Zero Binary 1.8
Zero Binary protect your privacy and delete files. Create zero binary file for clean hardisk or uflashdisk. Cannot be recoverable, tested winhex, undelete, and restoration.Requirements:Windows...
Zero Binary protect your privacy and delete files. Create zero binary file for clean hardisk or uflashdisk. Cannot be recoverable, tested winhex, undelete, and restoration.Requirements:Windows...
Cryptex gives you laptop and information security by providing you with the ability to work directly out of an encrypted vault. When the vault is unlocked, you can work out of it like any other hard drive on your computer. When the vault is locked, it...
This software is using a really simple but unique, elegant technique to encrypt any kind of file or folder. You can encrypt your files or folders with using any other file as a key. This make the opportunity, that you can separate the key from the...
PDF Password Recovery can be used to decrypt protected Adobe Acrobat PDF files, which have owner password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing...
IDVAS help you secure information exchange, providing inexpensive and useful information protection scheme for small and medium-sized enterprises and individuals. Based on this, users can not only protect sensitive information, but also authorize...
AS-SHA Hash Suite calculates the SHA value of files or text for validation. It supports SHA-1 (160-bit) and SHA-2 (224-bit, 256-bit, 384-bit, 512-bit). The program can integrate with Windows so you can check a file by right-clicking on it and select...
With "eLibrary Creator" you can make any eLibraries without having any special knowledge or skills. Using eLibrary creator you can create e-libraries with your content to distribute or sale withhigh security like RRK and USB Dongle. What is an eLibrary?...
Use Family Key Logger to know what others are doing on your own computer while you're not at home (or at the office). Set options for the program to start in Hidden mode or to hide in the task list, so that it makes itself invisible to anyone. When you...
MD5 Hasher is a very lightweight tool that was created in order to help you check out the checksum for any file. All you have to do is select and load the file and you will immediately see the MD5 hash. With MD5 Hasher application you can also compare...
Cyphertite (32-bit) is your encrypted cloud backup partner, from the individual user to enterprise level companies. It offers 3 types of data plans. A Free Basic account that allows 8 GB of free high security online storage, a Personal account where you...