|
|||
Add encryption to USB Flash Drive on the market.'USB Flash Security' is security software that protects data in a USB Flash Drive by a password. It locks by the password by only removing!Data in a USB Flash Drive is protected by a password.Useful Security Tool.There are four editions in 'USB Flash Security g(group) Edition' for group user.+g:Up to 4GB,++g:Up to 8GB,#g:Up to 16GB,##g:Up to 2000GB.The number of USB drive is order quantity. |
|
|||
Ace Secret Disk is a safe, simple and stable disk encryption utility, allowing you to create virtual disks on PC where you can put your important data in. The virtual disk is invisible, which is more secure for your data. The software features high safety thanks to the new encryption method, and the secret disk doesn't take up extra space. Data import and export is fast as lightning. Besides, the use of the secret disk is just like a normal one. |
|
|||
Easy Folder Guard is a powerful application aiming to settle the problem of folder encryption and protection. It can quickly, simply and securely protect folders with various methods - password protect a folder, hide a folder and disguise a folder. In addition, it also provides some enhanced features to comprehensively protect the data on your computer, such as disk protection, unable use of USB devices and read-only use of USB devices and more. |
|
|||
Ace Secret Folder mysteriously encrypts folders to enhance the important data and privacy confidentiality. It will become unseen without any trace after installation, and no one can perceive its existence. The user-friendly design makes it simple to display this software again by using shortcut hotkey. Moreover, folder encryption and decryption can be done in just seconds. After a folder is encrypted, it will completely disappear from computer. |
|
|||
Best Encryption Expert quickly and safely encrypts files and folders with various methods - Full (all files in a folder separately), Diamond (strong) and Portable (mobile). It has a friendly central management window and also supports direct use in Windows Explorer. It also protects data with enhanced features like folder protection (folder password protection, folder disguise and folder hiding), disk protection, data shredding and more. |
|
|||
Cryptic Disk creates virtual encrypted disks and also encrypts hard disks, USB drives and memory cards. This allows you to maintain secrets both on a home computer and on a workstation. Data encryption makes use of the best algorithms (any of the following modern cryptographic algorithms can be used: AES/Rijndael, Serpent, Twofish, Blowfish, CAST6), and takes place in real time without affecting computer performance. Cryptic Disk provides its use |
|
|||
Encrypt and decrypt whole files or their parts using AES, Triple-DES (3DES), RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic keys (vectors) instead. You can change key bit length for better protection. You can select specifically which bytes in a file should be encrypted/decrypted, though by default the whole file is processed. |
|
|||
PDF secure Mac OSX reader software with DRM copy protection. View PDC documents protected with Safeguard PDF Security. Secure PDF files can be viewed without entering passwords. Safeguard Secure PDF Mac Viewer is free and provides complete PDF Control. Secure PDF documents may have PDF controls to stop copying, stop modifying, stop sharing, and prevent printing. Protected PDF documents may expire or be revoked by the document owner. |
|
|||
Encryption software designed for automation. Automatically encrypt and decrypt files and folders. Encryption methods include password based, secret key, OpenPGP password, OpenPGP public and private key, Email notification of task status. Includes private,public and OpenPGP key generator and a Key Store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, synchronize and file monitors. Run 1000+ tasks/day. |
|
|||
Encryption software designed for automation. Automatically encrypt and decrypt files and folders. Encryption methods include password based, secret key, public and private key, OpenPGP password, OpenPG, Email notification of task status. Includes private,public and OpenPGP key generator and a Key Store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, synchronize and file monitors. Includes scheduler to run tasks. |