Try our new Live Software Search. Just start typing your keywords below and watch the software magically appear!
Verified Security Encryption
Verified Security Encryption: Securely encrypt files, text, and even directories in seconds with three different encryption strengths.
Cryptime is a coding program with Timer-Lock. You can set the password and Timer-Lock and encrypt any files. Plus, you can set decrypting of files from the given computer only and delete the original files irrevocably after encryption
Do you often have a headache when you try to get the decryption MS SQL stored procedure, Trigger, Function, View! with "WITH ENCRYPTION"? Do not worry ! You can try this tool. It is fast and accurate. Now feel the convenience of DecryptSQL!
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes.
Keep your private files safe from prying eyes! Super-strong encryption algorithms ensure your files are encrypted tightly. Easy-to-use encryption/decryption. Send encrypted email with password protection. Multi-user accounts are easily added.
Ap PDF Stamp
PDF Stamp is an advanced product that enables you to stamp content into a PDF document. Besides images, texts and graphics, PDF Stamp is able to add links and notes.support command line.
JvCrypt is a powerful encryption and compression utility that allows you to create encrypted zip files with up to 448-bit encryption using the advanced Blowfish encryption algorithm.
PDF Stamp COM SDK Unlimited License
PDF Stamp is an advanced product that enables you to stamp content into a PDF document. Besides images, texts and graphics, PDF Stamp is able to add links and notes.
PDF Password Recovery COM SDK Unlimited License
The PDF Password Recovery ( password remover )( pdf decrypt ) can be used to decrypt protected Adobe Acrobat PDF files.
EncryptMe is a software product that is used to encrypt any user files (documents, images, etc.) and limit access to your information. The program uses the AES algorithm with the 256-bit key length to encrypt data.