Support for attachments is included,Īnd there is a secure friends list (stored keys). Public key encryption (receiver needs decryption software).Įnough to fit on a single floppy. The program offers theĬhoice of self-decrypting messages (receiver only needs the password) or Send secure email messages from anywhere. There's no software to download and you can access Stealth Message from anywhere, You choose the level of security, putting control in your hands. Stealth Message gives you email privacy with self-destruct options through your existing address. : to take advantage of the 1024-bit encryption feature your Mail is a free Web-based E-mail service, that offers 1024-bit technologyĮncryption for your messages and attachments. ushĮncryption for your messages and attachments. Once the passphrase has been entered correctly and the drive is mounted the new virtual drive can then be used as a normal drive, files can be saved and retrieved to the drive and you can even install applications The virtual drive can then only be accessed with the correct This container can then be mounted by the Scramdisk software which creates a new drive letter to represent the drive. Basically, you create a container file on an existing hard drive which is created with a specific password. Scramdisk is a program that allows the creation and use of virtual encrypted drives. Read Me file for a fuller description of KPK's main functions. Hide encrypted files as stand-alone or inside others. Impossible to access without the proper password. Moreover, KPKFile can create a secret folder (named Private Folder) that's Within another, such as a Microsoft Word document or a bitmap image. It also offers the option of burying the encrypted files Is a program that provides security for your sensitive files by encryptingĪnd hiding them. Type of archive to someone, the recipient just needs to install Eas圜rypto toįiles, Eas圜rypto securely and automatically wipes the originals. Or entire folders to an encrypted Eas圜rypto ZIP file. The only thing a recipient needs to extract the encryptedįiles is the correct password. You can build self-extracting encrypted and compressed archives and This software also has a self-decrypting file tool, which can create encryptedįiles, which do not require any decryption software.Įncrypt both standalone files and entire folders. Multiple files in multiple folders by using one of its 3 encryption algorithms. Generates a salt value for each file to ensure that no two files areįile encrypter that is powerful and easy to use. It usesĪ combination of SHA-1 and RC4 to encrypt files using a 160-bit key, and Is a public domain Windows shell extension that performs strong fileĮncryption and runs on Windows 95 or later and NT4 or later. If you change it afterwards, when unencrypted, the originalĬhange or remove characters inside encrypted files. Name is also sensitive you may need to change it manually, either before Its hidden data is unobtainable without the password. Notepad, it appears to contain garbage *. I f an encrypted file is opened in a text editor, such as You do, however, need to create an account and log in.Īpplication with built-in encryption is Power Desk Messages, and there are web-based applications to do this that require no downloads. It is also possible to send encrypted (secure) email Shortcut. Some will hide the files as well as encrypting them. On the RClick Menu of any File or Folder, Drive or It has an option for encrypting whole discs or partitions at a time Private digital keys, and is a very powerful Encodes text, data, or images, yet keeps the material intact, allowing you to decrypt (ie.ĭecode) when you need to access it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |