SuggestSoft.com

Aes 256

FoxCrypt File Protection standard 2.0.1

FoxCrypt File Protection standard 2.0.1: Protect your sensitive files from revising or usurping by others. FoxCrypt is a security software product. It uses AES 256 encryption algorithm and RIPEMD 160 hash function to safeguard your private/sensitive files against revising or usurping by others. FoxCrypt also can hide your files and folders to make them completely invisible. FoxCrypt can do the daily business files protection and file backups. Protect your private files and folders from spy eyes.






FoxCrypt File Protection standard 2.0.1: Protect your sensitive files from revising or usurping by others.
FoxCrypt File Protection standard 2.0.1

FoxCrypt is a security software product. It uses AES 256 encryption algorithm and RIPEMD 160 hash function to safeguard your private/sensitive files against revising or usurping by others. FoxCrypt also can hide your files and folders to make them completely invisible. FoxCrypt can do the daily business files protection and file backups. Protect your private files and folders from spy eyes.

encrypt documents, aes 256, file protection, hide folders, hide files, file backup, data safe, file encryption





Utility Phone 1.5: FREE Worldwide secure communications for voice, video, text and file transfer.
Utility Phone 1.5

FREE Worldwide PC-to-PC communications using: voice, video, online/offline text messaging, text chat and file transfer, all secured using AES 256 bit encryption. Other features include activity notifications and privacy mode. For corporate V.O.I.P. peering solutions, UtilityPhone can supply a private contact server so that a corporation can limit communications within their own private group. Subscribers may fix/lock their User I.D..

offline messaging, video, secure, text chat, voip, aes 256 bit, voice, v o i p, communications, messaging, instant messaging, video conferencing, security



Flash Security - LockLizard SWF Flash Protection 1.1.6: Flash security. Secure SWF with DRM protection - copy, print,  expiry controls.
Flash Security - LockLizard SWF Flash Protection 1.1.6

Flash security. Secure SWF files with DRM protection - copy, print, and expiry controls. Control who can view your flash files and how they are used. Stop screen grabbing and sharing, control the number of views. Control when SWF files expire and instantly revoke them. Protect flash and actionscripts without useless obfuscation or passwords. Encrypt SWF files with strong flash encryption (AES 256 bit) and secure flash copy protection.

adobe flash security, encrypt flash, swf encryption, encrypt swf, secure flash, protect swf, flash encryption, swf protection, secure swf, flash drm, flash security, flash protection, swf drm



SecuBox for Smartphone 1.6: Encryption of sensitive data stored on Windows smartphone and its cards.
SecuBox for Smartphone 1.6

SecuBox provides on-the-fly encryption of sensitive data stored on Windows Mobile smartphone and its media cards. Creates an encrypted volume that looks and feels like a smartphone memory card. Data written to this card is transparently encrypted with AES 256-bit algorithm. SecuBox prevents data theft even if the device or SD card is lost or stolen. Desktop support, SMS unmount.

smartphone, encrypt, ewallet, secure, security, encryption, mobile



No Image
DiskEncryptor 1.3

A transparent(on-the-fly) disk/cd encryption system, which combin with AES 256-bit encryption. DiskEncryptor can make a disk partition encrypted on the windows system. After encypted, all the operation for this encrypted disk is the same as a normal disk, when read and write, the decryption and encryption is running at background and transparently. ...

cd protect, cd password, cd encrypt, disk encryption, encryption, disk encrypt



Aloaha PDF Crypter.NET 6.0.16: Strong AES256 Certificate based encryption for your confidential PDFs
Aloaha PDF Crypter.NET 6.0.16

Strong AES 256 Certificate based encryption for your confidential PDFs. Features: portable – only one single EXE, free edition available, AES256 Encryption, 32 and 64 Bit, no Adobe Software required, fully PDF compliant

certifiate, public key, free, aes256, public, encryption, portable


More Results: 1  2  3  4  5  6  

World IT News