Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1593)
- Business (4242)
- Communications (1265)
- Desktop (183)
- Development (600)
- Education (168)
- Games & Entertainment (710)
- Graphic Apps (681)
- Home & Hobby (106)
- Network & Internet (571)
- Security & Privacy (526)
- Servers (65)
- System Utilities (11664)
- Web Development (285)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
Insider 3.02
Security & Privacy :: Encryption Tools
Everybody has a right to privacy. Your confidential information can be saved as a file (photo, document, program, music or video file etc.). You do not want anyone to know your secret and anyone to suspect you have a secret. Insider allows the user to conceal details (of their private life or business) from unauthorized viewers. If the user needs to conceal confidential files, he can use various programs for protection. Meanwhile these programs do not allow use of the concealed data as easily and safely as you can with normally unprotected files. Our program is not available obviously. It is hidden inside another, absolutely inconspicious program (file compression utility). Confidential files are compressed and kept inside containers - usually pictures. These pictures themselves are not distorted. Any program that can be used to view the pictures will show the container's content only. The above mentioned features are very important psychologically. When there is no indication of an encrypted file, encryption program or special encryption tools are not evident, the computer's owner is above of suspicion. As a result nobody will try to reveal their confidential information. Insider creates compressed archives and works with these files while the archives themselves are not evident on the user?s computer. To encrypt a compressed archive before hiding it, the latest strong cryptography methods known are used. The size of a hidden file is not limited. If you know the right password, the hidden archive can be viewed and processed very easily. If this program had deleted the file they could not be restored. Any special software or hardware is powerless to restore them. This program may be used for information exchange via Internet. Hidden archives may be sent via e-mail or published on web sites. You may also send the photos (with hidden files) via mobile operators.The containers may be kept within mobile phones or digital cameras where they will look like usual photos.
Specifications:
Version: 3.02 |
Download
|
Similar Products:
Security & Privacy :: Encryption Tools
PenProtect is the most comprehensive and secure solution to protect the files within your USB Flash Drive, Flash Memory or Pen Drive. Files are encrypted and protected using your Password and a special technique (AES algorithm 256 bit key). PenProtect requires no installation. It is a single file located in the home folder of your Flash Drive. Ability to encrypt or decrypt only required files. No size limit of encrypted files.
Windows | Demo
Read More
Security & Privacy :: Encryption Tools
Free Text Encrypt is a freeware secure text encryption software. It uses the Advanced Encryption Standard (AES) specification to protect your confidential data. The AES encryption algorithm secures the sensitive and unclassified information from illegal access. Free Text Encrypt will encrypt your document and convert into a text form that can be copied and pasted into any text editor, or e-mailed.
Windows | Freeware
Read More
Security & Privacy :: Encryption Tools
Crypt4Free (freeware) is files encryption software with ability to encrypt files and text messages. Support for ZIP files and ability to secure delete sensitive files. Skinnable user friendly interface.The latest version includes "Privacy Master" tool to erase all personal traces on computer.
Windows | Freeware
Read More
ADVANCED ENCRYPTION PACKAGE 2008 PROFESSIONAL 4.8.7
Security & Privacy :: Encryption Tools
AEP2008 PRO most noteworthy feature may be its flexibility and military grade encryption: program includes 17 encryption algorithms (AES, TWOFISH, MARS, etc). 18 secure files erasure algorithms including: U.S. DoD 5200.28, GOST P50739-95 and others. Symmetric and RSA encryption using PKI infrastructure. USB Flash Drives as protected Passwords Storage support. Command Line Support. No special encryption knowledge is required to use this software!
Windows | Shareware
Read More




