|
||||||
|
||
|
Home > Strong encryption software |
Related keywords: encryption, file encryption, Encryption, encryption software, encryption system, email encryption, strong, data encryption, hard disk encryption, ENCRYPTION |
|
|
171. | IntraMail 2003.01.20 (homepage.sunrise.ch) | ||
can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed networks can be used very securely. A CHAT-room | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
172. | Private Encryptor 6.2 (tropsoft.com) | ||
the latest in encryption technology to protect your sensitive data. Privacy tools include file/folder encryption, e-mail encryption, file/folder shredder, file/folder Backup with auto encryption, My Passwords, My Private Notes, Installable Encryption Modules, Compression, Context Menu support, Stealth Media Encryption super speed for large image | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
173. | wodSSH 2.3.7.0 (weonlydo.com) | ||
layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH is easily - just put it on your form, set Protocol type and issue Connect method - and just wait for things to happen. When in secure mode - you can connect to SSH servers, which are standard today in remote console | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
174. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys for the server (or import existing ones from other SSH servers) and start the server. From | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
175. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH.NET is easily - just put it on your form (or initialize new instance on the fly), set Protocol type and issue Connect method - and just wait for things to happen. You connect to SSH servers, which are standard today in | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
176. | Home CHAOS 3.5 (safechaos.com) | ||
of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
177. | Tunnelier 4.12 (bitvise.com) | ||
HTTP proxy for dynamic forwarding; forwards Windows file shares; has strong auto-reconnect features; an FTP-to-SFTP protocol bridge; support for single-click Remote Desktop forwarding for graphical server access. Supports public key user authentication, as well as transparent authentication with | |||
Updated: 2, 2006 | Rating: 1238 | Author: Bitvise Limited | Size: 4380 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
178. | CryptArchiver 1.2.1.0 (winencrypt.com) | ||
really easy to hide, encrypt and password protect data with CryptArchiver. All you do is drag-and-drop your important files and folders into an encrypted drive - just like an ordinary drive! CryptArchiver has an intuitive and easy-to-use interface. CryptArchiver Lite is encryption software for the desktop. It creates a special Encrypted Drive that can only be accessed with | |||
Updated: 9, 2005 | Rating: 27 | Author: WinEncrypt | Size: 1524 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
179. | Sticky Notes Std 5.0 (morun.net) | ||
hide sticky notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Desktop notes are saved automatically. If the Recycle Bin option is on, deleted sticky notes are placed to the Recycle Bin and can be restored any time. Now you don't have to worry about your personal information being seen by others | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. net | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
180. | MoRUN.net Sticker 5.0 (morun.com) | ||
hide sticky notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Desktop notes are saved automatically. If the Recycle Bin option is on, deleted sticky notes are placed to the Recycle Bin and can be restored any time. Now you don't have to worry about your personal information being seen by others | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
|
Home > Strong encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|