Try our new Live Software Search. Just start typing your keywords below and watch the software magically appear!
With IceLicense it's easy to turn your application in "try-before-you-buy" versions with little effort, offering everything to guarantee a maximum protection.
TrustPort Phoenix Rebel Workstation
An advanced, extremely powerful, comprehensive, and feature rich solution consisting of an antivirus program, personal firewall, encryption application, digital signature and on-line encryption tools.
SecureCode is a new software protection based on the lastest techniques protection to provide a strong security to protect your software against reverse engineering and illegal copying.
This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger program
Provide the user with encryption files. It is an easy way to use file encryption utility, Pretty Windows Explorer-like interface and provides quick encryption or decryption of files from the Windows Explorer's contetext menu.
Cryptgine Archiver creates compressed and encrypted archives that can be securely distributed over the internet. Built with the Cryptgine Application Programming Interface you may use 256 bit AES encryption or use your own by creating a plug-in.
Security and encryption software utility that helps to protect the contents of files and folders on the computer and limit access to your files and folders.
Hide your files easily and discreetly! Data Stash is a clever little steganographic security tool that allows you to hide sensitive data files within other files with password protection. The receptacle file remains FULLY functional!
Elegant, uniquely featured, powerful and secure personal information storage with convenient interface and smooth Internet Explorer integration. Reliable password-based data protection with most powerful AES algorithm. Password generator included.
Keep those prying eyes out of your communications and prevent unwanted people from reading your private files. Invisible Secrets encrypts and hides data in places where not even your wife, boss, or a hacker would look for sensitive information.
More Software: 16
Page / 1 / 2