secret key downloads
Inky for iOS
3.3 download... the emails you send. Inky handles all the key and certificate management for you – so you don't have to be a crypto expert to send secure mail. It just ...
Inky for Mac OS X
3.3.0 download... the emails you send. Inky handles all the key and certificate management for you – so you don't have to be a crypto expert to send secure mail. It just ...
AntiSpye
1.00 download... work with important information, which must be kept secret and must not be visible to anyone, except ... more hard configurations from fingers to press simultaneous key combination! Simply move the mouse pointer to one ...
PrimaSoft Encryption - Service Edition
1.0 download... time. Encryption algorithms: AES (US Advanced Encryption Standard) secret-key encryption algorithm known as Rijndael. Certified by National Institute of Standards and Technologies (NIST). AES is the new official US government ...
001Micron Pro Duo Memory Card Recovery
9.8.6.1 download... song, music file formats, official documents and other secret data stored in your memory card MMC Mobile DV card. Pro Duo Stick recovery provides an option to start, stop and ...
east-tec Eraser
12.9.5 download... task scheduler for automatic cleaning and shutdown, Anti-Boss/Panic key to protect your privacy in emergency situations, support for custom privacy needs, user-defined erasure methods, built-in safety features that prevent you ...
SourceGear Vault Pro
1.19.0 downloadVault by HashiCorp is a robust and versatile secrets management tool designed to securely store, manage, and ... comprehensive suite of features to ensure that your secrets are protected and accessible only to authorized entities. ...
SourceGear Vault Pro
1.18.3 downloadVault by HashiCorp is a robust and versatile secrets management tool designed to securely store, manage, and ... comprehensive suite of features to ensure that your secrets are protected and accessible only to authorized entities. ...
MUTE File Sharing
0.5.1 download... (size selected by user at runtime) to exchange secret keys * AES (Rijndael) 128-bit secret keys used in CFB mode with all-zero initialization ... end-to-end. Because of person-in-the-middle attacks during a routed key-exchange, secure end-to-end encryption is impossible in an anonymous ...
TK8 Safe
3.2 download... information. You can keep all user names, passwords, secret notes and serial numbers in one secured database ... "Autofill" from the menu or press a hot key when you are at the login prompt. The ...
MultiObfuscator Cryptography & Obfuscation
2.00 download... - Deniable cryptography - Up to 256Mb of secret file (binary mode) - Up to 256Kb of secret text (text/email mode) - Whitening selection level - ...
ArmorTools
25.2.1 download... encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools Home
25.3.1 download... encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools Home x64
25.3.1 download... encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools
25.3.1 download... encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools Pro
25.3.1 download... encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools Professional x64
25.3.1 download... encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools Professional
25.3.1 download... encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
FirePassword
10.0 download... the passwords offline without affecting the target environment. Key features of Firepassword. * Instantly decrypt and recover stored encrypted passwords from 'Firefox Sign-on Secret Store' for all versions of Firefox. * Recover ...
Advanced Encryption Package 2008 Professional
4.8.7 download... version has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others ...
Advanced Encryption Package 2008 Professional
4.8.7 download... version has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others ...
Highster Mobile
3.0 download... Record all Calls Read all text messages Secret microphone activation WhatsApp, Facebook Instagram, Skype Stealth Camera ... Highster Mobile site to purchase/ obtain a license key. 1. After clicking on "buy" link, ...
Fast File Encryptor
13.3 download... your own or use any file as a key to encryption. For example, when sending secret information by mail, you can encrypt the transmitted ... wallpaper image or the Calculator program as a key. After passing the information to the recipient, he ...
MainStage 2 101 - Core MainStage
2 download... a keyboardist, MainStage 2 will become your new secret weapon … WIth the release of MainStage ... Tutorial-Videos, you'll get a comprehensive education on all key features of MainStage 2, including how the interface ...
FastEncryptor
13.3 download... your own or use any file as a key to encryption. For example, when sending secret information by mail, you can encrypt the transmitted ... wallpaper image or the Calculator program as a key. After passing the information to the recipient, he ...