Id Data Encrypt


Advertisement

Alligator Data Guard

Alligator Data Guard is a tool for protecting your confidential information, using AES algorithm with 256-bit key and Haval 256-bit Hash Message Authentication Code (HMAC) to simultaneously verify the data integrity and the authenticity for better security.

Encrypt Easy

Encrypt Easy, a powerful Windows security application that lets you encrypt files, folders, and entire directory trees, with a single click. After encryption, information may be stored on unsecured drives or emailed over the Internet, and only the person ...





Advertisement

Network Caller ID  v.0.81

Network Caller ID (NCID) is Caller ID (CID) distributed over a network to a variety of devices and computers.
Network Caller ID (NCID) supports messages. Clients can send a one line message to all connected clients.Network Caller ID (NCID) consists ...

1-abc.net Security Box  v.4.00

Six fast modules to improve your data security will guide you step by step on your way to a safer system! Many people nowadays do not really care enough about their data safety. Long before you create any files on your system, there can be the need to ...

CallbackFilter  v.4.1

), alter file data, encrypt files, create virtual files and much more.

CallbackFilter is an SDK (Software Development Kit) which lets your application intercept file operations in Windows operating systems.

Your application is notified ...

VarySafe

VarySafe is a document security program which makes data encapsulated stand alone executable viewer file. This viewer decrypts and view internal encrypted data only in the authenticated computer by using hardware fingerprint identification. It is also ...

Hash Codes  v.1.62.780.7200

Hash Codes is a simple and easy to use application designed to enable users to hash data from keyboard, file or CD/DVD. This tool supports: Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, ...

XLPoints Plus  v.1 3

XLPoints Plus is the easiest way to massively draw points in AutoCAD and generate 3D models using coordinate data in Excel.
Key Features:

- Quickly draw points using coordinate data in Excel.
- Create new drawings or update existing ...

TheLaptopLock  v.0.9.4

If a computer is lost or stolen the hardware can be replaced, but the data is priceless. The LaptopLock allows you to remain in control of your data. Encrypt or delete files if the computer is stolen, display a note message or execute custom instructions.

Hash Codes x64  v.1.62.780.7200

Hash Codes is a simple and easy to use application designed to enable users to hash data from keyboard, file or CD/DVD. This tool supports: Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, ...

ID_Bank  v.1.35.10


ID_Bank includes the following features:
· Store your passwords and ID data in named files, you are not limited to one file that must contain all your data
· Your data is encrypted using the Rijndael 128 bit encryption algorithm.
· Group ...

TGetDiskSerial Component  v.4.0.0

So this component is of great use, for example, you can use this serial number to create an machine id or encrypt number.

Key Features
* Easy to obtain the serial number of hard disk.
* Support reading several physics hard disks.

VaryTable

This program is a handy productivity tool if you need to extract table data from drawings frequently. Because this is a stand alone software, you do not need to pre-install AutoCAD and/or Excel software to run this program.

Keyparc for Mac OS X  v.0.9.3.1

Unlike traditional file protection tools where encryption key is physically stored together with the files protected, loss of Keyparc protected computer or disk means only loss of these physical assets, your confidential data remain private and secure.

Keyparc for Linux  v.0.9.3.1

Unlike traditional file protection tools where encryption key is physically stored together with the files protected, loss of Keyparc protected computer or disk means only loss of these physical assets, your confidential data remain private and secure.

Pages : 1 | 2 >
Newest Reviews