Encryption Tools

184 programs found

Secure Image Protection

Copy protect images on your web site and CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on...

Best Folder Encryptor

DoGoodSoft Best Folder Encryptor is a professional and mature file and folder encryption package. It encrypts files and folder with superfast, strong and faultless algorithms. You can choose from five encryption methods when encrypting a folder. Flash Encryption instantly encrypts...

Aloaha ZIP

Aloaha ZIP is a 1 MB stand alone application which does NOT require any setup. Features: Strong encryption with AES256 supported (as default). Certificate based Zip Encryption supported to stop the password hell. ZIP can be encrypted for multiple certificates/recipients....

Kruptos 2 Go

USB drives are the most common way to move data from one computer to another. They are small, portable and often contain highly sensitive data which can be worth millions of dollars. USB drives pose a security risk and can...

Folder Password Pro

Are you looking for an efficient way to protect sensible documents on your computer from prying eyes? Download Folder Password Pro, the software program that allows you to store important files in an encrypted folder on your work or home...

My Fast VPN

My Fast VPN is a free encrypted VPN client that routes your Internet traffic via secure servers that hide your actual ip and protect your online privacy. It provides a easy to use user interface for anyone to use. Also,...

Appnimi MD2 Decrypter

Appnimi MD2 Decrypter helps in decrypting any MD2 hash string. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true MD2 Decrypter available in the market. Above all it is FREE....

USB Encryptor

USB Encryptor is a professional USB storage encryption package. It can encrypt all data in a storage device in just seconds, whether it is a USB flash drive, removable drive, memory card or a memory stick. Data encrypted by USB...

Aloaha Crypt Disk

Features - Creates a virtual encrypted disk within a file and mounts it as a real disk - Encryption is automatic, real-time (on-the-fly) and transparent - Parallelization and pipelining allow data to be read and written as fast as if...

ProxyCrypt

ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users,...

SumRando VPN

Security and Privacy Encryption Software for Windows - SumRando VPN provides online security, privacy and anonymity with high level 128-bit AES encryption of our web traffic. Connect through our six different servers located worldwide - Sweden, US, Hong Kong, Singapore,...

Wise Folder Hider

Wise Folder Hider is freeware. It can quickly and safely hide not only the files/folders on local partitions or removable devices but also USB drives or the files/folders on USB drives. The hidden files/folders will be safely hidden no matter...

fideAS file private

Encryption for the masses! fideAS file: Professional encryption solution at no cost! Since the dicoveries of the former NSA employee Edward Snowden everybody knows that Big Brother is no longer fiction and global espionage is a reality. A perfect way...

All-In-One Protector

All-In-One Protector protects important documents, conference materials, software, company presentations, etc., against being copied and tampered with. Companies, for example, can safeguard conference materials against misuse, information designed for the sales force against disclosure and course and workshop contents against...

BestCrypt Volume Encryption

BCVE encrypts all types of volumes residing on fixed and removable disks - simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5). BCVE allows encrypting data with many strong encryption algorithms. Every algorithm is implemented with the largest possible...