Encryption

Last Updated on 1 Aug. 2016, Total: 24 Products

Encryption

  1. Apex PDF Encryption Software

    PDF encryption software protect your PDF document from harmful user those defect your valuable document. PDF file encrypted application support most of all required option those able to protect your PDF document. Tool permitted you to set password on PDF file, use PDF encryption technique like 128 bit and 40 bits. You can restrict PDF page by locking PDF printing,... Read More

  2. Bandwidth Splitter

    Bandwidth Splitter is a program extension for Microsoft ISA Server that supplements it with new features to allow more rational sharing of the existing Internet connection bandwidth and distributing it among all users and servers according to preset rules. Fearures include: traffic shaping, traffic quoting, and detailed real-time monitoring... Read More

  3. BestCrypt

    With BestCrypt you can allocate a portion of free space on your hard drive where you keep all your sensitive data in encrypted form, creating a virtual drive in your system that you work with as you would any other drive. BestCrypt uses strong encryption algorithms, including Blowfish, GOST, and DES. Features include a time-out option, hot keys, a wiping... Read More

  4. CryptoCrat

    CryptoCrat 2004 encrypts multiple files into one single solid encrypted archive using encryption algorithms including AES. It transforms files' data into gabberish undecipherable by others. If the scrambling of the data is done properly, the original file can only be unscrambled and read by someone who knows the secret key i.e. the code used to encrypt the file. Interface like... Read More

  5. Dekart Private Disk

    Powerful, reliable and flexible disk encryption program. Hide your programs and data, and exclusively restrict access to them. Private Disk shields files from viruses and malware even if your antivirus or antispyware program fails to protect the system. Your data are truly portable - you can encrypt your information on USB drives, CDs, DVDs and work with the protected files... Read More

  6. Dekart Private Disk Multifactor

    Dekart Private Disk Multifactor is AES 256-bit disk encryption software. Provides protection of private information without making you think about security. Creates one or more virtual encrypted disks on your hard drive. Supports such portable storage devices like FDD, CD, CD/R, CD/RW, MO, MD, ZIP-disks, flash drives, all types of flash memory cards. Makes your important files invisible and protected... Read More

  7. HOBLink Secure

    HOBLink Secure, the complete, platform-independent package for secure communication and authentication in TCP/IP networks, has been awarded the German IT Security Certificate. After a thorough examination process by an accredited and licensed evaluation facility, the German Federal Office for Information Security has awarded HOBLink Secure this certificate, confirming HOBLink Secure's conformance to the Common Criteria for IT Security Evaluation. Based... Read More

  8. High Power Encryption

    High Power Encryption software protects all proprietary data on PC 100% of the time without users having to think about security. Any user, from individuals to enterprises, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and more with this product... Read More

  9. HsCipherSDK Encryption Library

    HsCipherSDK is an Encryption Library providing an API to a suite of symmetric cryptographic algorithms and digital signing functions. The library includes block and stream cipher modules: AES, 3DES, ARC4, CAST-128, Blowfish,Twofish,MD5,SHA-1,SHA256, Whirlpool. Includes Standard DLL, C Sharp DLL to use from C++,Visual Basic, C Sharp or other languages, code examples, documentation. HsCipherSDK includes full source code in C... Read More

  10. MSCCrypto

    MSCCrypto is an Active Server component. It is a collection of encryption and hashing algorithms: RSA public key algorithm; AES symmetric block algorithm; Blowfish symmetric block algorithm; Cast5 symmetric block algorithm; TripleDES symmetric block algorithm; Twofish symmetric block algorithm; MD5 hash; SHA1 hash; Ripemd hash; 32-bit CRC checksum algorithm; 24-bit CRC checksum algorithm; PGP - compatible module It allows you... Read More