USB Secure 2.1.6
USB Secure. Very easy to use, Installs on external drive, Includes a virtual drive for greater protection,. No recovery procedure if you forget...
USB Secure. Very easy to use, Installs on external drive, Includes a virtual drive for greater protection,. No recovery procedure if you forget...
USB Secure helps you password protect USB drives, Thumb drives, Memory cards, External drives and Flash drives. It supports plug and play and runs automatically once a USB drive is plugged in, asking you the password for it. USB Secure is hassle...
USB Suite is a five-pack of useful tools offering security and extended functionality for any USB Flash drive, portable hard drive, iPod or MP3 player. With USB Suite and a USB Flash Drive you can travel even lighter. In essence you can leave your laptop...
USB Vault is an encryption utility that provides AES-128 bit encryption for your files, wherever they may go. The software loads on a USB drive (flash drive, hard drive, or iPod) and stays with the USB drive. It does not require the install or uninstall...
Usb Voyager has been specially designed to create encrypted USB Flash Drives. It creates secure zones on flash drives and it is needed to enter password to work with protected folders. Strong AES256 bit encryption is used for encryption. No need to have...
Turns any USB Flash Drive into a key that prevents unauthorized people from using your computer. Once the software is installed & run, only users in possession of this key can access the computer. If more than one key is needed, additional keys can be...
USBSoftProtect can provide solid security for your files. This software allows you to easily transfer the created .exe with encrypted data via any USB memory device from one PC to another. USBSoftProtect is compatible with any USB flash drive (even USB...
The User Monitor is a program that performs hidden monitoring of a user's actions. The User Monitor controls all of the user's actions that were performed on the computer, it also provides information about the time spent on the computer, about the...
uSteg will hide messages and files in an image in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The advantage of uSteg, over cryptography alone, is...
Don't spend over $100 on an encryption utility. Use this COM-accessible full-featured encryption library from: ASP, VB 6, VC++, Visual FoxPro, C#, VB.NET, and any other language that supports COM or .NET. Supported encryption types include: DES, 3DES,...