Subscribe: Encryption Software shareware freeware adware software downloads
http://www.brothersoft.com/rss/security_encryption_software.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
computer  data  desktop  drive  encrypted  encryption  file  files  password  playback password  playback  system  user  windows 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Encryption Software shareware freeware adware software downloads

Encryption Software shareware freeware adware software downloads



Encryption Software software download - Encryption Software freeware shareware downloads.



Published: Mon, 14 Feb 2011 19:26:22 GMT

Last Build Date: Mon, 14 Feb 2011 19:26:22 GMT

Copyright: Copyright 2007, brothersoft.com
 



CryptoExpert 2010 Professional
(image) CryptoExpert is on the fly disk encryption software. It creates big encrypted files on your hard drive. It is possible to open these files as usual hard drives looking like G:,H:,I:,J: and etc (this operation requires password authorization). You can work with files located on these hard drives from any program including Microsoft Word, Excel, Windows Media Player and etc. You can also move all your private movies from digital video camera to this encrypted hard drive. No limitations! Features: Multiple "virtual" hard drives in your system protected by password Strong encryption using AES 256 bit Support for huge encrypted drives 256 Gb and larger Two factor authentication support - strong passwords plus decryption keys located on any type of USB Memory Sticks Disk Firewall to protect private data from stealing Compatibilty with Windows(R) Vista(R) 32 and 64 bit as well as XP 32 and 64 bit (Windows 2000 is also supported). Tag:microsoft word windows xp professional AutoCAD 2008 windows media player windows 2000 professional flash menu



CryptoExpert Lite
(image) CryptoExpert Lite is a free encryption software. It uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to the volume file. Attempts to read from this volume are also intercepted, and the relevant data is read by CryptoExpert from the volume file, decrypted, and presented to the application trying to read the data. Dismounting the CryptoExpert "virtual drive" ensures that data cannot be read from or written to it. All data is stored encrypted within the "container". As far as windows is concerned, there is a 'new' disk that has suddenly appeared. When the program exists or the volume is unmounted, the file system stays encrypted and there is absolutely no way anyone can recover/get the data without the pass phrase. The latest version includes special tool to erase all personal traces on computer. Features Using powerful encryption algorithm to encrypt your data: CAST 128 bit Ability to create encrypted containers (files vault) up to 20 Megabytes in size Access to your files on virtual volume on the fly Mapping any free drive letter like G:, F:, K: for virtual volume Requires password authentication before the files become accessible Works with all Windows application - even DOS applications Really Fast Looks like normal hard drive Freeware! Tag:encrypt fly password protect encryption blowfish cast disk virtual drive volume shred wipe des container



CryptoUP
(image) CryptoUP is a 32Bit application running under all current Microsoft Windows operating systems for PCs only. CryptoUnPlugged was designed to code or decode any kind of file no matter what ingredient. This utility does not leave a trace in the encrypted file. The file size differs slightly compared to the original. This is quite normal and offers enhanced security. The whole power of this Application is in the key, the key extension and the key file, if desired. CryptoUP is not optimized to speed, but to security. Any possible opponent is invited to use CryptoUp without any disadvantage. There are several modes available, for example it is possible to use 'one time pad'. The manipulation of the FPU-Modes offers additional combinations. Hence it's not a method itself, only for the sake of compatibility. An other utility enables building of alphanumerical groups to five characters each often found on shortwave broadcasts. Use the Hash-function as a signature to ensure the file content is valid. CryptoUP has never been broken so far. But be careful no encryption method on earth has the one and only security. Use this program completely at your own risk and take care of your key. If you have lost it please sit down keep cool and pour a stiff drink. Tag:windows operating system operating system microsoft windows he man encrypted file f file operating syst no encryption not optimized rating systems windows operating systems



OhCrypt
(image) OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Triple DES. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. Features: * Easily encrypt and decrypt any file * Clean user interface * Lightweight and suitable for portable use * Cross-Platform Software Tag:user interface triple des encryption algorithm decrypt files decrypt file clean user interface clean user secure your data clean and simple simple interface



Encrypted RunAs
(image) Encrypted RunAs let users run restricted programs without having to make them members of the Power Users or Administrator groups Encrypted RunAs is a small tool that is created to make the job of Administrators a little easier, it can be used to run applications or software installations with access rights a standard user does not have. Why Encrypted RunAs? When you work with computers you will soon come across software that will not work with limited user rights. Normally you would have to either add the user to the administrators or Power User group or find why the software requires administrative rights in the first place, this could be due to many reasons ie, trying to access the local machine registry, registering a dll or ocx control etc etc. With Encrypted RunAs installed, a shortcut to an application can be created that uses an account on the local machine that has administrator rights. Therefore only giving rights that are required for the application to run correctly and not the whole machine. As an additional security factor, the program uses a CRC fingerprint, to make sure that the program launched is indeed the one that it was intended for, and also verifies the account. Encrypted RunAs also creates files that can be called from logon scripts. Tag:encryption software encryption tool file encryption folder encryption CRC fingerprint fingerprint ocx ocx control Administrators local registry



SilentEye
(image) SilentEye is a cross-plateform application design for friendly use of steganography, in this case hidding message into pictures. It's provides a pretty interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. Two main plug-ins family exists: Cryptography plugins: Allow application to encrypte data before hidding them, for exemple AES 128. Image format plugins: By default it's provided a BMP plug-in which allow you to save encoded images into .bmp files. (JPEG plug-in is on his way...) The simplest way to open an image is to drag and drop it on the main window of SilentEye. You can also use the clasic browsing system as well. Tag:drag and drop bmp file bmp files image format the sim application design use st easy integration s way aes 128 s pro



Protectorion
(image) Protectorion is the program for secure file management on your PC! Protect your files and folders with strong encryption. Manage and transport data securely between USB flash drives and hard drives. Create encrypted backup copies of your data. Give your files a description for immediate retrieval when required. Better organize your files by creating file versions. Send encrypted files via E-mail. Strong encryption Strong and quick encryption for all file types. Secure and recognized industry standard AES 256 bit. Encryption and decryption of folders and files with a mouse click. Secure Exchange and Backup Safe transportation and exchange of encrypted files. Strong encryption for file on USB flash drives and hard drives. Encrypted backup copies of all data. Encrypted E-Mails Send encrypted files as an e-mail attachment. automatically with a mouse click with your personal e-mail program. The encrypted attachment is protected with a unique code. Descriptions and Versions Describe files and folders with clear descriptive texts. Create versions for frequently used files. Automatic encryption of all descriptive texts and versions. Files and Templates Select and create new files from the file templates. Easy creation of a template collection for frequently used files. Automatic encryption of all new files and templates. Search and Find Search quickly and clearly with search result rating. Find files, descriptions and versions based on search criteria. Organize search results by dragging them to the appropriate folder. Tag:mouse click usb flash drive flash drive usb flash aes 256 bit file man file manage file management file managemen secure file use c encrypted e search and find mail pro easy creation



gpg4win
(image) Gpg4win is a installer package for Windows (2000/XP/2003/Vista) with computer programs and handbooks for EMail and file encryption. Both relevant cryptography standards are supported, OpenPGP and S/MIME (the latter is in progress and currently works with GnuPG2 and Claws Mail). The Gpg4win project aims at updating the Gpg4win Windows installation package with GnuPG encryption tool, associated applications and documentation on a regular basis. Especially the documentation (handbooks "Novices" and "Durchblicker") are directly maintained as part of the Gpg4win project. Another central aim is the united support of both relevant cryptographic standards, OpenPGP and S/MIME. This is work-in-progress, but should be finished by the end of 2007. Gpg4win is an international project. Due to the origin of the project and many members, German language is fully supported as well. Any additional translators are very welcome! The main difference compared to all other similar approaches (mainly GnuPP, GnuPT, Windows Privacy Tools and GnuPG-Basics) is that the first piece developed was the Gpg4win-Builder. This builder allows to easily create new gpg4win.exe installers with updated components. It runs best on a GNU/Linux system. Almost all products are even automatically cross-compiled for integration into the installer. With this concept it is hoped to good practical support to prevent quick aging of the installer package. Because updating is much easier and does not depend on a single person. Tag:file encryption e document windows installation german language r package installer package for windows for windo win pro x system fully supported c standard international project



CryptoLicensing For ActiveX 2011
(image) CryptoLicensing for ActiveX provides a robust, yet easy way to add licensing, copy-protection and activation capabilities to your VB6, VBA, RealBasic, Delphi, Borland, MFC, ATL, C++, etc applications, libraries, components and controls. CryptoLicensing for ActiveX uses the latest military strength, state-of-the-art cryptographic technology to ensure that your software and intellectual property is protected. CryptoLicensing offers the right balance of: Military-strength security Secure and unbreakable cryptographic licenses offer maximum protection to your software. Customer friendliness Easy on your customers. Hassle-free activation and hardware locking scheme. Flexibility Adaptable to suit your exact needs. Reliability We have been developing, improving and honing licensing schemes for all our products since years. We have expert domain knowledge in the area of licensing and copy-protection. Functionality Variety of licensing rules for the most common licensing scenarios. Cryptographic licenses for full versions of your software. Evaluation or trial versions. Online or manual activation and hardware locking. Network Floating licenses. On-demand licenses. Subscription licenses. And more! Tag:install activex control activex control activex printable 2011 calendar super bowl 2011 free 2011 calendar 2011 yearly calendar



Advanced Desktop Locker Home Edition
(image) Protect your desktop and prevent people from accessing your desktop icons and your private files. Advanced Desktop Locker (ADL) is an easy to use desktop protection software, you can lock your desktop with one mouse click. With this software no one can access your desktop or your important files, you can password protect your desktop and display custom message to any one click your desktop, our software record mouse clicks and invalid passwords input to enable you know if someone try to access your PC. You can password protect ADL options, set and change master password of the program easy, Advanced Desktop Locker allows you to create virtual desktop to prevent people from accessing your desktop icons and your private files, you can select from many virtual desktop and you can download more from our website for free. Advanced Desktop Locker prevent access to Task Manager, (CTRL+ALt+Del), (Alt+F4),.... When your Pc being locked to prevent people from closing the locker. You can lock your desktop by many virtual desktop types, you can use transparent locker, color locker and virtual desktop locker, you can customize each type of lockers easy. With this software no one can access your desktop icons, programs and documents, you will love our Advanced Desktop Locker software. Home Edition Limitation: Home Edition is a trial version of the program. Tag:desktop calendar 3d home architect alienware desktop theme desktop clock xp home edition desktop world clock home alone 2 mouse click avg home edition desktop memo pad



Remove PowerPoint Password to Modify
(image) Remove PowerPoint Password to Modify instantly and securely removes any password to modify from MS PowerPoint 2007 presentations.Remove PowerPoint Password to Modify There is no need to try to re-create your presentation, loosing you valuable time. · Passwords of any length and character set are supported and removed in seconds. · Secure password removal without damages to the file + automatic backup. · The software supports the PowerPoint 2007 file formats. Works on all MS Windows platforms including Windows 7. · Full money back guaranty for the unlike event of a failure. Tag:windows 7 powerpoint 2003 microsoft powerpoint yahoo password hack yahoo password hacking Remove WGA password finder yahoo password cracker powerpoint remove duplicate images my password generator netwrix password manager



ParseIT
(image) ParseIT is a handy and easy to use parser tool that will help you analyze transactional messages from raw data and logs. It provides a simple and effective way to fast parse and compare messages. The intuitive interface provides quick access to the fields of the message, their value and their description. Supported Protocols: ISO 8583 with one, two or three bitmaps. ISO 7816 (EMV). SPDH and derivatives. HEX, ASCII, BCD or EBCDIC format. LVAR, LLVAR and LLLVAR variable fields. TLV fields. Complex fields and sub-fields structures. Header and Trailer. Multiple messages formats versions. Here are some key features of "ParseIT": · Friendly interface. · Ready to use message format configuration file for Visanet, Banknet, SPDH, etc. · Message format configuration file can be easily edited to handle any message format. · Show parsing errors. · Compare two messages. Tag:quick access ds s friendly interface s form it pro



Sticky Password
(image) Try the intelligent password manager that works with all popular web browsers and usual programs. The first and foremost advantage of Sticky Password is the fact that it works with web forms and dialog windows of regular applications. Most password keeping applications are adapted for web environment only, and many work properly only with Internet Explorer. Another advantage of Sticky Password is an unique and innovative "password protector" feature. The program constantly watches on how the passwords are used on the computer. Password protector is effective to prevent keylogger and trojan-horse attacks. The complete list of features: * Password protector prevents phishing. * The passwords are stored in a strongly encrypted database. * Can work from portable device. * Private information easily associated (sticked) to any program window or WEB page. An intelligent feature will automatically retrieve password for you. * The passwords and other fields are filled automatically to the appropriate fields of usual applications and web pages. * Multiple logins and password for single account. * Microsoft Windows user accounts support: each computer user has own passwords database. * Ease of use: two steps to add password to the database and only one step to retrieve the it! * Simple interface: user usually works with single control on the screen. * The strong passwords generator: be safe with unpredictable passwords. * Automated backup of passwords database: you can restore modified or deleted passwords on any day and at any time! * Automated security: the database is locked automatically after the specified timeout. You can unlock it again only by entering the master password. * Simplified collaboration: you can export passwords to different file formats and merge them with other accounts. * Easy search: you can search for your password by any keyword. Tag:



DU Clean N' Optimize
(image) Clean N' Optimize has highly customizable cleaning options and supports the most common web browsers and chat applications. It has a built in Shredder, so the cleaned files/folders can not be recovered again and separate shredder to manually shred files, folders, drives empty space, and recycle bin with the most famous and secure shredding algorithms. It is a powerful optimizer for Internet connection, System like optimizing hard drive, Windows Explorer like disable save settings at shutdown and Privacy like locking some hard drive partitions. Also it has Startup Manager to modify the applications that launch at windows startup and Uninstall Manager to modify or uninstall the user-installed applications. With Clean N' Optimize you can clean your system with One Click. It has easy to use interface. The main window is just the start guide for you to use Clean N' Optimize in efficient and easy way. Read the instructions and follow the links to start using the program. The Clean Settings Window consists from 3 main sections: 1)Internet items includes the following, categories Browsers: in the browsers tabs, you can check items that will be cleaned in each installed browser and Chat: in the chat tabs, you can check the items that will be cleaned in each installed chat program. 2)System Items consists of the windows category which consists from History Cleaner: check the history items that you want to clean which are related to windows system and Recent Files Cleaner: check the recent files that you want to clean which are related to windows built-in, the hard drive cleaner will free up the hard drive space by deleting the temporary and unnecessary files, you can include files with specific Extensions to be deleted. 3)Registry Items: the Broken registry items means the leftover registry keys that should be deleted from the system registry. With shredder you can shred 3 categories:1)Shred Files/Folders, 2)Shred Empty Space, 3)Shred Recycle Bin. Tag:Cleaner Optimizer Shredder shred files folders drives empty space recycle bin secure Powerful Internet connection System hard drive Windows Explorer Privacy locking



Free BPS Clean N' Optimize
(image) Clean N' Optimize has highly customizable cleaning options and supports the most common web browsers and chat applications. It has a built in Shredder, so the cleaned files/folders can not be recovered again and separate shredder to manually shred files, folders, drives empty space, and recycle bin with the most famous and secure shredding algorithms. It is a powerful optimizer for Internet connection, System like optimizing hard drive, Windows Explorer like disable save settings at shutdown and Privacy like locking some hard drive partitions. Also it has Startup Manager to modify the applications that launch at windows startup and Uninstall Manager to modify or uninstall the user-installed applications. With Clean N' Optimize you can clean your system with One Click. It has easy to use interface. The main window is just the start guide for you to use Clean N' Optimize in efficient and easy way. Read the instructions and follow the links to start using the program. The Clean Settings Window consists from 3 main sections: 1)Internet items includes the following, categories Browsers: in the browsers tabs, you can check items that will be cleaned in each installed browser and Chat: in the chat tabs, you can check the items that will be cleaned in each installed chat program. 2)System Items consists of the windows category which consists from History Cleaner: check the history items that you want to clean which are related to windows system and Recent Files Cleaner: check the recent files that you want to clean which are related to windows built-in, the hard drive cleaner will free up the hard drive space by deleting the temporary and unnecessary files, you can include files with specific Extensions to be deleted. 3)Registry Items: the Broken registry items means the leftover registry keys that should be deleted from the system registry. With shredder you can shred 3 categories:1)Shred Files/Folders, 2)Shred Empty Space, 3)Shred Recycle Bin. Tag:Cleaner Optimizer Shredder shred files folders drives empty space recycle bin secure Powerful Internet connection System hard drive Windows Explorer Privacy locking



Encrypt My Information
(image) Encrypt My Information allows you to hide folders and encrypt files with on-the-fly AES encryption. Just create one or more encrypted secure folders from local folders and move your sensitive files into these specified folders and they will be encrypted/decrypted in real-time. You can work with the files as usual, and when you finish, lock the secure folder, which will store the files securely and also hide the entire folder from view. Tag:encrypted encrypt information folder Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003



PDF Encryptor
(image) With this encryption tool, you can encrypt your pdf files into exe files that can only be opened when a Read Password is provided (PC-binding or No PC-binding), and users can only open the encrypted pdf files after obtaining the Read Password provided by you. You can choose encryption type : [ Non-binding ] -- All computer,One password. (Use "Create Read Password" function to create Read Password, Enter "00000-00000-00000" as Machine ID); [ PC-binding ] -- One computer,One password,you only need to encrypt files one time. (Use "Create Read Password" function to create Read Password); [ Protect only ] -- pdf2exe only. How do I know the machine ID of the user's computer? When a user wants to open an encrypted file, the encrypted file will pop up a dialog box to request the user to enter a Read Password. This dialog box will display the machine ID of the user's computer. The user can send his/her own machine ID to you, and you can create a Read Password based on the user's machine ID. After that the user can use this Read Password to open your file on his/her computer. Tag:PDF Encryption



CryptoExpert 2008 Professional
(image) CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to the volume file. Attempts to read from this volume are also intercepted, and the relevant data is read by CryptoExpert from the volume file, decrypted, and presented to the application trying to read the data. Dismounting the CryptoExpert "virtual drive" ensures that data cannot be read from or written to it. All data is stored encrypted within the "container". As far as windows is concerned, there is a 'new' disk that has suddenly appeared. When the program exists or the volume is unmounted, the file system stays encrypted and there is absolutely no way anyone can recover/get the data without the pass phrase. Complete support for command line. Support for USB Flash Drives to mount containers without passwords. Works on Vista 32 and 64 bit. XP 32 and 64 bit as well as on 2000 and 2003. The latest version includes new feature: Disk Firewall to protect your virtual drive contents from malicious applications like viruses, trojajns and etc. Tag:encrypt fly password protect encryption blowfish disk virtual drive volume shred wipe des container vista



SkypeLogView
(image) SkypeLogView reads the log files created by Skype application, and displays the details of incoming/outgoing calls, chat messages, and file transfers made by the specified Skype account. You can select one or more items from the logs list, and then copy them to the clipboard, or export them into text/html/csv/xml file. Tag:xml file file transfer outgoing calls log file skype account log files files created copy them outgoing call chat messages



Golden Shield Video Encryptor
(image) Encrypt various types of video or audio files (e.g., wmv, avi, asf, mpg, rm, rmvb, mp4, flv, any other if you have corresponding decoder ) into exe files that can only be played when a Playback Password is provided, and users can only play the encrypted media files after obtaining the Playback Password provided by you. When a user wants to play an encrypted file, the encrypted file will pop up a dialog box to request the user to enter a Playback Password. This dialog box will display the machine ID of the user's computer. The user can send his/her own machine ID to you, and you can create a Playback Password based on the user's machine ID. After that the user can use this Playback Password to play your file on his/her computer. Since the Playback Password is created based on the user's machine ID, the user will not be able to share the Playback Password with other users. The encrypted files can be used to achieve the following: Multiple encryption modes: Non-PC-Binding, All computer ,One password; PC-Binding, One computer,One password; Video2exe, Convert video to exe only; Only need to be authenticated once on the same computer(With same Key and Product ID). You can specify the number of playbacks allowed, the time of playback and expiry date. It can be configured to disconnect the network during playback, which disallows the users to share or record the media remotely; It can be configured to prevent other windows from opening during playback; Watermarks can be added to videos; It can be specified whether free trial watching or listening is provided; You can configure a user prompt so as to let users know how to contact you to obtain the Playback Password; Screen recording can be prevented. Tag:One Computer One Password avi2exe wmv2exe rmvb2exe mpg2exe video encryption



Video Shield - Embed decoder and player
(image) Encrypt your video files with embedding decoder and player , User needn't install any decoder or player to play your video. you can encrypt various types of video or audio files (e.g., wmv, avi, asf, mpg, rm, rmvb, mp4, flv, Vob) into exe files that can only be played when a Playback Password is provided, and users can only play the encrypted media files after obtaining the Playback Password provided by you. When a user wants to play an encrypted file, the encrypted file will pop up a dialog box to request the user to enter a Playback Password. This dialog box will display the machine ID of the user's computer. The user can send his/her own machine ID to you, and you can create a Playback Password based on the user's machine ID. After that the user can use this Playback Password to play your file on his/her computer. Since the Playback Password is created based on the user's machine ID, the user will not be able to share the Playback Password with other users. Since the Playback Password is bond to the user's computer, the user will not be able to re-distribute your files. Tag:avi2exe wmv2exe rmvb2exe mpg2exe rm2exe asf2exe mp3 to exe wma2exe



SWF Advanced Protector
(image) 1.Encrypt SWF files:Prevent decompiler,Prevent screen recording,Prevent cracking,Prevent copying. 2.Encrypt SWF files into exe format that can only be played after obtaining the Playback Password provided by you. 3.Add progress bar for your swf files,so that you can drag progress bar during playback. 4.Add Full-screen shortcuts 'Ctrl+F',you can Full-screen swf playback . 5. It can be configured to disconnect the network during playback, which disallows the users to share or record the media remotely; 6. You can configure a user prompt so as to let users know how to contact you to obtain the Playback Password; You can choose encryption mode : [ Non-binding ] -- All computer,One password. (Use "Create Playback Password" function to create Playback Password, Enter "No limit" as Machine ID); [ PC-binding ] -- One computer,One password,you only need to encrypt files one time. (Use "Create Playback Password" function to create Playback Password); [ Protect only ] -- Prevent decompiler, protect your swf action script. How do I know the machine ID of the user's computer? When a user wants to play an encrypted file, the encrypted file will pop up a dialog box to request the user to enter a Playback Password. This dialog box will display the machine ID of the user's computer. The user can send his/her own machine ID to you, and you can create a Playback Password based on the user's machine ID. After that the user can use this Playback Password to play your file on his/her computer. How to use this software? Please watch the encryption video demonstration, you can find the video demo in downloaded package. Tag:swf encryption swf protector swf encrypter