secret key encryption downloads
ClassifyIt_Basic
5.8 download... of such classified or sensitive information it is key to mark and label the document, containing the ... distributed attachments can be encrypted with a AES encryption standard. Beside a classification ClassifyIT supports useful caveats ...
abylon BASIC
23.60.1 download... But the encrypting of diaries, pictures or other secret documents with the AES- or Blowfish-Algorithm is relatively simple. With the help of the Easy Encryption Technologie (EEnTe) only few steps are necessary to ...
Passbook
2.7 download... first. But if you want to keep passwords secret you have to encrypt the file using the ... context menu and lots of shortcut keys. INS key is used to insert a new item. DEL ...
XorIt
1.9 download... theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this ... used to be considered that a 56 bit key was unbreakable to brute force attacks, but the ...
IMProcessor
3.5 downloadSteganography is the art of hiding secrets in seemingly harmless files to protect information. The ... nobody will ever try to look for the secret file that was created, because they have no ...
ArmorTools
25.2.1 download... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools Home
25.3.1 download... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools Home x64
25.3.1 download... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools
25.3.1 download... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools Pro
25.3.1 download... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools Professional x64
25.3.1 download... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
ArmorTools Professional
25.3.1 download... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...
abylon SHAREDDRIVE
23.60.1 download... Explorer on the desktop level and protect your secret files. The complete integration into the Explorer environment simplify using of the software. The encryption and decryption with the e.g. AES algorithm is ...
east-tec InvisibleSecrets
4.8 download... your personal web page to exchange messages or secret documents. east-tec InvisibleSecrets 4 features: strong encryption algorithms; steganography and a library of favorite carriers ... virtual keyboard created in order to prevent any key logger software from stealing your passwords; a shredder ...
Any File Encryptor
3.4.25 download... Encryptor is a software designed for robust data encryption and protection. Here are the key features of this software based on your description: Government-level Security (AES Encryption): The software employs Advanced Encryption Standard (AES), a ...
Fast File Encryptor
13.3 download... your own or use any file as a key to encryption. For example, when sending secret information by mail, you can encrypt the transmitted ... wallpaper image or the Calculator program as a key. After passing the information to the recipient, he ...
FastEncryptor
13.3 download... your own or use any file as a key to encryption. For example, when sending secret information by mail, you can encrypt the transmitted ... wallpaper image or the Calculator program as a key. After passing the information to the recipient, he ...
File Encryptor
13.3 download... your own or use any file as a key to encryption. For example, when sending secret information by mail, you can encrypt the transmitted ... wallpaper image or the Calculator program as a key. After passing the information to the recipient, he ...
The Cipher
4.0 download... designed to encrypt and decrypt files. Features: - Encryption and decryption of files using GOST, Blowfish, IDEA, ... RC2, RC5, RC6, DES, TEA on password; - Encryption and decryption of files using CHR, and BIT ...
Inky for iOS
3.3 download... the emails you send. Inky handles all the key and certificate management for you – so you don't have to be a crypto expert to send secure mail. It just ...
Inky for Mac OS X
3.3.0 download... the emails you send. Inky handles all the key and certificate management for you – so you don't have to be a crypto expert to send secure mail. It just ...
chezmoi
2.61.0 download... adaptable to different workflows. One of the key features of chezmoi is its ability to manage secrets securely. It integrates seamlessly with various secret management tools, ensuring that sensitive information such as ...
MUTE File Sharing
0.5.1 download... many platforms (no Java, no Python, etc.). Encryption Neighbor connections in the MUTE network are ... (size selected by user at runtime) to exchange secret keys * AES (Rijndael) 128-bit secret keys used ...
Easy Cloud Password 3 months Android
1.1.26.0 download... help you manage passwords to ensure the safety. Key Features: 1.The data of mobile phone (Android) can ... Password is still workable. 2.Secret Word combination of encryption method used, use multiple encryption algorithms, can effectively ...
Easy Cloud Password 3 years Android
1.1.26.0 download... help you manage passwords to ensure the safety. Key Features: 1.The data of mobile phone (Android) can ... Password is still workable. 2.Secret Word combination of encryption method used, use multiple encryption algorithms, can effectively ...