|
Encryption Protection (Popularity: )
http://www.encryptionprotection.com
Encryption Protection is advanced software for file, folder, and email encryption. Features include file shredder for complete deletion from PC and special command line controls.
Category:
Computers - Security - Products and Tools - Cryptography
|
|
The Linux Encryption HOWTO Homepage (Popularity: )
http://encryptionhowto.sourceforge.net/
The Linux Encryption-HOWTO seeks to describe all major development activities around Linux that provide encryption features to the kernel.
Category:
Computers - Software - Operating Systems - Linux
|
|
FolderClone Automated Folder Mirroring Software (Popularity: )
http://folderclone.com/
Make an identical copy of a folder tree from one drive to another. It can be used to synchronize files between a desktop computer and a laptop, or replicate data between a workstation and a server.
Category:
Computers - Software - Backup
|
|
Kremlin Encryption Suite (Popularity: )
http://www.kremlinencrypt.com/
Easy to use and secure encryption and file deletion with free evaluation version.
Category:
Computers - Security - Products and Tools - Cryptography
|
|
Recover Deleted Folder (Popularity: )
http://www.recoverdeletedfolder.net
Windows recovery tool is the best available software to recover deleted folder. A folder can be deleted from hard disk due to several reasons like partition deletion, partition formatting, accidental deletion, etc. The deleted folder may contain important ...
Category:
Computers - Software - Disk Management
|
|
Related:
Encryption
- Folder And Sub-folder
- Folder
- Css Encryption
- Dvd Encryption
Cryptico, Rethinking Encryption (Popularity: )
http://www.cryptico.com/
Web site of Danish company that invented a new encryption algorithm based on the principles of mathematical chaos.
Category:
Science - Math - Applications - Communication Theory
|
|
Imecom, Inc. (Popularity: )
http://www.imecominc.com
Your source for file encryption, electronic document management, encryption software, document management solutions, unified messaging, email encryption, secure messaging and secure email
Category:
Computers - Data Communications - Unified Messaging - Fax Server
|
|
ShowSize (Popularity: )
http://www.showsize.com
ShowSize lets you see folder sizes, unused files, and also lets you print folder contents. [Windows 98/Me/2000/XP]
Category:
Computers - Software - Disk Management - Usage Analysis
|
|
DriveCrypt - real time - hard disk encryption (Popularity: )
http://www.securstar.com/
Uses 256 bit encryption. Supports steganography, allowing you to hide entire hard disks into music files.
Category:
Computers - Security - Products and Tools - Cryptography
|
|
EasyByte Cryptocx (Popularity: )
http://www.easybyte.com/
Encryption component that features 128 Bit Blowfish and 64 Bit String Encryption complete with base64 encoding of the output. Full PGP support.
Category:
Computers - Software - Shareware - Windows
|
|
CyProtect Disk Encryption (Popularity: )
http://www.cyprotect.com
Polymorphic on-the-fly harddisk encryption developed by CyProtect AG. Easy to use and 100% secure. It is possible to encrypt your data on external (USB or Firewire) and internal harddisks.
Category:
Computers - Security - Products and Tools - Cryptography
|
|
Folder To Drive (Popularity: )
http://ddgroup.swrus.com
Subst-shell command and Windows GUI interface. Create virtual drive from any folder. Mount virtual drives at Windows startup. Software overview, and download.
Category:
Computers - Software - File Management
|
|
Mizog Software (Popularity: )
http://www.mizog.com/
SnailFile, manage snail mail and receipts, features; encryption, previews, print, fax, mail and search. The Secret Service is encryption software to encode text in any application.
Category:
Computers - Software - Shareware - Mac OS
|
|
Encryption Plus Hard Disk (Popularity: )
http://www.pcguardian.com
Delivers full hard disk encryption: automatic, on-the-fly data protection for your entire hard drive. Easy centralized administration for efficient corporate use.
Category:
Computers - Security - Products and Tools - Cryptography
|
|
Folder Printing From New Delhi (Popularity: )
http://www.bmyprinting.com
An eminent folder printing services provider from New Delhi, provides printing services such as magazine printing, office stationery printing, poster printing, digital flex printing, books printing, pamphlet printing, catalog printing and more.
Category:
Business - Publishing and Printing
|
|
Gifts - Fulcorn (Popularity: )
http://www.fulcorn.com/
We can provide our customers with unique and tailor-made gifts. If you have no ideas about the present, we can also suggest some gift ideas. Besides, we have a safe and reliable payment system, using the international standard SSL encryption technology ...
Category:
Shopping - Antiques and Collectibles
|
|
Thawte EV SSL (Popularity: )
http://www.thesslstore.com/thawte/ssl-webserver-ev.aspx
Thawte's SSL Web Server Certificate with Extended Validation (EV) offers corporations and government entities the highest industry standard for identity authentication as well as 256-, 128-, 56-, or 40-bit encryption. The level of encryption delivered ...
Category:
Computers - Security
|
|
Data Encryption Software (Popularity: )
http://www.newsoftwares.net
NewSoftwares offer data encryption software, data security software, password protection, USB protection, data leak prevention, device blocking, access control and copy protection softwares. Free Downloads available for all products.
Category:
Computers - Software
|
|
Alertsec Inc. (Popularity: )
http://www.alertsec.com/
Alertsec is the frontrunner in offering data security, data encryption software, computer security software, laptop encryption, computer protection and pointsec as a fully managed service.
Category:
Computers - Security
|
|
Duplicate Email Remover (Popularity: )
http://www.duplicateemailremover.net/
Outlook Duplicates Remover is competent email remover software that detects and removes Outlook duplicate email items in just few seconds. It provides efficient way to manage duplicates detected. You can delete the duplicates permanently, mark them as ...
Category:
Computers - Software - Disk Management
|
|