Top 15 Eazy Image Alternative and Similar Softwares | Nov 2024

Eazy Image is an affordable and reliable drive image solution that allows you to create backup images of hard disks or partitions in user-friendly Windows interface with just several clicks.

Use Eazy Image as a backup program for disaster recovery. Restore a previously created disk or partition image file or, if the hard disk is physically damaged, restore the data to a new hard disk.

Use Eazy Image for basic file recovery. If you lose a file, a previously created image can be read to extract the desired file from that image.

1. Redo Backup and Recovery

Redo Backup and Recovery Open-Source drive imaging solution coming as Linux-based Live CD (or USB thumb drive) that allows for backup and recovery of partitions or entire hard-drives and computers (both Linux and Windows). The solution provides a beginner-friendly and easy to use graphical user interface, automatically finds network shares, includes the web browser......

2. Paragon Hard Disk Manager Professional

Paragon Hard Disk Manager Professional Why be satisfied with less? The Hard Disk Manager 15 Professional includes everything you need for cutting-edge data management and opens up professional system administration options which had never before been possible. Tools such as high-performance file exclusion filters for efficient backup and recovery operations, the sophisticated Paragon partitioning engine,......

3. AX64 Time Machine

AX64 Time Machine AX64 Time Machine is a backup and recovery software that enables an easy and fast way to restore your PC to an earlier point of time.Time Machine allows to quickly recover from: disk failures, system crashes, virus infections, unwanted program installations, etc. It securely backs up all your files, and......

4. Offline NT Password & Registry Editor

Offline NT Password & Registry Editor Windows stores its user information, including crypted versions of the passwords, in a file called 'sam', usually found in \windows\system32\config. This file is a part of the registry, in a binary format previously undocumented, and not easily accessible. But thanks to a German(?) named B.D, I've now made a program......

5. AES Metal

AES Metal With its straightforward interface and powerful features, this utility will allow you to fully realise the power of the Advanced Encryption Standard (AES).- For research purposes or specialist applications- Manage your own settings, such as mode of operation, initialization vector and key- Portable, no installation required- Written in x86......

6. FileWall

FileWall FileWall is a encryption software based on transparent encryption (real-time encryption). The most distinctive feature of FileWall is "Realtime encryption". Based on this technology, users can more quickly access and modify encrypted files without decryption, unlike traditional encryption software needed to decrypt the entire file and then encrypt the entire......

7. Avira AntiVir Rescue System

Avira AntiVir Rescue System The Avira AntiVir Rescue System a linux-based application that allows accessing computers that cannot be booted anymore. Thus it is possible to repair a damaged system, to rescue data or to scan the system for virus infections. Just double-click on the rescue system package to burn it to a CD/DVD.......

8. Drag'n'Crypt ULTRA

Drag'n'Crypt ULTRA Drag'n'Crypt ULTRA is a small, coding program assistance whose you confidential data which can be served very simply against the access of unauthorized ones protect can. You draw the file (EN), which can be coded, simply on the program window (the drop zone) and DCU codes the file (EN) with......

9. ProxyCrypt

ProxyCrypt ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive.It works as a "proxy" for the ImDisk Virtual Disk Driver . Features:- Supports AES-256, Serpent and Twofish ciphers.- Mode of operation is XTS.- Passwords are hashed with the scrypt key derivation......

10. Password Safe

Password Safe Password Safe is a password database utility.Password Safe protects passwords with the Twofish encryption algorithm, a fast, free alternative to DES. The programs security has been thoroughly verified by Counterpane Labs under the supervision of Bruce Schneier, author of Applied Cryptography and creator of the Twofish algorithm.See also http://en.wikipedia.org/wiki/Password_Safe......

11. FreeFixer

FreeFixer FreeFixer is a general purpose removal tool which will help you to delete potentially unwanted software, such as adware, spyware, trojans, viruses and worms. FreeFixer works by scanning a large number of locations where unwanted software has a known record of appearing or leaving traces. The scan locations include the......

12. AES Command

AES Command This all in one command line utility will allow you to fully realise the power of the Advanced Encryption Standard (AES).- For research purposes or specialist applications- Portable, no installation required- Written in x86 assembly language, only 28k in size- Advanced Encryption Standard - Rijndael cipher- Galois Counter Mode......

13. Challenger

Challenger Challenger is a software for the encoding of files, folders and drives. For the installation and for the execution simple user rights suffice. Thereby the program is mobil usable on an USB flash drive too. The software is conceived for the local protection of data privacy and for closed communication......

14. Stellar Phoenix Server Password Recovery

Stellar Phoenix Server Password Recovery Stellar Phoenix Server Password Recovery uses ingenious methods to effortlessly reset the password of any Windows Server based system, which is configured to be the domain controller. Resets passwords meeting the norms of Windows server password policy Easy to use interface to facilitate smooth Windows server password recovery Available as......

15. AES Protect

AES Protect With its straightforward interface, this utility employs the security of AES-256 and Galois Counter Mode to encrypt your files.- Suitable for everyday use- Portable, no installation required- Written in x86 assembly language, only 26k in size- Advanced Encryption Standard - Rijndael cipher- Galois Counter Mode encryption and authentication- Passphrase up......