SuggestSoft.com

Encrypted

CryptoDisk 1.3

CryptoDisk 1.3: Creates virtual encrypted disk on your system to secure your private files. CryptoDisk is a powerful tool for creating and managing virtual encrypted disks (encrypted volumes). It creates encrypted volume within a file on a hard drive or any external data storage device (flash memory card, USB drive, etc) and then mount it as a real disk. All the data are automatically encrypted using your password right before they are saved to disk or decrypted right before they are loaded, without any user intervention.






TrueCrypt 5.0a: Software system for establishing and maintaining an on-the-fly-encrypted drive
TrueCrypt 5.0a

TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. The entire file system is encrypted (file names, contents of every file).

create encrypted disk, virtual disk, best crypt, disk encryption, truecrypt, create virtual





DRMsoft PPT to EXE Converter 7.0: Encrypt and convert ppt to exe with password protected self-running
DRMsoft PPT to EXE Converter 7.0

encrypted file can only be opened when an Open Password is provided (PC-binding or Non-PC-binding), Only you can create open password for your users. your users can run the encrypted self-running ppt without Microsoft PowerPoint installed. The encrypted file support One Computer One Password license to your users. Key Features : The encrypted files can be used to achieve the following: Multiple encryption modes: Non-PC-Binding, All computer ,One

pps2exe, pps to exe, ppt2exe, ppt to exe, pot2exe, pot to exe



Ace Secret Disk 8.01: Effortlessly create one or more encrypted disks on PC to protect vital data.
Ace Secret Disk 8.01

encrypted, it is fully hidden and can be found only in Ace Secret Disk. Password is a must before each access of this disk. Ace Secret Disk has the excellent performance. The encrypted disk does not take up extra space, and data import and export is as fast as lightning. The use of an encrypted disk is just like a normal one. After use, it will restore to the hidden state. Besides, you are authorized to change the title and password of an encrypted

ace secret disk, create disk, encrypted disk



No Image
BladeBox eXtreme 4.0

encrypted volumes, which are AES-ENCRYPTED files which can be mounted as if they were disk drives (with their own drive letter too). Virtual Encrypted Volumes (VEV) are seen and considered by the operating system as if they were actual volumes (drives), they have a drive letter, a volume name, and you can see them inside your My Computer resources and inside the Windows Explorer. BUT actually they are transparently encrypted files on disk. Every

chiper, cryptography, drive, disk, file, encryption, virtual



Cryptic Disk Ultimate Edition 3.0.29.569: Encryption of physical and virtual disks on HDDs, USB drives, memory cards.
Cryptic Disk Ultimate Edition 3.0.29.569

Encrypted virtual and physical disks are mounted as separate disks attached to a drive letter of your choice, or an ordinary folder on NTFS disks. They do not have any special markers which give away that they are, in fact, an encrypted disk. Addition protection can be provided using steganography, by creating hidden encrypted disks inside of other ones. Only Ultimate Edition allows users to increase the encryption key size from 256 to 2944 bits

cryptic disk, exlade, disk encryption software



Cryptic Disk 3.1.41.665: Encryption of physical and virtual disks on HDDs, USB drives, memory cards.
Cryptic Disk 3.1.41.665

Encrypted virtual and physical disks are mounted as separate disks attached to a drive letter of your choice, or an ordinary folder on NTFS disks. They do not have any special markers which give away that they are, in fact, an encrypted disk. Addition protection can be provided using steganography, by creating hidden encrypted disks inside of other ones. Only Ultimate Edition allows users to increase the encryption key size from 256 to 2944 bits

cryptic disk, exlade, disk encryption software


More Results: 1  2  3  4  5  6  

World IT News