Hot Downloads
Home»Encryption related tags
Search Software:Search
    Encryption in title
  • File Encryption Extension for AnyFileBackup (Formerly File Encryption Extension for Network File Mon
    Size: Download
  • Encryption

    This is a strong encryption method based on a 4 number keys random number distribution. The 4 (5 - digit) number keys provide strong encryption protection due to message hashing that is provided on random number (s) generation where the inputed keys are used as random seeds. Each user choosen key is randomized and message hash is produced with a different randomizing method. Execution requires usage of the following command line switches: eg r71 -a 11111 -b 22222 -c 33333 -d 44444 -e < filename to encrypt> and to decrypt eg r71 -a 11111 -b 22222 -c 33333 -d 44444 -f < filename to decrypt> where the numbers following the -a -b -c and -d switches are user chosen encryption 5 digit number keys. Give it a try to see what it's really capable of!

    Size: Download
  • Encryption Wizard
    Encryption Wizard

    Encryption Wizard is an application that allows you to encrypt the contents of files and folders that bear sensitive information. Encryption Wizard comes with SHA-256 hashing, searchable metadata and 128-bit AES encryption. It is developer using the Java programming language and can be run on Mac OS X, Windows and Linux.

    Size: Download
  • Voltage Encryption
    Voltage Encryption

    The Voltage Encryption Manager enables you to manage your Voltage identities, brands, password and keys. Voltage Encryption will also provide logging capability and important information about your Voltage Encryption Client installation.

    Size: Download
  • USB Encryption
    Size: Download
  • Strong Encryption
    Strong Encryption

    Strong Encryption is a tray-based program, that allows to encrypt the text, with RSA/DES quality. Strong Encryption software is classified as symmetric cryptosystem. It uses a combination of variable-length encryption key algorithm derived from BLOWFISH and inspired by IDEA like algorithms. There are two kinds of cryptosystems: symmetric and asymmetric . Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Assymetric cryptosystems are also called public key cryptosystems. Both solutions: symmetric and asymmetric cryptosystems have pros and cons. For asymmetric cryptosystem, public and private keys are required, which means you need to keep your private key somewhere on the hard drive or carry it on the disk at all times and remember not to leave it in the drive. On the other hand - to use symmetric cryptosystems efficiently, you need a secure channel to provide the Key Phrase to the recipient, and also you need to change your Key Phrase very often - maybe even every time use a different one. [b]Limitations:[/b] ■ Update disabled

    Size: Download
  • Password Encryption
    Password Encryption

    For security reasons, most computer users don't have a single username and password for all their accounts and remembering all the information is rather difficult. And even if a password manager is used to store it all, you can never be too cautious when it comes to such sensitive data. Password Encryption is a simple tool that can come in handy for encrypting usernames, passwords and website URLs, so that no one can access your login information and steal your account.Easily encrypt passwords and usernamesHaving simplicity as one of its main characteristics, Password Encryption does not even require installation. Provided Java is installed on your computer, the application is instantly launched and you are requested to enter the desired security key, which will be used in the encryption process. Its interface is split into two separate sections, one dedicated to encryption and the other to the reverse operation. As far as usage is concerned, even beginners should face no difficulties. You just have to type in or paste the desired website URL, the username and the password in the dedicated fields and press the 'Encrypt' button. Decrypt data in an instantThe application can be used to send encryption login details to other users. Provided they have the correct security key, the decrypted URL and the login data will be shown within the main window. Practically, the decryption operation works in a similar way: you must enter or type in the encrypted data into their corresponding fields and press the 'Decrypt' button. A reliable password and text encryption toolPassword Encryption can give you a helping hand in adding an extra security layer to data you store in password managers or on your computer. Additionally, it comes with an integrated string encryption tool that helps you secure short texts and strings before storing or sharing them with others. It can be used to send protected messages, making the content safe even if it is intercepted. Reviewed by Mihaela Citea, last updated on August 7th, 2014

      Size: Download
    • Encryption Protection
      Encryption Protection

      Encryption Protection offers 128 bit encryption of sensitive files and emails. Encrypt text files, email, web pages and binary files (-jpg, -gif, -bmp, -doc, -xls, -cls, -mp3 and -exe extension). Decrypt files without using the software. Decrypt securely via a page on our website available 24-7. Normal file deletion removes a file's directory entry, but leaves the data contained in the file on your drive as data chunks. The file shredder in Encryption Protection completely overwrites the contents of the file 7 times so it can never be recovered. You can even execute application through a command line. You also have the ability to save encrypted file in multiple formats

      Size: Download
      Encryption in tags
    • iVolume for Windows
      iVolume for Windows

      One of the most innovative pieces of software today is iVolume for Windows. This program is capable of automatically adjusting your output volume to match the current noise from your iTunes. Alternatively, you can get this for not only PC, but also Mac, iPod, Apple TV, and more apple products. It easily integrates with your current iTunes library and will analyze each song to know the proper volume adjustments. Every analyzed song is saved, so there is no need to re-analyze ever. iVolume can also be configured to match user preferences. Try it out today for free as a demo, just click download now to get started! Remember, this program requires iTunes 7.0 or higher. Key Features of iVolume for Windows: [ul] [li]Automatically adjusts the volume of music played in iTunes[/li] [li]Compatible with PC, Mac, Mobile Devices, Apple TV, and more[/li] [li]Fully configurable to accomodate user preferences[/li] [li]Analyzes tracks very fast, and saves settings for later plays[/li] [/ul]

      Size: Download
    • MP3Guard MP3 Protection
      MP3Guard MP3 Protection

      MP3Guard MP3 Protection is for musicians who want to sell or distribute mp3 files online. This program will encrypt your mp3 files. This includes an MP3 player for playing the MP3 files. Users cannot copy your files. This program is ideal for musicians who wish to sell mp3 files online. This program works, optionally, with ShareGuard to provide a lock and key system for selling mp3 files. It has 2 basic components: MP3Guard Producer, which allows you tailor your MP3 player and to create your MP3 playlist and MP3Guard Player. Only the MP3Guard Player can decrypt the MP3 files. Main features: [ul][li]MP3Guard Player - the MP3Guard playerr program will decrypt your MP3 files and play them to the user. The user cannot copy or save the MP3 files.[/li] [li]MP3Guard User Encryption - the MP3Guard encrypts your MP3 files so that only the specified player program will be able to decrypt your MP3 and splay them to the user.[/li] [li]ShareGuard (optional) - the ShareGuard program will check the licensing of the MP3 Files before allowing the program to run. If the user is not licensed then the MP3 Player will not play your MP3 playlist. This program allows for marketing of MP3 files and/or upselling other products by providing addtional marketing screens and/or AdWare programs to run with the MP3 Player.[/li] [/ul]

      Size: Download
    • Aloaha PDF Crypter
      Aloaha PDF Crypter

      Due to the high level of exposure we are provided to because of the Internet, private information can not be secure anymore. Unwanted eyes can easily pry into our personal matters. That's why it is important to encrypt our files. As it's implied by its name, Aloaha PDF Crypter is a simplistic but powerful tool that can help you encrypt PDF documents with the public key of the user permitted to read or display the file. It can be easily handled by users of all levels. The tool is packed in a clean and simple interface with few features available. Items can be imported by using either the file browser or 'drag and drop' function. Processing more than one entry at the same time is possible. So, all you have to is select the 'all' field from the drop-drown list, as well as specify the output directory, format (PDF or Aloaha) and filename, in order to initialize the encryption operation. Decrypting PDF and Aloaha items is similar. The PDF encryption app runs on a moderate amount of CPU and system memory, has a good response time and quickly finishes a task. No error dialogs have been displayed throughout our testing and Aloaha PDF Crypter did not freeze or crash. On the downside, there is no help file available and the piece of software has limited features. For example, you cannot configure program settings, such as making Aloaha PDF Crypter minimize to the system tray. Reviewed by Elena Opris, last updated on September 29th, 2013

      Size: Download
    • VaultMate

      [ul] [li] Size: [b]2.12 MB[/b] [/li] [li] License: [b]Shareware[/b] [/li] [li] OS: Windows [/li] [li] Price: [b]$35[/b] [b]Buy full version[/b] [/li] [li] Publisher: VaultMate Software [/li] [li] Updated: 20 Jan 2012 [/li] [li] Downloads: 136 (1 last week) [/li] [/ul] VaultMate is powerful, and a user friendly software program for the secure management and storage of important information and documents. The age of electronic documentation, and the need to implement easy to use solutions for a variety of computer activities and projects, without sacrificing security, have driven the creators of VaultMate to come up with an all inclusive security program. Documents Vault: Organizes your files and documents; making work flow more efficiently. The simple folder type filing structure of VaultMate organizes files quickly, and easily, by storing all paperless documents as one encrypted database file. Passwords and Sensitive Information Manager: Our unique password organizer includes a built in Safe Password Generator, Drag and Paste Internet Forms Filler and an imbedded 256 bit Advanced Encryption Standard (AES) module that will make VaultMate your irreplaceable security assistant. It eliminates the worry about authentication privacy; allows the use of extremely strong security codes anywhere without running the risk of forgetting a hard to remember password. By keeping your passwords stored in VaultMate, no one can access your vault but you. Work Journal: Gives you the ability to keep and organize records of the days business proceedings and events securely. Easily exports to Hyper Text Format (HTML) and publishing to your web server. Personal Diary: Organize your personal records of daily events, appointments, observations, etc. Your diary management is conveniently accessible and extremely secure. Highlights: Single File database Strong 256 bits AES encryption Integrated Documents Management System Database Optimizer Export to HTML Format Removable Device Mobility External File Encryptor Safe Password generator Drag And Paste Automatic Form Filler Flexible User Interface and many more... Remove the question mark from your private data let it be only yours!

      Size: Download
    • Copysafe PDF Converter
      Copysafe PDF Converter

      CopySafe PDF provides the most secure copy protection for eBook and PDF documents and the only solution that can protect from all avenues of copy including Printscreen and screen capture, and with the most secure options for print, password, and expiry protection. By using the DRM options you can also prevent forwarding and unauthorized distribution. Ideal for secure distribution anywhere, whether by download or on CD. - Distribute documents that are protected from all copy and redistribution - Distribute documents for the eyes of your intended recipients only - Copy protect documents so that they can never be converted or be extracted - Copy protect documents from Printscreen and all screen capture software - Copy protect documents with a password that cannot be hacked - Copy protect documents with expiry dates that cannot be foiled - Distribute documents with total control over who can access them - Control how many times a document can be viewed or printed CopySafe PDF Protector also includes a Document Converter for converting most file types to PDF, which will ensure that the quality of PDF conversion is consistent and suitable for distribution with the CopySafe PDF Reader that is available as a free download for your distribution CopySafe PDF Protector will import PDF documents, by the file or by folder for batch processing, and encrypt them for distribution as copy protected documents with or without additional DRM protection for access rights management. ArtistScope DRM provides total control with any changes to document or user access privileges being effective immediately, even to documents already downloaded to a computer. The CopySafe PDF Reader is a free download to the public, and for distribution with your protected documents.

      Size: Download
    • BestCrypt

      BestCrypt is a security program that you can use to provide a safe environment for your sensitive files and folders, by creating a virtual drive. This type of tool helps you the moment you share your computer with multiple users, since it prevents them from accessing your private information. The interface of the application is represented by a familiar window. Thanks to the Explorer-based layout, you can seamlessly locate the files and folders that you want to protect. Creating a new container is done by specifying a name, location, allocated size, description, algorithm (e.g. Triple DES, IDEA, GOST, TWOFISH) and mode (cipher-block chaining or tweakable narrow-block), key generator (KG-Ghost, GOST or SHA-256), together with the drive letter to mount. It is possible to build a group formed from multiple containers, locate all containers on a specific drive, hide or explore drives, customize the toolbar, to manage plugins and to perform an algorithm benchmark test. Furthermore, you can set up a hotkey that will immediately dismount all virtual drives when triggered, enable timeout and minimize BestCrypt to the system tray area, mount all drives as removable, as well as disable the thumbnail image cache. BestCrypt requires a pretty low amount of system resources, has a good response time and quickly mounts virtual drives, without causing the operating system to hang, crash or display error notifications. There's also a help file available for users with less or no experience in such apps. All in all, BestCrypt delivers a very good solution when it comes to file and folder protection. Reviewed by Elena Opris, last updated on January 7th, 2015

      Size: Download
    • wodCrypt

      [ul] [li] Size: [b]4.27 MB[/b] [/li] [li] License: [b]Shareware[/b] [/li] [li] OS: Windows [/li] [li] Price: [b]$139[/b] [b]Buy full version[/b] [/li] [li] Publisher: WeOnlyDo Software [/li] [li] Updated: 6 Nov 2013 [/li] [li] Downloads: 211 (1 last week) [/li] [/ul] Lightweight component that provides strong encryption for your applications. It provides supports for most common crypto algorithms, such as AES DES, TripleDES Blowfish Cast RC2 RC4 RC5 for symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it comes to data manipulation. Blob is our object that can read files, string variables and bytes array, and provide the same as their output. Even more, it can present the information in BASE64 and HEX encoded data - in case your environment just doesn't like to work with binary data. Optimized code Besides working in regular way - without random padding and internal wrapping, wodCrypt can work in Optimized mode as well. In that case most probably no other encryption tool will be able to access (directly) your encrypted data - because wodCrypt will add specific information to it - such as size of blob. This way when decryption is done, you will get exactly the same plaintext as it was before encryption. In regular way, wodCrypt has to look after block sizes for each protocol, key sizes etc.. so any empty space needs to be filled with zeros. It's not smart way to protect the data - but it's necessary to make encrypted text open to other decryption tools, for you to get the results as expected. Licensing - royalty free wodCrypt is royalty free - once you make your application, you can distribute binary versions of wodCrypt free of charge. Licenses are purchased only for design-time development, one license per each developer on the project - and that's all! Besides ActiveX version (which can be used even in FoxPro), wodCrypt has COM object as well, which can be used from many environments, such as VB, VC, Delphi, VBS, ASP etc..

      Size: Download
    • Xceed Encryption Library
      Xceed Encryption Library

      [ul] [li] Size: [b]23.86 MB[/b] [/li] [li] License: [b]Commercial[/b] [/li] [li] OS: Windows [/li] [li] Price: [b]$299.95[/b] [/li] [li] Publisher: Xceed Software Inc. [/li] [li] Updated: 2 Jan 2007 [/li] [li] Downloads: 267 (1 last week) [/li] [/ul] Xceed Encryption Library is an ActiveX component that allows Windows applications to encrypt and decrypt data using the latest industry standard strong encryption algorithms. It supports traditional secret-key encryption as well as public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files. For traditional strong encryption, the library supports the newly adopted AES (US Advanced Encryption Standard) secret-key encryption algorithm (Rijndael), which uses 128, 192 or 256-bit keys. It also supports the Twofish encryption algorithm, a runner-up for AES. For public-key encryption, it offers the RSA algorithm unlimited key bit-sizes. It includes a test vector sample application with the test vectors required to demonstrate correct implementation of the encryption algorithms offered. The library uses the modern SHA-2 and HAVAL hashing algorithms so that passphrases can be converted to exactly the amount of bits required for an encryption key and with better mathematical properties than older hashing algorithms such as MD5. Like all Xceed components, this library is designed to be flexible yet extremely easy to use. In fact, it only takes one line of code to encrypt or decrypt memory or files. A single line of code can even be used to chain together multiple Xceed components like the Xceed Streaming Compression Library and the Xceed Binary Encoding Library, so you can compress, encrypt and encode data into text just as easily. The fully self-contained ActiveX control at the core of the library is all you need to include with your projects. It has no external dependencies such as MFC DLLs, runtime libraries or other resources. That translates to minimal hassle at distribution time. The library also supports all the available ActiveX functionality designed to make your programming job easier, such as categorized properties, built-in constants and enumerations, context-sensitive F1-help, optional para

      Size: Download
    • Protect Shareware
      Protect Shareware

      Use Protect Shareware to easily convert any program into a time-limited shareware. A function library offering a flexible locking system with solid encryption. Generate serial numbers to register your application. Easy to implement. Support for VB, C++, Delphi, Other exes and ebooks. We have seen many shareware applications protected with different kinds of protection. Like Nag Screens, Feature Limits, Trial by date, Trial by executions, Hardware Lock, etc. many developers use their own coding standards to protect their softwares. And this is really in-secure. This is where the crackers come around. Its not hard to crack a registration code with a simple debugger. Spend more time developing software and applications and let Protect Shareware worry about securing it for you. The tried and tested wrappers will handle everything for you and incorporate systems like Debugger Detection, Web Registration, Hardware Lock, Hardware Finger Print etc. Warez will be a thing of the past once you start using Protect Shareware.

      Size: Download
    • ExeShield

      ExeShield is a reliable and easy-to-use software solution that helps you to turn your developed applications into 'try before you buy' software. It is very easy to convert your applications into shareware software with little effort and maximum protection against piracy, backdating, reverse-engineering or any kind of tampering. ExeShield will protect virtually any Win32 executable, including: · Visual Basic · Delphi · C++ · C++ Builder · PowerBasic · MASM · Visual Studio ExeShield uses several different techniques for protecting your application. Special code is added to defeat most Debuggers and Monitors including W32Dasm, SoftIce, TRW 2000, Turbo Debugger, Sourcer, Filemon, ExeSpy, ResSpy, RegMon and Memory Monitor which are tools most crackers are using today. Your protected executable is also modified so it can't run without ExeShield. Even if the protected executable was pulled out of the protection shell, it would not execute -- since ExeShield modifies parts of the program. Main features: [ul][li]Anti-debugging & anti-monitoring protection[/li] [li]Sophisticated encryption technology[/li] [li]Detects backdating or re-installation[/li] [li]Reliable machine locking protection[/li] [li]Invisible software-based protection requires no dongles[/li] [li]Create evaluation copies tailored to your specific needs[/li] [li]Easy to use - No source code modification - no dependencies[/li] [/ul]

      Size: Download

    Top Freeware

    Top shareware

    Related Search