SuggestSoft.com

Encrypted Files Search

SearchIn 1.0.0.1

SearchIn 1.0.0.1: SearchIn provides to you the opportunity of generate a database for your ... search for your files. At the step of indexing, the directory- and file structure is first beeing completely scanned and saved. Now you can with the function "Index Use" type in a search term and the function will browse and list the whole directory- and file structure of the indexed Partition(s) Is a volume once scanned, you can search for files and folders without inserting it again. Additionally, SearchIn is a Word-Search-Application, with which






ExEncryptIt 3.1: Encrypted encrypts the content of your files. It can be embedded in Explorer and
ExEncryptIt 3.1

Encrypted encrypts the content of your files. It can be embedded in Explorer and give you professional encryption to your files. It support compression of encrypted files which makes the file occupies very small space. It support encrypt file name.

data encrypt, file encode, professional encrypt, file secure software, information encrypt, file protect, file encrypt





No Image
BCArchive 2.02.1

files/folders to an encrypted archive (i.e. single file). You may store all you confidential files in such archive accessing it whenever you need it. All your files are encrypted, i.e. protected from unauthorized access. You may create self-extracted program containing encrypted archive and e-mail it to your friend. He/she will receive this archive and can read your files, either via knowing correct password or via using public/secret key technology

protection, archive, e mail, security, data, encryption, self extract



removableTrezor 1.0.5: removableTrezor creates a protected store for digital data on removable media
removableTrezor 1.0.5

removableTrezor is a Windows-based application, a simplified version of our miniTrezor program. It has to be installed onto a removable media, on which it creates a protected, safe store for your sensitive data: files are encrypted and password protected. It doesn`t use the Windows` registry, so you can use your trezor (your encrypted files) on another computer, as well. The program may be downloaded free of charge, and used free by anyone.

removable, vault, security, encryption, backup



east-tec SafeBit 2.1: Hide your sensitive files and important documents in virtual encrypted drives
east-tec SafeBit 2.1

encrypted disk drives, where you can hide files and folders, keep them encrypted all the time, but still work with them just like you work with normal files. Data is decrypted automatically during the transfer from disk to memory, and re-encrypted when data is written back to disk. This process is transparent to the user. Safes can be created on your local or external hard-disks, on USB sticks or other removable devices, on CD/DVD, and over the network

disk, esafe, file, drive encryption, protect, disk encryption, folder, password, electronic, privacy, rijndael, safebit, safe



SafeBit Disk Encryption 1.8: Hide your sensitive files and important documents in virtual encrypted drives
SafeBit Disk Encryption 1.8

encrypted disk drives, where you can hide files and folders, keep them encrypted all the time, but still work with them just like you work with normal files. Data is decrypted automatically during the transfer from disk to memory, and re-encrypted when data is written back to disk. This process is transparent to the user. Safes can be created on your local or external hard-disks, on USB sticks or other removable devices, on CD/DVD, and over the network

disk, esafe, file, drive encryption, protect, disk encryption, folder, password, electronic, privacy, rijndael, safebit, safe



AF Gold Cryptor 1.1: 'AF Gold Cryptor' is a very quick and easy to use encryption tool.
AF Gold Cryptor 1.1

"AF Gold Cryptor" is a very quick and easy to use encryption tool. Encrypted files can be safely transferred over the Internet via e-mail, or saved on your computer. The encryption method used will result in your files being ultimately impossible to run without first being decrypted. Even if an unauthorized person gets access to your encrypted personal data, he will not be able to read it without the password.

crypt, password, cipher, encryption, sequrity, privacy


More Results: 1  2  3  4  5  6  

World IT News