Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: E :: encryption
Display: short descriptions | full descriptions
  • Recovers lost passwords for any ZIP archives (classic and WinZip AES encryption). Boosted by AMD video cards supporting ATI Stream and NVIDIA video cards supporting NVIDIA CUDA. If video cards are used, zip password recovery is up to 60 times faster. Automatic password search mode. A macro language for creating mutation rules in a dictionary-based attack. www.passwordrecoverytools.com/zip-password.asp - professional zip password recovery
  • Scan2Encrypt uses any scanner or webcam to convert hard copies of your documents and photos into secure and searchable PDF files. It provides filter, redaction, rotate, merge, OCR, 256-bit AES encryption and support for direct upload to Dropbox or sending by email using Outlook or directly though SMTP server. This is extremely easy to use software and it takes only 4 clicks to scan, merge, convert, encrypt and upload to Dropbox or send by email.
  • CloudsRAID is a powerful utility for (1). Backup your confidential and critical files to public cloud storages with high security and reliability. (2). Synchronize confidential files among computers by RAID5 of multiple cloud storages with high security and reliability. (3). Backup/Synchronize file automatically by flexible schedule. CloudsRAID is the first one and only one cloud storage RAID system in the world until now with (1). High Security - It is nearly impossible to hack your confidential data. Data file is compressed first, then encrypted by AES 256bit; furthermore the data is distributed randomly to data blocks, then the data blocks are uploaded to multiple cloud servers like a RAID5 system. Even some of the cloud servers are hacked by someone, he only get some parts of the data, but he cannot recover it to the original data file. (2) High Reliability - Multiple cloud storages are used as a RAID5 system. Multiple cloud storages, such as Amazon S3, Google Storage, Windows Azure ...
  • CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.
  • PDF Postman offers an easy way to send private emails with MS Outlook that is friendly for the recipient. Messages and files are placed in a PDF file then encrypted with strong AES-256 encryption. Since most recipients already have a PDF viewer, they need only click on the encrypted pdf file and enter a password. Works across devices and platforms. No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.
  • MessageLock adds email encryption and zip file compression to Microsoft Outlook. It combines strong U.S. Gov't approved AES-256 bit encryption with the near-universal compatibility of the Zip file format. MessageLock delivers email encryption and zip compression for your message and/or file attachments. With version 2.2, MessageLock now integrates with the Lockbin.com web service, allowing you to send secure messages to anyone. Download a trial
  • CIB pdf brewer works as a virtual printer and generates PDF within all Windows applications for free (suitable for servers: Windows Terminal Server, CITRIX, network printer). With CIB pdf brewer it is also possible to create ZUGFeRD compatible invoices. Some important features among others are: file size optimization, PDF encryption, font embedding, PDF bookmarks, watermarks, stationery support, CMYK, hyperlinks and e-mail delivery after the conversion. CIB pdf brewer also Provides separate toolbar icons for ease of use within Microsoft Office. The printer provides settings to configure the PDF appearance while opening, e.g. full-screen mode or continuous double page. By using the context menu of the file explorer, files can be directly converted to PDF. The software allows joining of PDF documents and PDF attachments like images or other documents. The PDF versions 1.3 to 1.7 are supported. The software provides detailed settings for choosing the location and file name of created PDFs, e.g. auto enumeration. ...
  • Free File Splitter Joiner is free file splitter joiner software to split any file into smaller pieces for easier transfer, storage and file management, and then rejoin them later for use. It does an excellent job in splitting any big files of audio, video, text, images, etc. into small chunks so they can be easily attached to an email, stored on a removable device, recorded, uploaded, or played. After the split files are copied or moved into the desired source, you can join them together to recreate the original file. Moreover, it can choose the maximum size for file parts from floppy disc, 74-minute CD-ROM, 80-minute CD-ROM and 100MB or define it by yourself according to your splitting demands. In addition, it uses an advanced encryption algorithm to make your data splitting and joining much safer without data missing and quality loss.
  • Mikey keeps track of your login usernames, user ids, passwords, web page logins, email accounts; you name it. Now you only have to remember one password for Mikey to keep your information private. Mikey will secure your information with a single access password and a unique file encryption method. Open up Mikey and you get one click access to enter passwords, activation codes or any other similar data. Easily search, print, or delete entries all from one screen. Easily print individual entries or even export the entire database in two popular formats. Mikey has a unique approach to auto fill forms. You control the information that Mikey gives out. When you need a username or password simply search for the item then click on the clipboard icon to transfer that information to the clipboard. Then you can paste it right to the place where you need it. This unique feature makes Mikey perfect for use on computers with more than one person. Since Mikey is password protected you no longer have to worry abo ...
  • OSToto Hotspot is a piece of totally free WiFi hotspot creator software. It's a super easy utility to turn your laptop, notebook or desktop PC into a portable WiFi hotspot, which allows you to easily share your internet connection (like WiFi, LAN, DSL, Cable, Bluetooth, Mobile Broadband Card, Dial-Up, etc.) with any portable devices, such as a computer, an iPhone, an iPad, an Android phone, etc. It's well compatible with Windows 10, Windows 8.1, Windows 8, Windows 7, Windows XP and Windows Vista. With the stale ability of turning your laptop/notebook, or desktop PC (with a working wireless adapter) into a Wi-Fi router, free OSToto Hotspot saves you a lot of money. It cuts down on the data usage of your mobile to take advantage of free WiFi networks whenever you are. You don't need to pay or worry about the overpaying for data usage. As a WiFi hotspot maker, OSToto Hotspot also allows you to enjoy network with portable devices at anywhere like home, work office, school, bus stops, train st ...
  • Notepad for safe storage of records. Store passwords from websites or notes without worrying about their safety. The program uses the most popular and powerful encryption algorithm AES. Securepad is lightweight and can be run from a flash drive. The program works with text files.
  • Virus Cleaning and PC Protection Clean-up remote PCs from malware can be performed in the automatic mode and is invisible for remote user and doesn't require interruption of his work. PC protection engine shows notification in case of disabled virus protection. File system and registry clean-up from detected malware Put malware to quarantine before removing it Restoring data from quarantine by request Weak shields detection Get notification about remote PCs where antivirus protection is disabled or virus databases are out-of-date.
  • PDF encryption software protect your PDF document from harmful user those defect your valuable document. PDF file encrypted application support most of all required option those able to protect your PDF document. Tool permitted you to set password on PDF file, use PDF encryption technique like 128 bit and 40 bits. You can restrict PDF page by locking PDF printing, content copying, content editing, form-filling, annotation, page extraction and document assembling etc. program authorize you to select page resolution values like high resolution and low resolution. Features: * Software Protect your PDF document from illegal user. * Set password on PDF file. * User encryption technique like 128 bit and 40 bit. * Restrict page permissions values like print, copy, edit, extract, annotation etc. * Choose page resolution setting like low and high. * Create efficient resultant file name. * Perform operation into batch style. * Work with 32 and 64 bit operating system. * Work with all Window oper ...
  • Pdf encryption software password secures and encrypts batch pdf files with option to lock each pdf using unique password. Configure it to load different password for each individual pdf. It supports RC4 and AES 128/256 bit long encryption key. Axommsoft pdf encryption software is easy to use and advanced desktop utility support encryption of large size pdf documents as well. Its advanced setting allows users to implement different user and owner passwords. Users are provided with option to specify the password pattern like alphabetic, numeric, special characters and lower/upper case string. An evaluation version download is available for free to test the program.
  • Folder Protect is a new concept in Data Security. It lets you password protect and set different access rights to your files, folders, drives, installed programs and popular extensions. Folder Protect goes beyond normal file locking and encryption by letting you decide whether to make files inaccessible, hidden, delete proof or write proof. Folder Protect is Windows 7 / Vista / 2003 / XP compatible.
  • Capture images from all the TWAIN compliant scanner and webcam devices and save to BMP, GIF, JPEG, JPEG 2000, PCX, PNG, TIF, TGA, PGX, RAS, PNM files. added support convert scanned pages to single or multi-page Microsoft Word (.docx) Support JPEG compression with TIFF file. Support securing a PDF document using 40 bit, 128 bit RC4 encryption and owner, user password. Support adjust standard PDF permissions: Printing, High Quality Printing, Changing the document, Content copying or extraction, Filling of form fields, Content extraction for accessibility, Document assembly. Has ability to adjust the scanner image resolution (DPI). Has ability to adjust the scanner pixel type, True color, B/W Color, Gray color. Has ability to enable/disable ADF feeder. Has ability to enable/disable duplex scanning. Perform Barcode Recognition processes an entire page or only specific areas in a page and Automatic barcode type detection, Read multiple barcodes at any orientation. Perform OCR processes an entire p ...
  • Support read Kodak / Wang Annotation tag within a TIFF file and display it. convert PDF, TIF to single or multi-page Microsoft Word (.docx) File without installed Microsoft Word. need add-ons Advanced PDF Viewer and PDF Edit Module support displaying PDF file faster, displaying better quality and support more PDF files. Supported Merge PDF files, Split a multi-page PDF File, Add the PDF File to specific position of existing PDF File, Delete Page of PDF file and Crop specific part of PDF file. Support create Microsoft Word (.docx) File and add images and texts to specific page. Perform Barcode Recognition processes an entire page or only specific areas in a page and Supported Codabar, Code 11 Code 3 of 9, Industrial 2 from 5, Interleave 2 from 5, Matrix 2 from 5, Code 128, EAN 8, EAN 13, UPC-A, UPC-E Barcode Type. Rotate mulitpage TIFF PDF. OCR to searchable pdf. Convert PDF to text. Render password protected PDF document. securing a PDF document using 40 bit, 128 bit RC4 encryption and owner, use ...
  • Support read Kodak / Wang Annotation tag within a TIFF file and display it. convert PDF, TIF to single or multi-page Microsoft Word (.docx) File without installed Microsoft Word. Support create Microsoft Word (.docx) File and add images and texts to specific page. need add-ons Advanced PDF Viewer and PDF Edit Module support displaying PDF file faster, displaying better quality and support more PDF files. Supported Merge PDF files, Split a multi-page PDF File, Add the PDF File to specific position of existing PDF File, Delete Page of PDF file and Crop specific part of PDF file. Perform Barcode Recognition processes an entire page or only specific areas in a page and Supported Codabar, Code 11 Code 3 of 9, Industrial 2 from 5, Interleave 2 from 5, Matrix 2 from 5, Code 128, EAN 8, EAN 13, UPC-A, UPC-E Barcode Type. Rotate mulitpage TIFF PDF. OCR to searchable pdf. Convert PDF to text. Render password protected PDF document. securing a PDF document using 40 bit, 128 bit RC4 encryption and owner, use ...
  • Need to protect your important and valuable pdf data with password in non-editable mode? Try pdf encryption software which uses strong 128 bit protection key to encrypt pdf data. Tool adds pdf user password as well as pdf owner restrictions password. User password stands for pdf open restriction and prompts to type when an unauthorized user tries to open it. Only valid and authenticated person who know the password can open and view pdf. Owner password stands for pdf permission password which restricts user to edit document, blocks all types of modification like pdf page split merge extract etc, disable pdf printing and content copying, deny form filling, signing and commenting etc. Software uses 128 bit, 256 bit strong security key and supports both RC4 and AES encryption level protection. Batch pdf security software is very easy to use even by novice user. Download free evaluation copy to lock pdf document with hard security settings. Trial shows watermark on output documents however registered copy works w ...
  • SkyCrypt is a FIPS 140-2 validated Cloud Encryption Gateway. It allows users to add 256 bit AES encryption to local drives, Google Drive, Dropbox, Bitcasa, SkyDrive or most any other cloud storage service. SkyCrypt features include : NIST FIPS 140-2 validation, AES 256 bit encryption, optional 2 factor authentication via Google Authenticator for IOS or Android, and encrypted file names
  • Virus Cleaning and PC Protection Clean-up remote PCs from malware can be performed in the automatic mode and is invisible for remote user and doesn't require interruption of his work. PC protection engine shows notification in case of disabled virus protection. File system and registry clean-up from detected malware Put malware to quarantine before removing it Restoring data from quarantine by request Weak shields detection Get notification about remote PCs where antivirus protection is disabled or virus databases are out-of-date.
  • Save a lot of money by shrinking down your data usage. You can save up to 4 times of the data you use, and in effect stretching your budget much further. Connect to the Internet through a secure VPN connection with military-grade encryption and validates every connection you connect to make sure it is safe and secure. Compresita can fully integrate with iOS and Android systems. It supports all the modern desktops and mobile platforms.
  • PTP (Person To Person) now lets you email uncrackable files in AutoCrypt(TM) mode. This means it will self-decrypt at the other end, as if by magic ! The recipient does not need any software or digital certificates to decrypt the file. This feature is unique to PTP and ensures that you can send safe files without worrying about whether the recipient has the right decrypion software to read them. No other system makes email security so easy.
  • SpyShelter Premium is an effective and easy-to-use security application that helps you to protect your system against known and unknown custom compiled malware such as keystroke loggers. SpyShelter constantly monitors all vulnerable areas in your operating system to ensure that your personal data is being protected from information-stealing malware. Now with keystroke encryption!
  • File system monitor filter can monitor the file system activities on the fly. With file system monitor filter you can monitor the file activities on file system level.File system control filter can control the file activities, which you can intercept the file system call, modify its content before or after the request goes down to the file system, allow/deny/cancel its execution based on the filter rule.

Page 3 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware