SuggestSoft.com

Encrypted

DiskEncryptor 1.3

No Image A transparent(on-the-fly) disk/cd encryption system, which combin with AES 256-bit encryption. DiskEncryptor can make a disk partition encrypted on the windows system. After encypted, all the operation for this encrypted disk is the same as a normal disk, when read and write, the decryption and encryption is running at background and transparently. ...






Armacrypt Secure Webmail 1.2.0: Encrypt, secure and protect your Email when you use any Webmail service.
Armacrypt Secure Webmail 1.2.0

Send and receive encrypted email using any Webmail service including Gmail, Hotmail, Yahoo Mail and AOL. Armacrypt can protect your email privacy using any Webmail service with seamless integration in Firefox and Internet Explorer. Your secure email, including attachments, stays encrypted on the Webmail server at all times and only the authorized user can decrypt the message at the click of a button on the Armacrypt toolbar.

hipaa, secure email, pipeda, email program, email client, secure document delivery, e mail security, email, data protection act, email software, safemail, secured email, encrypt





No Image
Secure Password Store 0.91

Encrypted database file that is only accessible by a user specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted. - Print out of database. - Export Database to CSV format in encrypted format - Export Database

encrypted, password, secure



Armacrypt Webmail Encryption 1.3.0: Encrypt, secure and protect your Email when you use any Webmail service.
Armacrypt Webmail Encryption 1.3.0

Send and receive encrypted email using any Webmail service including Gmail, Hotmail, Yahoo Mail and AOL. Armacrypt can protect your email privacy using any Webmail service with seamless integration in Firefox and Internet Explorer. Your secure email, including attachments, stays encrypted on the Webmail server at all times and only the authorized user can decrypt the message at the click of a button on the Armacrypt toolbar.

hipaa, secure email, pipeda, webmail encryption, e mail security, email, data protection act, email software, secured email, mirramail, encrypt, encryption software, webmail



No Image
Easy Email Encryption 6.40

encrypted email (optionally with attached files up to 100 KB), and is designed to be easy to use. It works with any email program, including Outlook Express. It uses a symmetric key method, and keys are maintained in an encrypted list of keys for easy access. When a message is encrypted, the key required for decryption is the same as they key that was used for encyption. This means that for the recipient of an encrypted message to be able to decrypt

encrypt, easy email encryption, encryption software, secure, encryption, email, security, encipherment, file encryption



No Image
TurboCrypt 7.1

encrypted. When Locked the `virtual safe` (encrypted partition) is invisible to your computer. Someone will only be able to see that your `virtual safe` is present, that it exists, when you open the TurboCrypt Control Panel. In the TurboCrypt Control Panel you will see your `virtual safe` and all other unencrypted drives on your computer. To unlock the `virtual safe` (encrypted partition) simply click on your `virtual safe` and enter your password

safe, encrypt, encryption software, drive encryption, secure, encryption, protect, hide, security, roellgen, polymorphic, adult



Quick Crypt 1.1: Encrypt your private files with AES 256-bit file encryption
Quick Crypt 1.1

encrypted file to expire after a certain number of days. Once a file is expired, it cannot be decrypted. Another security feature is encrypting files with a unique System ID. Files encrypted with a unique System ID cannot be decrypted on other computers. Other features include: automatically syncing encrypted file to your cloud folders, file verification check to ensure file was not modified after it was encrypted, and a file eraser that allows you

encryption properties, file eraser, file verification, portable, 256 bit aes file encryption


More Results: 1  2  3  4  5  6  

World IT News