life Insurance, Loan Debt Consolidation, Military, Military Training, Money, Mortgage Loan, Mortgage Note, Mortgage Refinancing, Mortgage Refinance Rate, Mortgages, Quality Assurance, Real Estate Mortgage, Refinance Mortgage Rate, Refinancing Mortgage, Risk Management, Savings Bank Account, Second Mortgage Loan, Security, Security Policy, Security Software, Software Quality Assurance, Stock Exchange, Stock Investing, Stockbroker, Stockbrokers, Stock Trading, Stocks Trading, Tax, Technical Analysis, Trading Currency, VISA
Akala EXE Lock 3.20
Akala EXE Lock can protect any executable file from non-authorized execution. It asks each time the program is loaded the password you have set.
See also: file encrytion, encrypt, encryption, exe lock, security