Try our new Live Software Search. Just start typing your keywords below and watch the software magically appear!
Keep your private files safe from prying eyes! Super-strong encryption algorithms ensure your files are encrypted tightly. Easy-to-use encryption/decryption. Send encrypted email with password protection. Multi-user accounts are easily added.
The powerful professional security product that provides an absolute protection of any digital information on PCs. It allows you to protect the privacy of your sensitive files by encrypting them with the strongest 32767-byte key algorithm Reverseway.
TrustPort Phoenix Rebel Workstation
An advanced, extremely powerful, comprehensive, and feature rich solution consisting of an antivirus program, personal firewall, encryption application, digital signature and on-line encryption tools.
The most powerful tool for absolute protection of any digital information on PCs. CryptDefence uses an entirely new original cryptographic algorithm MCD which allows user to choose an unlimited length of key and multiple repeated encryption.
Do you often have a headache when you try to get the decryption MS SQL stored procedure, Trigger, Function, View! with "WITH ENCRYPTION"? Do not worry ! You can try this tool. It is fast and accurate. Now feel the convenience of DecryptSQL!
PlexCrypt allows set of files or folders to compress and encrypts and decrypts set of files or set of folders using AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Serpent, etc.
I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It proves to be an invaluable tool for image protection against unauthorized use or theft.
PDF Password Recovery COM SDK Unlimited License
The PDF Password Recovery ( password remover )( pdf decrypt ) can be used to decrypt protected Adobe Acrobat PDF files.
EncryptMe is a software product that is used to encrypt any user files (documents, images, etc.) and limit access to your information. The program uses the AES algorithm with the 256-bit key length to encrypt data.
Verified Security Encryption
Verified Security Encryption: Securely encrypt files, text, and even directories in seconds with three different encryption strengths.