The Gnome Encfs Manager is an easy to use manager and mounter for encfs stashes featuring per-stash configuration, Gnome Keyring support, a tray menu inspired by Cryptkeeper but using the AppIndicator API and lots of unique features.
Crypt will encrypt your files by drag and drop or classic open. Write a 24 characters password and select a filename for export. Your file is now encrypted.Features : - Strong encryption.- Password selector.- 24 characters password request.- Easy to use.......
Cryptext helps you secure your writings and notes easily. Cryptext use AES algorithm to protect the content of your texts.Features :- AES encryption of your texts.- Choice of two AES methods for encryption and decryption.- Passwords are stored securely inside your keychains.- Logs of encryption and decryption.- Export,import,print your secured......
The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool is used all over the world. It supports both contemporary teaching methods at schools and universities as well as awareness training for employees. Numerous......
Securely share text and files which can be removed after a number of views.......
U2F Zero is a USB token that works with any service that supports U2F, like Google services. It works for 2 factor authentication or sometimes even password replacement. No drivers needed. Just plug it in and press a button.......
SecureBlackbox is a library (suite of components and classes) for software developers that allows them to provide secure data transfer and storage, digital signing and verification, encryption and compression (please refer to EldoS website to get the complete list of supported protocols).Users of SecureBlackbox will benefit from secure standard Internet......
dnscrypt-proxy - A tool for securing communications between a client and a DNS resolver......
Computes the MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digest for any number of files while optionally recursively digging through the directory structure. Can also match input files against lists of known hashes in a variety of formats.......
GPG Keychain Access is an open source application for Mac OS X. It allows the user to manage OpenPGP keys, e.g. creating, adjusting and verifying keys and communication with the key servers.......
Outguess-Rebirth is a portable steganography tool for Windows, allows a user to embed hidden data inside a image JPEG. Outguess-Rebirth is 100% free and suitable for highly sensitive data covert transmission.Before hiding data everything is securely encrypted with AES, scrambled, whitened and encoded. Outguess-Rebirth use the Outguess steganography engine, this......
Hash is your free utility to validate the check sum a file (file checksum).With "Hash" you calculate the hash of a file.Hash supports the following algorithms :- Adler32- CRC16- CRC32- DSS1- MD4- MD5- MDC2- RMD160- SHA- SHA1- SHA256Other functionalities :- Drag & Drop mode.- Export results.- Informations about the analyzed......
AreaGuardNeo is file encryption and USB protection tool integrated with Microsoft Active Directory.......
SD4L is a suite of Linux tools and a graphical user interface (GUI) which allow the creation of, and access to ScramDisk encrypted container files. In particular, SD4L provides a Linux driver which enables mounting ScramDisk containers. ScramDisk for Linux also encrypts partitions on a hard disk or storage media......
The Amnesic Incognito Live System (Tails) is a Debian based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with......
The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCIV can compute MD5 or SHA-1 cryptographic hash values. These values can be displayed on the screen or saved in an XML file database for later use and verification.......
About | Terms |
About UsContact Us | TpSort ScorePrivacy PoliceDMCA Policy |
© 2015-2016 www.tpsort.com, Inc