Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files



Only Freeware

Sponsor:

Browse:

Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

Security & Privacy :: Encryption Tools

VIP FILES PROTECTOR 1.2

Security & Privacy :: Encryption Tools
img VIP Files Protector is mighty encryption and shredding software which can make you absolutely sure that all personal and business information stored in your computer is fully confidential. Shred, hide, encrypt and decrypt files, folders and drives in a click with algorithms used in DOD and CIA. Make your personal information and crucial documents private and secure with VIP Files Protector!
Windows | Shareware
Read More

WINGPG 1.0

Security & Privacy :: Encryption Tools
img Free encryption tool with simple and powerful interface to protect your data. Its an open source software based on GPG public-key cryptography to encrypt/decrypt files and sign/verify digital signatures. WinGPG has a manageable classic Windows interface, clipboard support and WinNT Explorer support via context menus and global shortcuts. Its free to download and easy to use.
Windows | Freeware
Read More

WISE FOLDER HIDER 5.0.6

Security & Privacy :: Encryption Tools
img Wise Folder Hider, a free file locker, provides enhanced data security by encrypting, hiding, and locking your files. It stands as an easy file locker that not only safeguards your computer data but can also secure files in USB drives, delivering an extra layer of protection. This usability coupled with advanced features places it as an exceptional file hider, offering an effective shield for your sensitive data against unauthorized access.
Windows | Freeware
Read More

XORIT 1.9

Security & Privacy :: Encryption Tools
img Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. XorIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted.
Windows | Shareware
Read More

 

Total Titles: 115 Total Pages: 12
First Prev 8 9 10 11 [12]
HOSTED BY N5 Networks