Hot Downloads
Home»Data Encryption related tags
Search Software:Search
    Data Encryption in title
  • Data Encryption Software
    Size: Download
  • Kemo Data Encryption
    Kemo Data Encryption

    Kemo Data Encryption 2.0, the easy way to protected your personal and mission critical data, if you want to keep your valuable data secured and protected from theft and prevents unauthorized Kemo Data Encryption 2.0 is the perfect solution. Version 2.0 build 2 build includes unspecified updates. What's new in this version: Version 2 build includes unspecified updates.

    Size: Download
  • Data Encryption Toolkit
    Data Encryption Toolkit

    This program allows you to use 5 well-known and highly secured encryption algorithms (Blowfish, DES etc.). DET will help you to encrypt single files, groups of files or the whole folders, including all its subfolders, easy and quickly. You can work with encrypted folders as simply as with usual folders (except entering the unlocking password). All encryption and decryption actions will be done on fly. The program is integrated into any Windows shell and all its functions are available from the context menu. Besides encryption the program has some additional features. DET has a high speed, is easy to setup and to use.

    Size: Download
  • QuuSoft Data Encryption
    QuuSoft Data Encryption

    QuuSoft Data Encryption provides advanced encryption for desktops, laptops, and removable storage devices, such as hard disks, USB memory sticks and mobile devices. It is the fast, secure and reliable file encryption software to password protect folders, files and removable drives against data loss and unauthorized access with the highest levels of encryption and certifications.

    Size: Download
  • Kemo Data Encryption V2.0
    Size: Download
  • LabVault Data encryption utility
    LabVault Data encryption utility

    Safeguard files, e-mails, passwords using strong data encryption.

    Size: Download
  • Data encryption utility LabVault
    Data encryption utility LabVault

    Advertisement Data encryption utility LabVault is a Security software developed by Labtam Inc.. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Data encryption utility LabVault: LabVault is a software package that any user with a PC running under Windows 2000, XP (support of other OS will come shortly) can keep all there secret information securely. You can think of LabVault as a Bank with safety Deposit boxes inside of it. As we know that with safety deposit boxes we can put in our own personal belongings we want to protect away from Intruders and keep them safe. The difference with LabVault is that we can save any information from our computer like e-mails, passwords, Bank account or source code information. Anything can be kept inside LabVault which will be protected from any third parties. All information is encrypted in any moment. By this reason, i.g. unexpected switching of you computer will not cause loosing or unprotecting of information. There is a second level safety feature that if there is a error on the password on the third Attempt, LabVault will Ask for PUK no (like Mobile/Cell phones have). At this time there's no limit in attempts to enter PUK code. Please note here that there are no back doors to get the information out. The only way to enter Labvault is with the right Password. LabVault can only be as safe as the password you make. LabVault will have a very simple and user friendly graphical interface. Simple one step clicks. LabVault will be a Free Product that you download from our web site. The Vault will have a Limitation of holding 1Mb of information.

    Size: Download
  • Strong Arm Data Encryption
    Size: Download
    Data Encryption in tags
  • MP3Guard MP3 Protection
    MP3Guard MP3 Protection

    MP3Guard MP3 Protection is for musicians who want to sell or distribute mp3 files online. This program will encrypt your mp3 files. This includes an MP3 player for playing the MP3 files. Users cannot copy your files. This program is ideal for musicians who wish to sell mp3 files online. This program works, optionally, with ShareGuard to provide a lock and key system for selling mp3 files. It has 2 basic components: MP3Guard Producer, which allows you tailor your MP3 player and to create your MP3 playlist and MP3Guard Player. Only the MP3Guard Player can decrypt the MP3 files. Main features: [ul][li]MP3Guard Player - the MP3Guard playerr program will decrypt your MP3 files and play them to the user. The user cannot copy or save the MP3 files.[/li] [li]MP3Guard User Encryption - the MP3Guard encrypts your MP3 files so that only the specified player program will be able to decrypt your MP3 and splay them to the user.[/li] [li]ShareGuard (optional) - the ShareGuard program will check the licensing of the MP3 Files before allowing the program to run. If the user is not licensed then the MP3 Player will not play your MP3 playlist. This program allows for marketing of MP3 files and/or upselling other products by providing addtional marketing screens and/or AdWare programs to run with the MP3 Player.[/li] [/ul]

    Size: Download
  • Aloaha PDF Crypter
    Aloaha PDF Crypter

    Due to the high level of exposure we are provided to because of the Internet, private information can not be secure anymore. Unwanted eyes can easily pry into our personal matters. That's why it is important to encrypt our files. As it's implied by its name, Aloaha PDF Crypter is a simplistic but powerful tool that can help you encrypt PDF documents with the public key of the user permitted to read or display the file. It can be easily handled by users of all levels. The tool is packed in a clean and simple interface with few features available. Items can be imported by using either the file browser or 'drag and drop' function. Processing more than one entry at the same time is possible. So, all you have to is select the 'all' field from the drop-drown list, as well as specify the output directory, format (PDF or Aloaha) and filename, in order to initialize the encryption operation. Decrypting PDF and Aloaha items is similar. The PDF encryption app runs on a moderate amount of CPU and system memory, has a good response time and quickly finishes a task. No error dialogs have been displayed throughout our testing and Aloaha PDF Crypter did not freeze or crash. On the downside, there is no help file available and the piece of software has limited features. For example, you cannot configure program settings, such as making Aloaha PDF Crypter minimize to the system tray. Reviewed by Elena Opris, last updated on September 29th, 2013

    Size: Download
  • VaultMate

    [ul] [li] Size: [b]2.12 MB[/b] [/li] [li] License: [b]Shareware[/b] [/li] [li] OS: Windows [/li] [li] Price: [b]$35[/b] [b]Buy full version[/b] [/li] [li] Publisher: VaultMate Software [/li] [li] Updated: 20 Jan 2012 [/li] [li] Downloads: 136 (1 last week) [/li] [/ul] VaultMate is powerful, and a user friendly software program for the secure management and storage of important information and documents. The age of electronic documentation, and the need to implement easy to use solutions for a variety of computer activities and projects, without sacrificing security, have driven the creators of VaultMate to come up with an all inclusive security program. Documents Vault: Organizes your files and documents; making work flow more efficiently. The simple folder type filing structure of VaultMate organizes files quickly, and easily, by storing all paperless documents as one encrypted database file. Passwords and Sensitive Information Manager: Our unique password organizer includes a built in Safe Password Generator, Drag and Paste Internet Forms Filler and an imbedded 256 bit Advanced Encryption Standard (AES) module that will make VaultMate your irreplaceable security assistant. It eliminates the worry about authentication privacy; allows the use of extremely strong security codes anywhere without running the risk of forgetting a hard to remember password. By keeping your passwords stored in VaultMate, no one can access your vault but you. Work Journal: Gives you the ability to keep and organize records of the days business proceedings and events securely. Easily exports to Hyper Text Format (HTML) and publishing to your web server. Personal Diary: Organize your personal records of daily events, appointments, observations, etc. Your diary management is conveniently accessible and extremely secure. Highlights: Single File database Strong 256 bits AES encryption Integrated Documents Management System Database Optimizer Export to HTML Format Removable Device Mobility External File Encryptor Safe Password generator Drag And Paste Automatic Form Filler Flexible User Interface and many more... Remove the question mark from your private data let it be only yours!

    Size: Download
  • Copysafe PDF Converter
    Copysafe PDF Converter

    CopySafe PDF provides the most secure copy protection for eBook and PDF documents and the only solution that can protect from all avenues of copy including Printscreen and screen capture, and with the most secure options for print, password, and expiry protection. By using the DRM options you can also prevent forwarding and unauthorized distribution. Ideal for secure distribution anywhere, whether by download or on CD. - Distribute documents that are protected from all copy and redistribution - Distribute documents for the eyes of your intended recipients only - Copy protect documents so that they can never be converted or be extracted - Copy protect documents from Printscreen and all screen capture software - Copy protect documents with a password that cannot be hacked - Copy protect documents with expiry dates that cannot be foiled - Distribute documents with total control over who can access them - Control how many times a document can be viewed or printed CopySafe PDF Protector also includes a Document Converter for converting most file types to PDF, which will ensure that the quality of PDF conversion is consistent and suitable for distribution with the CopySafe PDF Reader that is available as a free download for your distribution CopySafe PDF Protector will import PDF documents, by the file or by folder for batch processing, and encrypt them for distribution as copy protected documents with or without additional DRM protection for access rights management. ArtistScope DRM provides total control with any changes to document or user access privileges being effective immediately, even to documents already downloaded to a computer. The CopySafe PDF Reader is a free download to the public, and for distribution with your protected documents.

    Size: Download
  • BestCrypt

    BestCrypt is a security program that you can use to provide a safe environment for your sensitive files and folders, by creating a virtual drive. This type of tool helps you the moment you share your computer with multiple users, since it prevents them from accessing your private information. The interface of the application is represented by a familiar window. Thanks to the Explorer-based layout, you can seamlessly locate the files and folders that you want to protect. Creating a new container is done by specifying a name, location, allocated size, description, algorithm (e.g. Triple DES, IDEA, GOST, TWOFISH) and mode (cipher-block chaining or tweakable narrow-block), key generator (KG-Ghost, GOST or SHA-256), together with the drive letter to mount. It is possible to build a group formed from multiple containers, locate all containers on a specific drive, hide or explore drives, customize the toolbar, to manage plugins and to perform an algorithm benchmark test. Furthermore, you can set up a hotkey that will immediately dismount all virtual drives when triggered, enable timeout and minimize BestCrypt to the system tray area, mount all drives as removable, as well as disable the thumbnail image cache. BestCrypt requires a pretty low amount of system resources, has a good response time and quickly mounts virtual drives, without causing the operating system to hang, crash or display error notifications. There's also a help file available for users with less or no experience in such apps. All in all, BestCrypt delivers a very good solution when it comes to file and folder protection. Reviewed by Elena Opris, last updated on January 7th, 2015

    Size: Download
  • wodCrypt

    [ul] [li] Size: [b]4.27 MB[/b] [/li] [li] License: [b]Shareware[/b] [/li] [li] OS: Windows [/li] [li] Price: [b]$139[/b] [b]Buy full version[/b] [/li] [li] Publisher: WeOnlyDo Software [/li] [li] Updated: 6 Nov 2013 [/li] [li] Downloads: 211 (1 last week) [/li] [/ul] Lightweight component that provides strong encryption for your applications. It provides supports for most common crypto algorithms, such as AES DES, TripleDES Blowfish Cast RC2 RC4 RC5 for symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it comes to data manipulation. Blob is our object that can read files, string variables and bytes array, and provide the same as their output. Even more, it can present the information in BASE64 and HEX encoded data - in case your environment just doesn't like to work with binary data. Optimized code Besides working in regular way - without random padding and internal wrapping, wodCrypt can work in Optimized mode as well. In that case most probably no other encryption tool will be able to access (directly) your encrypted data - because wodCrypt will add specific information to it - such as size of blob. This way when decryption is done, you will get exactly the same plaintext as it was before encryption. In regular way, wodCrypt has to look after block sizes for each protocol, key sizes etc.. so any empty space needs to be filled with zeros. It's not smart way to protect the data - but it's necessary to make encrypted text open to other decryption tools, for you to get the results as expected. Licensing - royalty free wodCrypt is royalty free - once you make your application, you can distribute binary versions of wodCrypt free of charge. Licenses are purchased only for design-time development, one license per each developer on the project - and that's all! Besides ActiveX version (which can be used even in FoxPro), wodCrypt has COM object as well, which can be used from many environments, such as VB, VC, Delphi, VBS, ASP etc..

    Size: Download
  • Xceed Encryption Library
    Xceed Encryption Library

    [ul] [li] Size: [b]23.86 MB[/b] [/li] [li] License: [b]Commercial[/b] [/li] [li] OS: Windows [/li] [li] Price: [b]$299.95[/b] [/li] [li] Publisher: Xceed Software Inc. [/li] [li] Updated: 2 Jan 2007 [/li] [li] Downloads: 267 (1 last week) [/li] [/ul] Xceed Encryption Library is an ActiveX component that allows Windows applications to encrypt and decrypt data using the latest industry standard strong encryption algorithms. It supports traditional secret-key encryption as well as public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files. For traditional strong encryption, the library supports the newly adopted AES (US Advanced Encryption Standard) secret-key encryption algorithm (Rijndael), which uses 128, 192 or 256-bit keys. It also supports the Twofish encryption algorithm, a runner-up for AES. For public-key encryption, it offers the RSA algorithm unlimited key bit-sizes. It includes a test vector sample application with the test vectors required to demonstrate correct implementation of the encryption algorithms offered. The library uses the modern SHA-2 and HAVAL hashing algorithms so that passphrases can be converted to exactly the amount of bits required for an encryption key and with better mathematical properties than older hashing algorithms such as MD5. Like all Xceed components, this library is designed to be flexible yet extremely easy to use. In fact, it only takes one line of code to encrypt or decrypt memory or files. A single line of code can even be used to chain together multiple Xceed components like the Xceed Streaming Compression Library and the Xceed Binary Encoding Library, so you can compress, encrypt and encode data into text just as easily. The fully self-contained ActiveX control at the core of the library is all you need to include with your projects. It has no external dependencies such as MFC DLLs, runtime libraries or other resources. That translates to minimal hassle at distribution time. The library also supports all the available ActiveX functionality designed to make your programming job easier, such as categorized properties, built-in constants and enumerations, context-sensitive F1-help, optional para

    Size: Download
  • Protect Shareware
    Protect Shareware

    Use Protect Shareware to easily convert any program into a time-limited shareware. A function library offering a flexible locking system with solid encryption. Generate serial numbers to register your application. Easy to implement. Support for VB, C++, Delphi, Other exes and ebooks. We have seen many shareware applications protected with different kinds of protection. Like Nag Screens, Feature Limits, Trial by date, Trial by executions, Hardware Lock, etc. many developers use their own coding standards to protect their softwares. And this is really in-secure. This is where the crackers come around. Its not hard to crack a registration code with a simple debugger. Spend more time developing software and applications and let Protect Shareware worry about securing it for you. The tried and tested wrappers will handle everything for you and incorporate systems like Debugger Detection, Web Registration, Hardware Lock, Hardware Finger Print etc. Warez will be a thing of the past once you start using Protect Shareware.

    Size: Download
  • ExeShield

    ExeShield is a reliable and easy-to-use software solution that helps you to turn your developed applications into 'try before you buy' software. It is very easy to convert your applications into shareware software with little effort and maximum protection against piracy, backdating, reverse-engineering or any kind of tampering. ExeShield will protect virtually any Win32 executable, including: · Visual Basic · Delphi · C++ · C++ Builder · PowerBasic · MASM · Visual Studio ExeShield uses several different techniques for protecting your application. Special code is added to defeat most Debuggers and Monitors including W32Dasm, SoftIce, TRW 2000, Turbo Debugger, Sourcer, Filemon, ExeSpy, ResSpy, RegMon and Memory Monitor which are tools most crackers are using today. Your protected executable is also modified so it can't run without ExeShield. Even if the protected executable was pulled out of the protection shell, it would not execute -- since ExeShield modifies parts of the program. Main features: [ul][li]Anti-debugging & anti-monitoring protection[/li] [li]Sophisticated encryption technology[/li] [li]Detects backdating or re-installation[/li] [li]Reliable machine locking protection[/li] [li]Invisible software-based protection requires no dongles[/li] [li]Create evaluation copies tailored to your specific needs[/li] [li]Easy to use - No source code modification - no dependencies[/li] [/ul]

    Size: Download
  • LLCryptoLib

    [b]LLCryptoLib[/b] is a .NET Library which allows programmers to easily add encryption, integrity and authentication services to their software. It is compatible with Microsoft .NET and Mono environments. It offers both symmetrical and asymmetrical text and stream encryption classes and hashing functions. It also offers full file shredding functions. It is engineered to be easy to use and standard compliant, fully compatible with ASP.NET web applications and C#, Visual Basic .NET, Managed C++ .NET Applications. [b]LLCryptoLib[/b] can be linked to managed (.NET) and unmanaged (COM) projects.

    Size: Download
    Data Encryption in description
  • Max File Encryption
    Max File Encryption

    Transferring sensitive data via e-mail or removable drives is not safe. Max File Encryption is a powerful yet easy-to-use encryption/steganography software that will help you protect your confidential information. With Max File Encryption, you can encrypt files of any type, hide files and also create self-decrypting packages. The program uses the strong and ultra-secure Blowfish encryption algorithm that ensures your data safety.

    Size: Download
  • Java Encryption Component
    Java Encryption Component

    Java encryption library for encrypting and decrypting both strings and binary data. Java Encryption Component implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and decryption using digital certificates. Provides hashing functionality for both strings and binary data using SHA1, SHA384, SHA512, MD2, MD5, and HAVAL. Provides BZIP2 compression for both strings and binary data. Provides digital signature creation and verification. Provides encoding functionality for Base64, quoted-printable, and hex-encoding.

    Size: Download
  • Perl Encryption Library
    Perl Encryption Library

    Perl encryption library for encrypting and decrypting both strings and binary data. Perl Encryption Library implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and decryption using digital certificates. Provides hashing functionality for both strings and binary data using SHA1, SHA384, SHA512, MD2, MD5, and HAVAL. Provides BZIP2 compression for both strings and binary data. Provides digital signature creation and verification. Provides encoding functionality for Base64, quoted-printable, and hex-encoding.

    Size: Download
  • Python Encryption Library
    Python Encryption Library

    Python encryption library for encrypting and decrypting both strings and binary data. Python Encryption Library implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and decryption using digital certificates.Provides hashing functionality for both strings and binary data using SHA1, SHA384, SHA512, MD2, MD5, and HAVAL. Provides BZIP2 compression for both strings and binary data. Provides digital signature creation and verification. Provides encoding functionality for Base64, quoted-printable, and hex-encoding.

    Size: Download
  • Ruby Encryption Library
    Ruby Encryption Library

    Ruby encryption library for encrypting and decrypting both strings and binary data. Ruby Encryption Library implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and decryption using digital certificates. Provides hashing functionality for both strings and binary data using SHA1, SHA384, SHA512, MD2, MD5, and HAVAL. Provides BZIP2 compression for both strings and binary data. Provides digital signature creation and verification. Provides encoding functionality for Base64, quoted-printable, and hex-encoding.

    Size: Download
  • Total Encryption
    Total Encryption

    Total Encryption is a simple application which will help users to protect their important documents. Total Encryption supports almost all types of RSA Public/private key pair based encryption/decryption of text data and text/binary files, MD5 and SHA Hashing of text data and text/binary files.

    Size: Download
  • Eureka Encryption Global Edition
    Eureka Encryption Global Edition

    Eureka Encryption Global Edition contains file encryption, multiple encryption, merge encryption, multiple file encryption, embedded applications (Crypt Words, Steganographer, Interface) and other utilities such as a file scrambler and shredder.

    Size: Download
  • Pretty Good Encryption
    Pretty Good Encryption

    [b]Pretty Good Encryption[/b] is a powerBasic and assembly Encryption Program. Military Grade Type Encryption.

    Size: Download
  • KetuFile

    KetuFile can used to secure files (file encryption, data encryption, data security) for any purpose. These encryption software products have been designed to integrate well with Internet Email. Specifically, a recipient of an Internet Email that has a KetuFile-encrypted attachment, can quickly decrypt that file on his/her hard disk. This makes the task of file encryption, data encryption much less of a burden to the user.

    Size: Download
  • 1 Second Folder Encrypt Free
    1 Second Folder Encrypt Free

    With 1 Second Folder Encryption Free, You don't worry your child find your amor photo, It allows you to easily protect your data in your computer. When a folder encrypted with 1 Second Folder Encryption, It could not be accessed, copied, deleted, moved and renamed. With Folder Encryption, you could keep the special data secure.

    Size: Download

Top Freeware

Top shareware

Related Search