Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1643)
- Business (3971)
- Communications (1197)
- Desktop (222)
- Development (607)
- Education (291)
- Games & Entertainment (731)
- Graphic Apps (698)
- Home & Hobby (108)
- Network & Internet (593)
- Security & Privacy (536)
- Servers (69)
- System Utilities (31267)
- Web Development (297)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
Insider 3.02
Security & Privacy :: Encryption Tools
Everybody has a right to privacy. Your confidential information can be saved as a file (photo, document, program, music or video file etc.). You do not want anyone to know your secret and anyone to suspect you have a secret. Insider allows the user to conceal details (of their private life or business) from unauthorized viewers. If the user needs to conceal confidential files, he can use various programs for protection. Meanwhile these programs do not allow use of the concealed data as easily and safely as you can with normally unprotected files. Our program is not available obviously. It is hidden inside another, absolutely inconspicious program (file compression utility). Confidential files are compressed and kept inside containers - usually pictures. These pictures themselves are not distorted. Any program that can be used to view the pictures will show the container's content only. The above mentioned features are very important psychologically. When there is no indication of an encrypted file, encryption program or special encryption tools are not evident, the computer's owner is above of suspicion. As a result nobody will try to reveal their confidential information. Insider creates compressed archives and works with these files while the archives themselves are not evident on the user?s computer. To encrypt a compressed archive before hiding it, the latest strong cryptography methods known are used. The size of a hidden file is not limited. If you know the right password, the hidden archive can be viewed and processed very easily. If this program had deleted the file they could not be restored. Any special software or hardware is powerless to restore them. This program may be used for information exchange via Internet. Hidden archives may be sent via e-mail or published on web sites. You may also send the photos (with hidden files) via mobile operators.The containers may be kept within mobile phones or digital cameras where they will look like usual photos.
Specifications:
Version: 3.02 |
Download
|
Similar Products:
Security & Privacy :: Encryption Tools
The security of sensitive data is often neglected. But the encryption of diaries, pictures or other secret documents is so simply. abylon BASIC is a collection to encrypt, sign, compress, search, copy, mail or move files and folders, full integrated into the context menu of the File Explorer. The encryption use the Blowfish- and/or AES algorithm and supports passwords, smart cards, certificates, CDs or memory sticks as secret.
Windows | Shareware
Read More
Security & Privacy :: Encryption Tools
This tool allow to find the lost password for DBISAM tables (dat-files).
An application don't use any external libraries (no BDE, no ODBC, no ADO etc) and you may run this tool on any computer without any additional setup/install.
The password revelation is very-very fast because no data loaded, no brute force or dictionary iterations.
DBISAM v1.x/2.x/3.x supported.
Windows | Shareware
Read More
MEO FILE ENCRYPTION SOFTWARE PRO 2.18
Security & Privacy :: Encryption Tools
MEO is a powerful data encryption application to encrypt or decrypt files of any type, including Microsoft Word, Excel and PDF documents. MEO allows you to protect your sensitive data against un-authorized viewers by utilizing the latest data encryption technologies. Keep your documents safe and secure with this data encryption software.
Windows | Shareware
Read More
Security & Privacy :: Encryption Tools
Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption of the file. But this method may not work forever. CryptIt is designed to use XOR encryption on keys that are the same size as the file to be encrypted. CryptIt also has a ability to use removable media as a key code book and integrates with the key generator built into our program GigAlarm.
Windows | Shareware
Read More