Whitenoise Computer File Security 5.0 > SCM Preventing Wiki Leaks and creating a secure network requires ONLY three things: 1. Secure network access 2. Secure data transmission 3. Secure data storage. All data is automatically uniquely encrypted.
CommuniCrypt File Encryption Tools 1.01 File encryption/decryption tools with strongest AES(Rijndael) algorithms. Can generate the hash of the source file as password for symmetric encryption.
Encryption strength AES Rijndael: 256 bit / Hash: SHA-256
Flexcrypt 2010 - great flexibility and strong encryption for ultimate comfort and security In the era of nearly permanent broadband connections and global sharing, the problem of online security becomes extremely acute. And since we can’t just pull the plug and go offline, we have to look for alternative methods of ensuring data security and our own privacy. Standard measures of precaution may work for you for a while or to a certain extent, but you will eventually need a more robust and reliable method
NCP Secure Entry Client - connect to your network securely from anywhere in the world VPN allows you to connect to remote networks and systems from any computer or device with access to the Internet. However, each new device, network or operating system may require a slightly different approach to configuring a VPN connection. If you want to be able to reliably connect to a remote computer or your corporate network over VPN, you should definitely try NCP Secure Entry Client! NCP Secure Entry Client