Sponsored Links:

Wireshark

Wireshark 2.6.4 updated

Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries and educational institutions. Wireshark development thrives thanks to the contributions of networking experts across the...

PureVPN

PureVPN 6.2.0 updated

PureVPN, the industry's top VPN service offers state-of-the-art encryption, complete anonymity and dozens of features. PureVPNs VPN client for Mac offers premium encryption to enhance your online privacy and security. Recent changes: -...

FileWard

FileWard 1.6 updated

FileWard is a handy tool designed to bring high strength data encryption to Macintosh users. FileWard uses the cryptography libraries of OpenSSL to make six industrial strength encryption ciphers available in an easy to use drag and drop application....

Sponsored Links:

AutoKrypt

AutoKrypt 11.19 updated

Data encryption software designed for automation. Automatically encrypt or decrypt, files and folders on a schedule. Encryption methods include password based, secret key, public key and private key, OpenPGP password, Open PGP public and private key.What...

GPG Suite

GPG Suite 2018.4.2 updated

GPG Suite is an open source initiative to bring OpenPGP to Apple OS X. The project originated from efforts to revamp GPGMail development in 2010. The personal privacy is one of the most underestimated goods everyone of us has. By encrypting your data...

Concealer

Concealer 1.3.2 updated

Concealer stores information in the form of cards and uses the latest encryption methods (AES-256) to protect information such as credit card numbers, passwords, software license codes, files of any type, and much more. With the Lite version, you...

Sponsored Links:

Tor Browser

Tor Browser 8.0.3 updated

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor...