Encryption Tools

184 programs found

BitCrypt

BitCrypt is an elegant encryption application allowing for storage of text within an image. It is designed for persons who wish to store or communicate information in an invisible manner. The main strength of the program is the ability to...

Encrypt My Information

Encrypt My Information allows you to hide folders and encrypt files with on-the-fly AES encryption. Just create one or more encrypted secure folders from local folders and move your sensitive files into these specified folders and they will be encrypted/decrypted...

SafeBit Disk Encryption

SafeBit Disk Encryption is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, keep them encrypted all the time, but still work...

USB Safeguard

USB Safeguard is a portable software that allows you to protect your private files with a password on your removable drive using the secure AES 256 bits key. It protects data by creating a password-protected virtual drive on your portable...

Dekart Private Disk

Powerful, reliable and flexible disk encryption program that lets you create encrypted disk partitions (drive letters) to protect your confidential information. Private Disk hides and restricts access to your programs and data. Dekart Private Disk features an innovative Disk Firewall...

Easy Crypter 2012

Easy Crypter 2012 - a safe and convenient program which allows you to encrypt/decrypt single or multiple files as well as text, such as e-mail. It uses a modern modification of the DES algorithm for encryption - one of the...

Invisible Secrets Encryption Software

Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound...

SSH Tunnel Client

SSH Tunnel Client allows to connect to different SSH-Servers. With the SSH Tunnel Client it is possible to connect each TCP/IP Service over a secure SSH-Tunnel. Supports local and remote forwarding with SSH1 and SSH2.

TrueCrypt Password Plugin

A powerful application that will enable anyone to make their passwords unbreakable, mount, unmount and create container files for TrueCrypt. TrueCrypt Password Plugin is a useful tool that was especially designed to make it possible for you to strengthen your...

Aloaha PDF Crypter

Standard PDF Encryption with owner and user passwords used to be the only PDF protection. Unfortunately passwords do not stop somebody of passing the PDF document on to somebody else. Even worse is the fact that PDF passwords can be...

Secret Shield Encryption

Secret Shield Encryption Software is a powerful encryption program to securely encrypt text and files keeping them from from prying eyes. Secret Shield Encryption Protect your files, text eMails and documents, etc. Secret Shield Encryption uses public/private-key encryption that can...

TekCERT

TekCERT is X.509 Certificate / Certificate Signing Request (CSR) Generator and Signing Tool Generator runs under Windows (XP, Vista, 7/8, 2003/2008/2012 Server). Generates 1024, 2048, 3072 and 4096 bits certificates. Sha-1withRSAEncryption, sha256withRSAEncryption, sha384withRSAEncryption and sha512withRSAEncryption key algorithms supported. Freeware version...

east-tec SafeBit

east-tec SafeBit is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, keep them encrypted all the time, but still work with...

Best Disk Lock

DoGoodSoft Best Disk Lock is a powerful disks lock and USB devices control package. It can protect your data on disks and USB devices from leakage. To meet different users? need, this software provides three different lock levels ? elementary...

BlowFish 2000

BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from...