Windows BitLocker & "Bitlocker To Go" Drive Encryption is a data protection feature in Windows Vista Enterprise and Windows Vista Ultimate for client computers and in Windows Server 2008. BitLocker protects against data theft or exposure on computers that are lost or stolen, and offers more secure data deletion when computers are decommissioned.
Bitlocker To Go (BTG) is essentially Bitlocker for external drives. It’s full volume encryption for all your USB drives:
http://blogs.msdn.com/b/rockyh/archive/2009/03/01/bitlocker-to-go.aspx ...
[TrueCrypt is not exactly "Open Source", but the source is available. See the reviews to get......
Zed! protects your personal and sensitive data in encrypted archives on e-mail, on USB sticks and in backups.ENCRYPTIONWith its encryption technology derived from various certified professional solutions, Zed! guarantees optimal levels of data protection and confidentiality for exchange and storage. The data encrypted by Zed! can only be decrypted by......
Safely encrypt sensitive dataOn PCs, in networks and in the CloudConfidential documents, business records and TAN lists all belong in a safe place. Steganos Safe 18 is a digital vault that protects everything you don’t want anyone else to see.The clearly structured new user interface ensures that this highly professional......
Do you have sensitive files you would like to password-protect but don’t know how? With Safeplicity, you can password-protect AND encrypt all your confidential files in just a few clicks, without any IT skills whatsoever. To protect a folder, you simply right-click on it, choose “Protect with Password” and choose......
iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.......
east-tec SafeBit is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, keep them encrypted all the time, but still work with them just like you work with normal files. Data is......
CyberSafe Top Secret is an information security program that uses modern encryption algorithms (RSA, AES, BlowFish, etc.). The assortment of tools and features provided by CyberSafe Top Secret are valuable in all fields that work with information: protecting confidential information, protecting E-mail correspondence, creating and validating digital signatures.CyberSafe Top Secret......
FileVault is a method of using encryption with volumes on Mac computers. Encryption and decryption are performed on the fly.FileVault 2 uses full disk, XTS-AES 128 encryption to help keep your data secure. Using FileVault 2, you can encrypt the contents of your entire drive.......
A fork of the now-discontinued TrueCrypt . CipherShed is a program that can be used to create encrypted files or encrypt entire drives (including USB flash drives and external HDDs). There’s no complicated commands or knowledge required; a simple wizard guides you step-by-step through every process.After creating an encrypted......
Password protection and strong encryption of the external and internal drives, flash drives, backup drives, etc.......
The realcrypt application in the RPM Fusion repo is an encryption application based on truecrypt, freely available at http://www.truecrypt.org/ . It differs from truecrypt in only the following ways: The name truecrypt is changed to realcrypt throughout the application, as requested by the truecrypt License: All original graphics are......
The enterprise cryptographic filesystem for Linux......
OnionMail is an anonymous and encrypted mail server designed to run on the TOR network without losing the ability to communicate with the Internet. This ensures greater privacy to the users but also protect against eavesdropping of the NSA and others.......
TruPax generates TrueCrypt - compatible container files from arbitrary sets of files and folders. Such files match exactly the size of the contained material and can be mounted by TrueCrypt, but also directly extracted using TruPax itself. Latter also works for containers formatted with FAT32 by TrueCrypt itself,......
Cryptic Disk creates virtual encrypted disks and also encrypts hard disks, USB drives and memory cards. Data encryption makes use of the best algorithms (AES/Rijndael, Serpent, Twofish, Blowfish, CAST6), and takes place in real time without affecting computer performance.......
About | Terms |
About UsContact Us | TpSort ScorePrivacy PoliceDMCA Policy |
© 2015-2016 www.tpsort.com, Inc