Crypto

Crypto Flash (build 9695)

CRYPTO! The name says it all! Have you ever wanted to send a secret message to someone but have feared that the message might be read by someone else to whom it wasn't intended to? Or have you ever wanted to keep secret files that you can only read!?...

SWX-Crypt

SWX-Crypt 2.0

With SWX Crypt, it is possible to encrypt a simple way to decode texts and files. It is enough to drag a file to drag 'n drop the icon for the encryption and the file is already encrypted. Backup your emails very easy now. Write your message as...

WISeID

WISeID 1.1

WISeKey's WISeID secures and protects your sensitive personal information. You can store all of your passwords, credit cards, loyalty cards, ID cards, notes, photos, bank accounts, within the secure safe within the WISeID app. The personal data that you...

Kryptelite

Kryptelite 7.5 updated

Encryption is the only way to protect important information, and that is what Kryptelite is for. It is a time-proven solution for data encryption and backup that perfectly fits both corporate and home use. Advanced encryption technology does not make...

SafeMonk

SafeMonk 0.4.3

SafeMonk is a simple tool to encrypt your files before dending them to Dropbox. It creates a folder in your Dropbox, and everything in that folder is encrypted. With SafeMonk for Enterprise you can support Dropbox use in your organization and give your...

GnuPGNotepad is a notepad type interface to the Gnu Privacy Guard (GnuPG) application in order to make it easier for people to leverage PGP to encrypt email and files. It can create encrypted content and paste it into your non-PGP plugin equiped client,...

Gpg4win

Gpg4win 2.2.1

Gpg4win enables users to securely transport emails and files with the help of encryption and digital signatures. Encryption protects the contents against an unwanted party reading it. Digital signatures make sure that it was not modified and comes from a...

Eraser

Eraser 6.2.0.2969 updated

Eraser is an advanced security tool for Windows that allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. The patterns used for overwriting are based on Peter Guttmann's...