Want to save a copy of your personal file on a usb pendrive but you are worried that, in case of theft, someone will be able to access your data?
With Free File Camouflage you can hide and protect your files inside a jpeg image!
The software can be used with the main interface or via the explorer "send to" context menu (the first time you only need to select a directory with some images).
All the files are encrypted using AES and hidden inside an image.
Crypto Obfuscator For .Net provides advanced code protection, obfuscation and optimization for your .Net assemblies with its powerful techniques such as symbol renaming, method overload renaming, method call hiding, control flow obfuscation, resource and assembly encryption, decompiler & disassembler protection and anti-debug and anti-tamper protections.......
This protect .net assemblies from reverse engineering. It provides an extra layer of protection.......
Hyper Crypt is a multi-purpose cryptographic tool:* file-encryption: AES-256* text-encryption: AES-256, RSA and One-Time Pad* file- and text-hashing: SHA-1, SHA-256, SHA-384, SHA-512, HMAC-SHA-256, HMAC-SHA-384 and HMAC-SHA-512* password/key-generation: symmetric and (RSA 2048 - 8192) asymmetric.......
Password and bookmark management software which encrypts using 448-bit blowfish algorithm. It enabled you to fill out usernames, passwords and other entry fields by use of an easy adjustable script. It can be installed on external storage devices such as USB flash drives. The enterprise edition will synchronise a central......
Its a software to encrypt and protect data with a password on your removable pen drives using the AES 256 bits encryption.Runs with any usb pen drive No installation required Easy drag & drop file adding Built in file shredder Secure your data if drive is lost......
SafeNotes is easy-to-use, powerful, multipurpose encryption application. Can securely store your private notes, passwords, card pins and other private data and photos with with strongest crypto-algorithms. Use best six ciphers in cascade: Blowfish-AES-Twofish-Serpent-CAST6-IDEA with maximum security for your privacy (encryption key has 2240-bit). It can be use for secure mailing......
Encrypt and decrypt whole files or their parts using AES, Triple-DES (3DES), RC2, and DES symmetric algorithms.- You can encrypt files with a single password or specify cryptographic keys (vectors) instead.- You can change key bit length for better protection.- You can select specifically which bytes in a file......
Lock and encrypt your photos, movies, files and folders using 256-bit file encryption.The trial version of Kruptos 2 Professional is fully complete with no functional limitations for 30 uses. After the trial period expires you will still be able to use Kruptos 2 fully, the only limitation being the performance......
Confuser is a protector/obfuscator for .NET, providing great security to .NET Applications.......
We provide text and html and randomization for your daily use......
AdNauseam is a browser extension designed to obfuscate browsing data and protect users from surveillance and tracking by advertising networks.......
ProGuard: java shrinker, optimizer, obfuscator, and preverifier......
Post-build .NET hardening and instrumentation platform for protecting, measuring and managing .NET applications.......
Mask is dedicated to protect your personal privacy in your smart phone by hiding or encrypting applications, pictures, photos and video clips as well as files. Only when you put in the right gesture password, can your encrypted application icons, photos, video clips and files be accessed.Mask is also an......
VeraCrypt is a free disk encryption software brought to you by IDRIX ( http://www.idrix.fr ) and that is based on TrueCrypt .It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks.For example, when the system partition......
About | Terms |
About UsContact Us | TpSort ScorePrivacy PoliceDMCA Policy |
© 2015-2016 www.tpsort.com, Inc