encryption tools downloads

FTP Client Engine for PowerBASIC

4.0.0 download

... mode (use with firewalls). - Supports S/KEY password encryption. - Supports many proxy servers. - Supports multiple concurrent FTP sessions. - Specify the FTP or data port. - Display progress ...

FTP Client Engine for Visual dBase

4.0.0 download

... mode (use with firewalls). - Supports S/KEY password encryption. - Supports many proxy servers. - Supports multiple concurrent FTP sessions. - Specify the FTP or data port. - Display progress ...

The Enigma Protector

7.40 download

... etc.) and .NET files created using various development tools, such as MS Visual Studio C#/C++/VB/VB.NET, Borland Delphi/C++, FreePascal, MASM, TASM and others. The protected files can be run on all ...

VeryPDF Form Filler

3.1 download

... the completed forms via e-mail, and apply 128-bit encryption or password protection to your PDF documents. Fill-in and save interactive PDF forms to your computer for easy archiving, E-mailing or ...

PDF Form Filling

3.1 download

... the completed forms via e-mail, and apply 128-bit encryption or password protection to your PDF documents. Fill-in and save interactive PDF forms to your computer for easy archiving, E-mailing or ...

PDF AcroForm Filler

3.1 download

... the completed forms via e-mail, and apply 128-bit encryption or password protection to your PDF documents. With Adobe Reader, if the file is an interactive form, you may enter data ...

VeryPDF Form Filler SDK Developer License

3.1 download

... the completed forms via e-mail, and apply 128-bit encryption or password protection to your PDF documents. Fill-in and save interactive PDF forms to your computer for easy archiving, E-mailing or ...

VeryPDF Form Filler SDK Server License

3.1 download

... the completed forms via e-mail, and apply 128-bit encryption or password protection to your PDF documents. Fill-in and save interactive PDF forms to your computer for easy archiving, E-mailing or ...

BiGZiP

1.1.44 download

... BiGZiP GUI. Routines such as Compression, Anti-Virus and encryption are all capable of being plugged into the BiGZiP front end. If you make one good enough we will even put ...

The Enigma Protector x64

7.40 download

... etc.) and .NET files created using various development tools, such as MS Visual Studio C#/C++/VB/VB.NET, Borland Delphi/C++, FreePascal, MASM, TASM and others. The protected files can be run on all ...

UFS Explorer Professional Recovery (Lin)

7.12 download

UFS Explorer Professional Recovery is first-rate software developed for specialists in the field of data recovery. The application successfully combines the most advanced data recovery algorithms with various instruments for thorough ...

UFS Explorer Professional Recovery (Mac)

7.12 download

UFS Explorer Professional Recovery is first-rate software developed for specialists in the field of data recovery. The application successfully combines the most advanced data recovery algorithms with various instruments for thorough ...

FoxBurner SDK

7.0.1 download

... implemented in a convenient CD/DVD/BD recording environment. The tools included in the kit allow your application to: archive data to Blu-ray, DVD or CD, write multiple data sessions to these ...

Exselo Desktop

2.5.6 download

... * Enterprise single sign-on. * Enterprise distribution through tools like Microsoft SCCM. ...

csv2qbo Convert

18.0.03 download

... that all data is handled securely, with robust encryption protocols in place to protect sensitive financial information during the conversion process. This focus on security provides users with peace of ...

csv2ofx Convert

18.0.03 download

... Convert reflects this commitment. The software employs robust encryption and data protection measures to ensure that sensitive financial information remains secure throughout the conversion process. 7. **Comprehensive Support:** MoneyThumb ...

OESIS Endpoint Assessment Tool

4.2.1263.0 download

... firewall applications, backup clients, antiphishing software, hard disk encryption and more. Current technology trends such as cloud computing and BYOD are making compliance an important topic everywhere, as organizations depend ...

VeryUtils PDF Digital Signature Tool

2.7 download

... certification level. * Setting hash algorithm. * PDF encryption and setting rights. * SHA 256/512 support. * Time Stamping. Signing a PDF document using a digital signature The main function ...

LetsExtract Email Studio

7.0.9020.20085 download

... LetsExtract Email Studio excels. The software employs robust encryption and data protection measures to safeguard your information, ensuring that your email lists and campaign data remain secure at all times. ...

CSV2QIF Converter

18.0.03 download

... priority for MoneyThumb, and CSV2QIF Converter incorporates robust encryption protocols to safeguard sensitive financial information. Users can rest assured that their data is protected throughout the conversion process. In ...

SysInfoTools PDF Split

22.10 download

... PDF Split software reflects this with its robust encryption features. Users can apply password protection to their split PDF files, ensuring that sensitive information remains secure. This is particularly beneficial ...

UltraEdit Portable

2024.0.0.35 download

... area where UltraEdit Portable shines. It includes robust encryption options to protect sensitive data, ensuring that your files remain secure even when working in potentially insecure environments. UltraEdit Portable ...

FileHash

5.2.0.1251 download

... out in the crowded field of file integrity tools by offering a blend of simplicity, speed, and reliability, making it an indispensable asset for IT professionals, developers, and security experts ...

New Version

Ebeiji PDF Converter

1.0.0 download

... and Ebeiji PDF Converter addresses this with robust encryption features. Users can protect their PDFs with passwords, ensuring that confidential information remains secure. The software also supports digital signatures, adding ...

4uKey - iTunes Backup

5.2.33.1 download

... tech-savvy users and those less familiar with such tools. The process is straightforward: simply select the encrypted backup file, choose the appropriate attack mode, and let the software work its ...