BitStash is a graphical interface which makes it easy to create/remove and lock/unlock encrypted volumes.
It also have functionality for clearing logs to clear your tracks on the computer.
east-tec InvisibleSecrets not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for......
Outguess is an advanced steganography tool. Outguess will hide your file inside the picture of your choice in easy steps :To hide a file within an image :- Select your image (container) and a file to hide (content). - Write a key in the preferences (used to hide data).- Click......
wolfSSL offers an embedded SSL implementation that is portable, progressive, and easy to use with products including the wolfSSL embedded SSL library and the wolfSSL Embedded Web Server.......
This powerful tool suite will allow you to change your System default privacy settings, and allows you to easily and quickly hide your IP via the integrated proxy manager. Privacy Optimizer also includes a free privacy optimized web browser that more readily fulfills the need to be anonymous in both......
Camouflage v1.2.1 - final version. Camouflage allows you to hide files by scrambling them and then attaching them to the file of your choice. This camouflaged file then looks and behaves like a normal file, and can be stored, used or emailed without attracting attention.For example, you could create a......
iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.......
Do you have sensitive files you would like to password-protect but don’t know how? With Safeplicity, you can password-protect AND encrypt all your confidential files in just a few clicks, without any IT skills whatsoever. To protect a folder, you simply right-click on it, choose “Protect with Password” and choose......
Your data. Protected.Hider 2 is the Fort Knox of digital storage. Anything and everything you hide with Hider 2 is tightly locked up and hidden, making it ultra-secure.Everything in its place.Organization is key when it comes to hiding and keeping track of files. Hider 2 helps you sort out your......
FileWall is a encryption software based on transparent encryption (real-time encryption). The most distinctive feature of FileWall is "Realtime encryption". Based on this technology, users can more quickly access and modify encrypted files without decryption, unlike traditional encryption software needed to decrypt the entire file and then encrypt the entire......
Now you can safely sync your confidential files. SecretSync Viivo uses client-side encryption to give you absolute privacy and control over your data. It is a great way to easily share proprietary, sensitive information using online synchronization utilities like Dropbox.Even if you're not synchronizing, you can still use SecretSync Viivo......
Rohos Mini Drive creates hidden and encrypted partition on the USB flash drive memory. You work with the files on the hidden partition without opening a special program. Those who have megabytes of sensitive files on the USB drive and seriously concerned with a data security, cannot imagine their USB......
LUKSUS is a tool that creates an encrypted volume and filesystem on a hardrive or other storage media as well as a filecontainer.It can use the following encryption facilities: LUKS, Truecrypt and GELI.LUKSUS is a wrapper script for cryptsetup/tcplay/geli, shred and mkfs. Instead of having to read up on the......
Challenger is a software for the encoding of files, folders and drives. For the installation and for the execution simple user rights suffice. Thereby the program is mobil usable on an USB flash drive too. The software is conceived for the local protection of data privacy and for closed communication......
LUKS Manager provides on-the-fly encryption (AES by default) to virtual folders on Android devices.These virtual folders can be dynamically mounted, unmounted, created and deleted as needed. Similar to Truecrypt in functionality.Note: Truecrypt and LUKS Manager volumes are not cross-compatible.......
ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive.It works as a "proxy" for the ImDisk Virtual Disk Driver . Features:- Supports AES-256, Serpent and Twofish ciphers.- Mode of operation is XTS.- Passwords are hashed with the scrypt key derivation......
About | Terms |
About UsContact Us | TpSort ScorePrivacy PoliceDMCA Policy |
© 2015-2016 www.tpsort.com, Inc