Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files



Only Freeware

Sponsor:

Browse:

Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

Downloading File Encryptor 13.1

Your download will begin in a few seconds. If it does not start you can download directly through one of the mirror sites below.

Download Sites:

Similar Products:

SECURECRT 9.6.1

Network & Internet :: Terminal & Telnet Clients
img SecureCRT combines rock-solid terminal emulation with the strong encryption, broad authentication options, and data integrity of the Secure Shell protocol. SecureCRT offers a tabbed/tiled interface, advanced session management and customization, built-in scripting, X.509 certificate authentication, and extensive emulations including VT100, VT102, VT220, TN3270, ANSI, SCO ANSI, Wyse 50/60, Xterm, and Linux console.
Windows MAC Linux | Shareware
Read More

WODSFTPDLL 3.8.5

Development :: Components & Libraries
img The Secure File Transfer Protocol provides secure file transfer functionality over any reliable data stream, SSH in this case. It is the standard file transfer protocol for use with the SSH2 protocol. wodSFTPdll library implements client side of this protocol which is reliable and easy to use
Windows | Shareware
Read More

WODSSHTUNNEL 1.9.6

Development :: Active X
img wodSSHTunnel component is server-type component that will add secure tunneling capabilities to your application. Based on your rules and definitions it will accept local connections, encrypt it and forward to SSH server (where they will be decrypted and sent to destination host). SSH server is required for this component to work, encryption will take place between local computer (running wodSSHTunnel) and SSH server of your choice
Windows | Shareware
Read More

WODSSHSERVER 2.5.4

Development :: Active X
img SSH Server ActiveX component (but also Telnet Server ActiveX as well) that will give you ability to easily add SSH2 (and SFTP) server capabilities to your application, as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys
Windows | Shareware
Read More

ABYLON CRYPT IN THE BOX 2023.5

Security & Privacy :: Encryption Tools
img The file-safe automatically encrypts all files in the CRYPT-folder without entering the password every time. The the one-time entry of the password is sufficient to access the saved files and unauthorized users can not open this. Changes in the files will be updateded in the encrypted files automatically and the file-based design enables simultaneous access to multiple authorized users.
Windows | Shareware
Read More

WODSSH 3.1.1

Development :: Active X
img Client component that provides support for communication with remote console-type services. Most commonly, it will be used for Telnet based servers (running on UNIX OS), but wodSSH does even more: it allows you to communicate encrypted (and secured, of course) with SSH1 and SSH2 (secure-shell) servers, as well as any other non-encrypted server (such as SMTP or POP3).
Windows | Shareware
Read More

ABYLON WLAN-LIVE-SCANNER 2023.5

Communications :: Dial Up & Connection Tools
img The software abylon WLAN-LIVE-SCANNER use the available Wi-Fi cards and search at regular intervals for wireless networks. In real time the found Wi-Fi networks will be displayed in a clear tree structure. Network name (SSID), connection status, network type, encryption algorithm and signal strength in percent are displayed as additional information. With one click, the connection is establish.
Windows | Shareware
Read More

ABYLON CRYPTDRIVE 23.60.1

Security & Privacy :: Encryption Tools
img Protect your data against illegal access with the abylon CRYPTDRIVE. The encrypted drives can be open with passwords, chip cards, removable media (e.g. memory stick), CD or X.509-certificate. Only with correct authentication the CRYPTDRIVE is displayed in the File Explorer as drive and the access to the encrypted data is possible. If you lose your notebook, the closed drives are invisible and secure like a safe through AES or Blowfish encryption.
Windows | Shareware
Read More

ABYLON SHAREDDRIVE 23.60.1

Security & Privacy :: Encryption Tools
img The encrypted file clipboard abylon SHAREDDRIVE is shown in the File Explorer on the desktop level and protect your secret files. The complete integration into the Explorer environment simplify using of the software. The encryption and decryption with the AES algorithm is done for each file operation automatically in the background. The file-based structure allow the simultaneous access of several users and reduce the backup data transfer volume.
Windows | Shareware
Read More