Download the latest version of software you need for free

Advertising


  • Web
  • Download Free PC Software
  • Showing posts with label Encryption. Show all posts
    Showing posts with label Encryption. Show all posts

    Jetico BestCrypt 8.23.7

    Jetico BestCrypt 8.23.7

     

    Jetico BestCrypt 8.23.7 | 15.8 Mb

    The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.

    The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.

    Once written to a BestCrypt file (container), data is never stored in an ‘open’ condition. Yet BestCrypt’s smooth operation and complete transparency allow any authorized user to get instant access to the data.
    BestCrypt's advanced data encryption and authorization technology provides a new level of security with standard, proven and published cryptographic algorithms, safe password input, and transparent encryption.

    BestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. with any drive letter that is not used by another system device).
    BestCrypt allows encrypting data with many encryption algorithms (AES, Blowfish, Twofish, CAST and others). Every algorithm is implemented with the largest possible key size defined in the algorithm's specification. BestCrypt v.8 can utilize LRW Encryption Mode, which is specially designed for applications working on disk sector level and more secure than other popular modes used earlier (like Cipher Block Chaining (CBC) mode).

    The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt.

    Any free drive letter in the system may be used to mount and to open an encrypted file-container for access. As well, with BestCrypt v.8 you can mount file-container as a subfolder on NTFS disk. When the virtual disk is opened, you can read and write data as if it were a conventional removable disk.

    BoxCryptor v1.2.0.2

    BoxCryptor v1.2.0.2

    BoxCryptor v1.2.0.2 | 3.2 MB


    BoxCryptor encrypts your files using the AES-256 standard. This makes your data secure - no matter which cloud storage provider you use. Access your encrypted files on all devices. We have BoxCryptor for Windows, Android and iOS - and even support Mac OS X and Linux. Encrypt your files the quick and easy way. Each file is encrypted individually in real-time and stored in a folder of your choice, e.g. your Dropbox folder.

    You want to use cloud storage and access your data from everywhere but you do not want to worry about data security or give up comfort? Then BoxCryptor is the perfect software for you. It has never been easier and more user-friendly to encrypt your data without losing the advantages of cloud storage.

    Keep your files always with you

    With BoxCryptor you can easily access your encrypted files – on your computer, smartphone or tablet. Want to add new files to your Dropbox while on the go? With BoxCryptor for iOS and Android you can upload files anytime without having to worry about security.

    Security using highest standards

    You want to store highly sensitive files in the cloud? Your contracts, your bank details or your dissertation? BoxCryptor uses the AES-256 standard to encrypt and protect your files. AES-256 is classified by the U.S. Government to protect “TOP SECRET” information. To add an additional security layer, BoxCryptor also uses filename encryption.

    McAfee Encrypted USB 1.5.1 EPO Extension

    McAfee Encrypted USB 1.5.1 EPO Extension

    McAfee Encrypted USB 1.5.1 EPO Extension | 328 MB


    USB devices are widely used and convenient because of their small size, huge storage capacity, and high portability. However, with convenience comes risk. These devices, along with the confidential data they contain, are easily lost or stolen. To make the data on these devices unreadable by unauthorized parties, McAfee offers Encrypted USB drives to keep mobile data secure with strong encryption and an advanced management platform.

    Automatic encryption X Encrypt data transparently, automatically, and on the fly, with no special training required.

    Industry-leading technology X Protect sensitive information with AES-256 encryption and FIPS-140-2 validation. With hardware-based encryption, encryption keys cant be obtained or copied because they never leave the USB drive.

    Advanced management platform X Extend company security policies and compliance requirements to mobile USB drives in a strategic, comprehensive, and managed way. With the McAfee ePolicy Orchestrator (ePO) platform, companies can centralize deployment, management, policy administration, monitoring, reporting, and auditing.

    Compliance ready X Extensive auditing capabilities and reporting tools allow companies to prove that data on devices were encrypted, even if a device is lost or stolen.

    Kryptel Enterprise Edition 6.1.4

    Kryptel Enterprise Edition 6.1.4




    Kryptel Enterprise Edition 6.1.4 | 13 Mb

    You have sensitive data to protect? There is only one reliable way – encryption, and it is not as hard as you might think. If you are looking for quality encryption software, which you could use without being a crypto expert, then Kryptel is what you need. Kryptel is available in several editions to fit every possible requirement and budget – from free Kryptelite to advanced Enterprise Edition.
    Easy File and Folder Encryption
    Encryption may be a complex thing, but you don’t need to be a rocket scientist to use it. Just right-click a file or a folder and select ‘Encrypt’ – or drag it to the Kryptel desktop icon.

    Kryptel produces not just an “encrypted file”; its files are containers that may contain thousand of files and folders. Sometimes you might want to decrypt a few files only, or just peek inside. Kryptel Browser is an Explorer-like tool, which lets you easily browse or modify a Kryptel container and view the files it contains.
    Failure Resistant

    Nobody encrypts useless data, and Kryptel makes every possible effort to ensure the important user files are safe. Even if the computer crashes in the middle of encryption step, no data will be lost. To make encryption even more reliable, Kryptel performs a verification step after every operation to guarantee that the just created encrypted container can be successfully decrypted.
    And if an encrypted container becomes corrupted due to hardware failure, Kryptel Data Recovery gives you a good chance to get your data back. 

    Jetico BestCrypt 8.23.1


    Jetico BestCrypt 8.23.1



    Jetico BestCrypt 8.23.1 | 15.04 Mb

    The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.

    The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.

    Once written to a BestCrypt file (container), data is never stored in an ‘open’ condition. Yet BestCrypt’s smooth operation and complete transparency allow any authorized user to get instant access to the data.
    BestCrypt's advanced data encryption and authorization technology provides a new level of security with standard, proven and published cryptographic algorithms, safe password input, and transparent encryption.

    BestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. with any drive letter that is not used by another system device).
    BestCrypt allows encrypting data with many encryption algorithms (AES, Blowfish, Twofish, CAST and others). Every algorithm is implemented with the largest possible key size defined in the algorithm's specification. BestCrypt v.8 can utilize LRW Encryption Mode, which is specially designed for applications working on disk sector level and more secure than other popular modes used earlier (like Cipher Block Chaining (CBC) mode).

    The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt.

    WTM Copy Protection 2.51


    WTM Copy Protection 2.51



    WTM Copy Protection 2.51 | 2.11 MB

    With the WTM software, you will find answers to all your problems related to CD copy protection, video CD protection, data CD protection, and music CD protection amongst others, to make your work easy to access and at the same time, well protected against copying and duplication.

    Copy protection is vital for any organization and individual who wants to preserve their investment. In protecting this, USB Flash Drive Copy Protection plays a significant and efficient role. USB Flash Drive Copy Protection includes the ability to copy and crypt all types of data namely pdf, doc, xls, txt, pps, psd, xml, exe, scr and so on, thus giving enhanced and efficient digital rights management for users. This is done using the USB hardware key of USB flash drives. USB Flash Drive Copy Protection is an efficient tool that balances ease of deployment, ease of customer use and adequate security.

    When we say copy protection, we mean that there will be no illegal and fraudulent copying of the data contained in the CD. Although there are copyright laws in existence today, this is a much-needed requirement. CD duplication and piracy is a rampant business and you are well within your rights to ask for video protection, CD copy protection, data protection, copy protection for important and sensitive data. It goes without saying that unauthorized copying can cause untold harm to the business in question or even to your personal information.

    DVD Protection with the File Protection Tool is an easy-to-use tool that applies the concept to the file system of the DVD and thereby hides or embeds a file by encrypting the same. This results in giving an effective and efficient protection to the DVD. This efficient tool helps you keep the privacy of sensitive files by encrypting them using powerful encryption technology. This powerful professional DVD Protection with the File Protection Tool thus gives absolute enhanced protection to any digital information present on your DVDs.

    WHY WTM?
    Why not WTM? WTM CD Protect will give you the required protection against illegal copies. You will have copy protection for you music, videos, and most importantly, for your sensitive and confidential business data. Here you get a protection system that is strong, easy to use and very effective against tampering of any kind.

    Password Vault Manager v0.9.1.0


    Password Vault Manager v0.9.1.0



    Password Vault Manager v0.9.1.0 | 3.49 Mb

    Password Vault Manager is a product used to manage all your passwords and your sensitive information. Keep your credit card numbers, your bank accounts, your serial numbers or your alarm codes in an organized and secured database. Share with your team members only what they need to know and keep your data safe.

    Save your credentials and passwords in a database.
    Share some or all of your sensitive information within your business safely.
    Monitor user activities with the database logs.
    Faster and more secure solution.

    Symantec PGP Command Line 10.2


    Symantec PGP Command Line 10.2



    Symantec PGP Command Line 10.2 | 12.33 Mb

    PGP® Command Line now from Symantec enables organizations to quickly and easily integrate encryption into batch processes, scripts and applications to ensure the security of corporate data at rest or in transit. Whether your challenge is protecting credit card information, financial transactions, payroll, medical records, or other confidential information, PGP Command Line’s scriptable encryption is a key part of an organization’s data protection tool kit.

    Key Features
    - Command line based scriptable encryption which operates on 35 different platforms from laptops to servers to mainframes.
    - Integrates with most existing scripting tools such as Shell Scripts, Perl, and Windows batch files.
    - Over 300 encryption operations available; encrypt, decrypt, wipe, self-decrypting archive creation and more.
    - Can allocate and manage keys as well as interact with keyservers to support uploading and downloading of keys from keyservers plus searching for keys over LDAP.

    Key Benefits
    - Easily add encryption to existing operational scripts and applications such as backup procedures, end-to-end file transfers and lock-box based data access.
    - Automate labor and time intensive encryption activities such as file server encryption and ftp file transfers.
    - Simplify true end-to-end file transfer protection. Easily protect files not only in transit but also at rest on the sending and receiving file servers.

    PGP Desktop And Professional 10.2


    PGP Desktop And Professional 10.2




    PGP Desktop/Professional 10.2 Multilingual (Windows/MacOSX) | 72.6/26.2 MB

    PGP Desktop Professional provides a comprehensive set of encryption applications to protect sensitive data in email, instant messages, and on disk or removable media. This data is at risk of compromise: email and instant messages can be intercepted or misdirected, laptops are easily lost, and PCs are often targets for theft. PGP Desktop Professional secures confidential information wherever it exists, protecting the business and helping meet partner and regulatory mandates for information security and privacy.

    Disk, Volume, & File Protection 
    PGP Desktop Professional includes PGP Whole Disk Encryption to lock down the entire contents of a laptop, desktop, external drive, or USB flash drive, including boot sectors, system, and swap files. Pre-boot authentication is enforced and the always-on encryption is transparent to the user, automatically protecting data. Volume and file encryption provides an added layer of security to protect sensitive data while the system is powered on.

    PGP-Protected Messaging
    PGP Desktop Professional provides email and instant messaging (IM) encryption between AOL Instant Messenger (AIM) users with PGP Desktop to enable confidential communications. Policy-based enforcement simplifies security, providing transparent operation with no additional user requirements.

    Flexible Deployment Options
    PGP Desktop Professional can be rapidly deployed in standalone mode in smaller companies or to critical users within a larger enterprise. As security requirements evolve, organizations can easily migrate existing users to a centralized, managed architecture without changes to user behavior or credentials and add new encryption functionality to existing deployments, as needed.

    Dead Mans Switch 1.0.0


    Dead Mans Switch 1.0.0


    Dead Mans Switch 1.0.0 | 5.2 MB

    Dead Man's Switch (DMS) offers strong protection for your secrets. DMS can be configured to either securely delete or encrypt a nominated folder should an unauthorized person ever access your computer. This allows you to securely protect any file from unauthorized access. If you have a password list, credit card details, confidential correspondence, private photos or videos, a secret diary or any other computer file that you would like to keep private then DMS can protect it. DMS gives you the means to protect your files from prying eyes. Give yourself the peace of mind that comes from knowing that your secrets are truly secure. Get your copy of DMS today!

    Data Guardian 2.0.9


    Data Guardian 2.0.9




    Data Guardian 2.0.9 | Mac Os X | 12.4 MB

    Security and privacy are two of the most important issues in today's world; leaving passwords on sticky notes around your computer simply will not cut it anymore. Data Guardian is a secure database application with up to 448-bits of Blowfish encryption — regardless of how sensitive your data is. Create multiple databases in Data Guardian for a variety of purposes such as an address book, customer database, Christmas shopping list, journal, password manager, or even notepad.
    Easily create collections to store records, and even apply custom color labels and icons! Change the view options for each collection to see the information you want, and add your own custom data fields. Do not be stuck with a program which forces you to input your information into predefined fields. Enter the data you need to, not what you are forced to.
    Aside from Data Guardian's easy to use Keychain integration* to autofill passwords on web sites, it also offers a variety of other tools and features to enhance each record. Dial phone numbers through your modem with a single click, create new e-mail messages, generate secure passwords (based on an algorithm of your choosing), and even synchronize two databases.
    Data Guardian is the ultimate database solution, and not only if security is a priority. Allow it to become your computerized Swiss Army Knife in an age of digital chaos.

    Features
    Create unlimited records, collections, and fields!
    Insert pictures into records
    Dial phone numbers directly from records
    Import virtually any flat-text file and map it to custom fields
    Export your database to a flat-text file for use in other programs
    Synchronize databases
    Automatically login to servers
    Synchronize Data Guardian with Safari's Keychain to aid in auto-fill
    QuickBrowser — access to Data Guardian from within any application
    Up to 448-bit Blowfish encryption
    Record application activity to a log
    Auto-clear clipboard after a specified interval
    Dynamically generate passwords based on a user specified algorithm
    Automatically saves databases
    Can discard changes and quit Data Guardian if left idle for a period of time
    Print a sheets of record information in a variety of formats
    Apply changes to a selection of records at the same time
    Powerful RegEx search function
    Cross platform compatible database format between the Mac and Windows versions
    Auto-quit if idle for a specified time period

    Odin U Disk Encrypt Creator v6.5.5


    Odin U Disk Encrypt Creator v6.5.5



    Odin U Disk Encrypt Creator v6.5.5 | 1.54 MB

    Odin U Disk Encrypt Creator is a very useful U disk/Flash drive encryption tool. Its friendly interface guides you encrypt your U disk/Flash drive/Portable Hard Drive/Mobile Hard Drive easily.Odin U Disk Encrypt Creator encrypt/protect the external drives with the strong password to ensure absolute confidentiality of your data. After you encrypted your u disk/flash drive with Odin U Disk Encryption Creator,No one can open the files and documents located on your USB storage device except you.Spotlight:The drives protected with Odin U disk Encrypt Creator can be used with other Windows computers, without needing to install Odin U Disk Encrypt Creator on the computer.And protect your data even if your computer has been infected by virus.

    Encrypt entire U disk or Portion of flash drive
    let you encrypt the whole U disk or the portion of your U disk. Protect your data with strong encryption passwords.

    Strong Cryptography 
    1344 Bit Military Strength disk encryption using the best and most proven cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des, Triple Des, Misty 1 and Square.

    The drive protected works for other computers without installing the APP 
    Odin U Disk Encryption is the ideal solution to encrypt USB disks and Pen drives without needing to install the software on the computer.

    Easy to Install, Deploy & Use
    U Disk Encrypt Creator software requires minimal administration and user training. Disk encryption is completely transparent, requiring no change in the way users work with the computer..
    Works on any Storage Medium
    works on any kinds of removable medium such as Floppy-, Zip-, Jazz-, Sygate-, CD-Rom, DVD- Drives etc… and manages up to 16 TERABITE of encrypted data or 4 GB .

    GiliSoft Private Disk 2.2


    GiliSoft Private Disk 2.2


    GiliSoft Private Disk 2.2 | 3.67 MB

    GiliSoft Private Disk is a software which will make transparent encryption using virtual hard drives.GiliSoft Private Disk uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. GiliSoft Private Disk mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by kernal driver, encrypted, and written to the volume file.Attempts to read from this volume are also intercepted, and the relevant data is read by kernal driver from the volume file, decrypted, and presented to the application trying to read the data.

    Dismounting the "virtual drive" ensures that data cannot be read from or written to it. All data is stored encrypted within the "container". As far as windows is concerned, there is a 'new' disk that has suddenly appeared.When the program exists or the volume is unmounted, the file system stays encrypted and there is absolutely no way anyone can recover/get the data without the pass phrase.

    Features and Benefits:

    • All data is stored encrypted within the "Private Disk" container.

    • Access to your files on virtual volume on the fly.

    • Mapping any free drive letter like G:, F:, K: for virtual volume.

    • Requires password authentication before the files become accessible.

    • Works with all Windows application - even DOS applications.

    • Really Fast.

    • Looks like normal hard drive.

    • Several volumes may be mounted at the same time.

    • Encrypted volumes can be backed up to tape, CD, etc.

    • No need to encrypt/decrypt files. The encryption is transparent.

    • Support for USB Flash Drives.
    You can make a portable Private Disk on USB drive.

    • The "Private Disk" container can be protected.
    No one can delete the Private Disk without password.

    •System Compatible
    Windows 2000/2003/XP/Vista/Windows 7 (32&64).

    Data Guardian 2.0.7

    Data Guardian 2.0.7


    Data Guardian 2.0.7 | Mac Os X | 12 MB

    Security and privacy are two of the most important issues in today's world; leaving passwords on sticky notes around your computer simply will not cut it anymore. Data Guardian is a secure database application with up to 448-bits of Blowfish encryption — regardless of how sensitive your data is. Create multiple databases in Data Guardian for a variety of purposes such as an address book, customer database, Christmas shopping list, journal, password manager, or even notepad.
    Easily create collections to store records, and even apply custom color labels and icons! Change the view options for each collection to see the information you want, and add your own custom data fields. Do not be stuck with a program which forces you to input your information into predefined fields. Enter the data you need to, not what you are forced to.
    Aside from Data Guardian's easy to use Keychain integration* to autofill passwords on web sites, it also offers a variety of other tools and features to enhance each record. Dial phone numbers through your modem with a single click, create new e-mail messages, generate secure passwords (based on an algorithm of your choosing), and even synchronize two databases.
    Data Guardian is the ultimate database solution, and not only if security is a priority. Allow it to become your computerized Swiss Army Knife in an age of digital chaos.

    KeyPass v4.9.12 Portable

    KeyPass v4.9.12 Portable

    KeyPass v4.9.12 & Portable | 4.95 Mb

    Password manager which stores all your secret information such as passwords, credit card numbers, PIN numbers etc. in a 448-bit blowfish-encrypted database. A single "master password" unlocks the information in the database. Works seamlessly with any application, including web browsers, terminal emulators and corporate services. Can be installed and run off key-chain size USB flash drives so that you can carry your secret information with you wherever you go!

    11/08/2011 v4.9.12:

    dded link to Edit Global Variable dialog in the Edit Field dialog.
    Updated KEYHOOK.DLL to reduce intermittent hangs under certain system configurations.
    Added ability to use Shift-arrow keys to reorder fields and script actions.
    Added option to enable/disable keyboard/mouse during data entry.
    Added option to switch to a specific locale during data entry.

    Odin HDD Encryption 6.5.4

    Odin HDD Encryption 6.5.4

    Odin HDD Encryption 6.5.4 | 1.74 Mb


    Odin HDD Encryption is a powerful Hard Disc Drive Encryption software which can protect,secure,encrypt your hard disc drive,virtual hard disk(VHD),USB flash files,removable drive.It can makes a part or all your hard disc into a secure vault.And it also can creates a virtual encrypted disk within a file and mounts it as a real disk.No one can log into except you have passwords.Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product.Spotlight:very easy to operate,protect your encryption data from virus infection.

    EnCrypt entire Hard Disk, Hard Disc Partition, VHD, USB
    allows both, the encryption of parts or 100% of your HardDisk ,VHD,file volume, as well as the creation of a virtual container file that will store all the encrypted information.And it can also optionally automatically request the users authentication data as soon as the USB device is inserted. When the USB disk is removed from the computer, all the data are automatically inaccessible to unauthorized persons.

    Easy to operate,Protect data from virus infection
    HDD Encryption software requires minimal administration and user training. Disk encryption is completely transparent, requiring no change in the way users work with the computer and it will protect your data even if your computer be infected by virus.

    Maximize Your Security, Minimize Your Risk
    protects your data with very fast and a true "on the fly" disk encryption process. Other products that claim to be "on the fly" decrypt an entire file and load it into memory, creating significant security risks. HDD encrypt software is smarter and more secure because it decrypts only the specific portion of a file that is in use. Unprotected data never resides on a encrypted hard drive.

    Disk Partition and file volume encryption
    allows both, the encryption of an entire Hard Disk partition, as well as the creation of a virtual container file that will store all the encrypted information.

    Lock Folder XP 3.9

    Lock Folder XP 3.9

    Lock Folder XP 3.9 | 3.03 MB


    Lock Folder XP is a new security tool that lets you lock your files, folders, and drives with your personal password. Locking folders, files, and drives also effectively protects you from malicious programs, such as viruses, worms, and trojans. Locking files, folders, and drives is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private, and confidential information. And because locking your files, folders, or drives makes them invisible, they cannot be deleted, damaged, or harmed in any other way. We also advise you to get Lock Folder XP if you have a laptop and travel frequently. After all, if your notebook gets lost or stolen, you do not want strangers to see your financial data, or credit card or Social Security numbers.

    CryptoExpert 8.10

    CryptoExpert 8.10

    CryptoExpert 8.10 | 8.4 MB


    CryptoExpert 8 was especially designed to provide secure data vaults to owners of laptops/desktops and guarantee ultimate data security. Implementing numerous innovations along with fast on-the-fly operation, CryptoExpert provides higher security, better reliability and easier usability than the transparent NTFS encryption system implemented in the Windows built-in Encrypted File System. The secure vaults appear as regular hard disks to all Windows applications and no one can unlock vault without a password.

    ryptoExpert 8 would be helpful in the following situations:

    Secure Data Back up. Unlock vault only when you need to back up sensitive files there and then lock it again. It is easy to backup whole vault, because every secure vault consists of the single encrypted file. Just upload this encrypted vault file to a online storage or backup it to a BluRay disc.

    Use secure vaults to store all your important files: Online bank access certificates, Word, Excel, PowerPoint documents, mail database or even home video or photos. CryptoExpert 8 provides real-time transparent access to files and folders in secure vault. In case of laptop theft, all your data in the vault will remain confidential.

    Rohos Disk Encryption 1.8

    Rohos Disk Encryption 1.8

    Rohos Disk Encryption 1.8 Multilingual | 3.8 MB


    Rohos Disk Encryption creates virtual, encrypted and hidden volumes on your computer. To access this volume you can use password or USB flash drive with a password key. Rohos disk integrates with MS Office and any other application by inserting a disk shortcut into SaveAs/Open File dialogs. Also it has a build-in File-Shredder tool and wonderful UI.

    Here are some key features of "Rohos Disk Encryption":

    Strong & On-the-fly disk encryption:
    · Rohos disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly.

    Have a USB Key for access control:
    · You can use USB flash drive or security tokens like Aladdin eToken to access all of your secured disk automatically without the need to remember and enter password manually.

    Extreme GPU Bruteforcer 1.9

    Extreme GPU Bruteforcer 1.9

    Extreme GPU Bruteforcer 1.9 | 22.3 MB


    Extreme GPU Bruteforcer is a professional solution for the recovery of passwords from hashes using GPU. The software supports hashes of the following types: MySQL, MySQL5, DES(Unix), MD4, MD5, MD5(Unix), MD5(APR), MD5(phpBB3), MD5(Wordpress), LM, NTLM, SHA-1 and many others. On modern graphics cards from NVIDIA that support the CUDA technology, the software demonstrates outstanding operation speed. For example, an average attack speed on NVIDIA GTS250 is 420 million passwords per second for MD5 hashes, 700 million passwords per second for MySQL hashes and 550 million passwords per second for NTLM hashes. The solution implements several unique attacks, including mask and dictionary attacks, which allow recovering even the strongest passwords incredibly fast. Utilizing the power of multiple graphics cards running simultaneously (supports up to 32 GPU), the software allows reaching incredible search speeds of billions of passwords per second!

    The number of salted hashes the software can handle simultaneously: 800; the number of unsalted hashes: unlimited.