Encryption Package 2002
Typically you encrypt files because you don't
want others to see them, but sometimes you want
to send someone an encrypted file. Most if not
all encryption programs allow you to do so--they
vary, however, in terms of how difficult the process
is. AEP2001's most noteworthy feature may be its
flexibility: Not only can you encrypt files for
your own protection but you can easily create
"self-decrypting" versions of your files that
others can run without needing AEP2001 or any
other software. The program includes a file shredder
that wipes the contents of your original files.
It also integrates nicely with Windows Explorer,
allowing you to use Explorer's context menus and
avoid having another window clutter your screen.
It also uses military grade encryption for protecting
your private files. Program supports strong encryption
algorithms Blowfish with 448 bit key and DES with
Ths program is used for encrypting files into
single one. Program has ability to compress files
during encrypting. It uses powerful encryption
algorithm Blowfish448it. Ability to make self-extracting
Protect your files from prying eyes with
the most secure encryption technology available
today. Your personal information, financial data
and indeed any file on your computer can be at
risk. Be safe, the encryption used by File Buddy
has no known successful attacks against it - so
you can feel at ease knowing your data is truely
is a powerful tool to protect sensitive
data on personal computers, notebooks, and removable
media. The virtual encrypted disk technology is
extremely effective, and securely protects your
data.Though powerful and effective, this technology
works seamlessly with other applications, and
is almost invisible for the user. You do not have
to change your normal work habits or study cryptology.
A flexible and unobtrusive security application
that makes sure no one can use a given program,
or window, in a wide sense: files, folders, documents...
Capture the title of a window, with a click, and
be assured that it will not be used.
Do you ever wanted to protect your homepage
against copyright validation? With HTML-Encrypter
you can encrypt the source code of your HTML files.
The files look normal in any Bowser but the source
code is not human readable.
a web development tool for protecting
and compressing web sites and web pages. This
software is based on 3 scientific papers we presented
on IT and Computer Science conferences, sponsored
by Microsoft, Dell, Cisco and others. You can
encrypt AND decrypt pages with the whole range
of options, some of them unique. Program can protect
images, lock all the pages to specified domain,
or lock particular page to URL, disable right
mouse clicks, page printing, and text selection,
include password protection, and even compress
page or entire web site. Web PressureŽ compression
algorithm, our product also based on a scientific
paper, when included during the encryption, can
result in up to 4.5 times smaller files!
protects your Web pages from unauthorized
cloning or Internet theft. Protection includes
and graphics. It encrypts your Web pages with
up to six encryption schemes and renders the source
code unreadable, making it impossible for others
to read and steal your work. The appearance of
your pages will be unaffected when viewed with
an encryption and compression program
that allows you to encrypt and decrypt files using
symmetric key and asymmetric key mechanism. It
creates a self-decryption archive which can be
decrypted at the other end without any dependencies.
It incorporates powerful Blowfish algorithm and
certificate ( public key/ private key ) for the
process of encryption and decryption It compresses
and encrypts selected files and produces a self-decryption
archive. The encrypted file can be decrypted simply
by double clicking the archive with the given
password for symmetric key mechanism and no input
is necessary for certificate based encryption
PRO allows you to set protection for your
computer system and data. It guards your system
against data leaks to snoopers and unauthorized
users both on the Internet and on your local area
newtorks. Also, prevents unintentional deletions
and modifications to your protected files caused
by operational mistakes or malicious intent by
unauthorized users. All you need to do is select
the data or programs you want to prevent access
and no one else will be able to view the data
or run the program without your authorization
PC-Locker is a secure tool for Windows
platforms. It can helps you to lock up your computer
when you go away for a while; protected your private
file by encrypt it; secure remove your private
file from disk by overwrite with random bytes.
create password protected HTML pages and
hide the source of your pages. With this software
you can encrypt HTML pages and place them on web
site, local network, intranet, CD, DVD, or hard
drive. The program can password protect HTML and
This program is the best encryption manager!It
encrypts trough DES encryption,what gives good
and stable encryption.
simply a secure, HIPAA compliant alternative
to replacing Windows 95/98/ME workstations with
a more expensive NT product. DSP gives you as
an organization the ability to retain previous,
already working, workstations without the threat
of being unguarded. DSP acts as a desktop lock
for those workstations and only allows validated
users to gain access to patient information.
GridLock is a new security application designed
to simplify, speed up and increase the security
of your Palm device without the need for text
based passwords. It uses a simple 5x5 grid of
squares to represent a unique pattern that is
used instead of a normal text `password`. GridLock
automatically locks the device whenever the machine
is turned off, to unlock it the user taps their
unique pattern onto the grid.
Discguise is a strong (256 bit) file
encryption system for securing data on your PC
or Laptop. Individual or groups of files or folders
can be easily encrypted (protected) and decrypted
(opened) with a user-friendly control panel. These
documents can also be encrypted for email transmission.
DriveCrypt is the most powerful, flexible
and fast cryptographic program available on the
market today, bringing 1344 Bit Military Strength
Encryption to your computer and protecting your
data transparently and in a quick, reliable way.
DRIVECRYPT securely and easily protects all proprietary
data on notebooks and desktop computers 100% of
the time without users having to think about security.
Any organization, from a small company to a large
international firm with thousands of users in
the field, can effectively protect business plans,
client lists, product specifications, confidential
corporate memos, stock information, and much more
with this product.
Vlad's Cryptor is a powerful file encryption
program for Windows. Encrypt files using the most
secure and respected cryptography algorithms.
Vlad's Cryptor is the single-click solution for
data encryption. The program uses the most secure
and respected cryptography algorithms - Blowfish,
Twofish, RC6, Rijndael, Cast-128 , GOST , Mars
, Sapphire II , Diamond II, FROG , SCOP , IDEA
,Des Triple 24byte.
CryptoForm FM is a simple to use security
solution that encrypts data entered through a
web site. Excellent for collecting credit card
details, sensitive information, etc 1. Completely
Secure 2. Simple to use 3. Works on any server.
Cryptoflash is the fastest and strongest
symmetric encryption algorithm available worldwide.
It uses keys up to 1024 bits and is 285% faster
than AES Rinjdael´s method (7 CPU clocks per byte
against 20), provides seamless intelligent file
and folder compression, and optional wiping of
the original files in order not to leave any traces
of them. It holds your password in memory at your
will. Just compress, encrypt and wipe huge folders
with a click at unbelievable speed !
Hide any files and have them automatically encrypted!
MASKER is able to hide your sensitive data in
other files carrier files, which are absolute
discrete and look like regular files without changing
the exterior impression. MASKER loads any file
and encrypts it for protection using the 128 Bit
algorithm. The encrypted files will then be hidden
in the carrierfile.
a Cryptographic Component for Windows environment
which provides Symmetric Algorithms for encryption
/decryption. VisualSoft Crypt includes powerful
Rijndael Algorithm, which is a Federal Information
Processing Standard (FIPS) approved Advanced Encryption
Standard (AES) for symmetric encryption. VisualSoft
Crypt can be used to protect sensitive data in
Government, Financial, Health Care and e-Business
a COM component that enables software developers
to provide advanced cryptographic services in
applications and scripts. The component implements
the Blowfish encryption algorithm. Encryption
services can be accessed through a COM server,
a DCOM server or through a windowed ActiveX control.
Base64 encoding and encryption are fully supported.
Lucigenic Crypt is a small-footprint, self-contained
component that does not require any run-times
for it's operation. The component is thread-safe
and highly scalable. Crypt comes bundled with
extensive sample source code. Lucigenic Crypt
can be used with all scripts and lanuages that
are COM aware.
Store your private files on your computer and
keep them private! Professional tool made easy
to use and affordable! One click encrypt/decrypt.
All file types! .
Password web protection. Rely on the same technologies
used by military and industrial concerns worldwide
to protect your web data. OnlineUplink's ACCESS
DENIED system puts mastery of this formidable
security system in your hands, today.
Encrypt Files & Messages into redundant space
in Windows Bitmap (BMP) image files. Provide extra
security for e-mail attachments with up to 100
user-defined keys. Supports 16-color, 256-color
& 24-bit BMP files, and the user interface supports
drag & drop. Fully compatible with Windows95,
WindowsNT & Windows98.
powerful tool that guarantees an absolute protection
of any digital information on PCs. CryptDefence
data encryption method uses an entirely new original
symmetric cryptographic algorithm MCD. It disproves
the Vernam theory, which states, that absolute
protection of the information is possible only
in case of the length of a key equals the length
of an information.