Helicon Photo Safe 2.80

Helicon Photo Safe is a fully featured image management program. It also allows you to protect your private images by encrypting them with a password. No one will be able to see your private photos except those who know the password. You can protect different groups of images with different passwords. You can also hide safes so that nobody even knows that your private photos exist on the computer. ...

Author Helicon Soft Ltd.
License Freeware
Price FREE
Released 2011-02-22
Downloads 577
Filesize 29.82 MB
Requirements 2 GHz processor, 1 Gb RAM, resolution 1280x1024
Installation Install and Uninstall
Keywords image management, browse, move, copy, protect private images, password, albums, ratings, encrypt, IPTC fields, EXIF information
Users' rating
(6 rating)
Helicon Photo SafeGallery & Cataloging ToolsWindows XP, Windows Vista, Windows Vista x64, Windows 7 x32, Windows 7 x64
Helicon Photo Safe information encryption - Download Notice

Using Helicon Photo Safe Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Helicon Photo Safe on rapidshare.com, depositfiles.com, megaupload.com etc. All Helicon Photo Safe download links are direct Helicon Photo Safe full download from publisher site or their selected mirrors.
Avoid: information encryption oem software, old version, warez, serial, torrent, Helicon Photo Safe keygen, crack.
Consider: Helicon Photo Safe full version, information encryption full download, premium download, licensed copy.

Helicon Photo Safe information encryption - The Latest User Reviews

Most popular Gallery & Cataloging Tools downloads

Helicon Photo Safe

2.80 download

... to creation of virtual folders or assigning tags Encryption/decryption of images in safes Image rating, that can ... location, but become not-viewable for all other programs. Encryption can be done with three diferent algorithms which ...