AES Pro 5.5 AES Pro is the suite of encryption tools for personal and IPS Spam Filter 2.0 The progam runs in the background and catches 99% of the EContact PRO 1.1 An ultimate online database system allows you to store and askSam 6.0 Oganize, search, and manage your information with askSam Anti-BO 1.5b Anti-BO is a listening device which sits in your system Cookie Crusher 3.2 Many Web sites place electronic tags -- called cookies HistorySweep 2.30 HistorySweep is a powerful privacy protection tool which NotePro 4.5 If you need to create or edit text files and want something EventMeister 2.3 EventMeister is a powerful solution to centrally monitor SCP 4.0 18.104.22.168 Supply Chain Planning (SCP) provides materials managers and
Description: Tychicus allows you to hide secret messages inside image files without visibly changing the image. Before the messages are encoded into the image, they are encrypted using the popular xICE encryption algorithm. This method of securing messages avoids the suspicion caused by clearly encrypted email messages full of obscure characters, or long text strings of hexadecimal. Instead a picture of the sunset will provide the cover for your secret dialog. The simple drag/drop interface makes the whole process smooth and easy. Forget about complicated encryption programs made for computer gurus; get this equally powerful alternative for the average Joe. Tychicus even checks for key loggers before loading, eliminating a common point of failure for many so-called secure systems.
Invisible Secrets Encryption Software 4.7 Keep those prying eyes out of your communications and prevent unwanted people from reading your private files. Invisible Secrets encrypts and hides data in places where not even
Hermetic Stego 9.49 A steganography program which allows you to encrypt and hide a file of any size in BMP image files, with or without the use of a stego key, so that the presence of the hidden file
PGP Inventor Shows VoIP Encryption Tool Phil Zimmermann, creator of the Pretty Good Privacy email encryption app, demoed a prototype of his Voice over Internet Protocol security program for attendees at the Black Hat security conference in Las Vegas on Thursday.
Microsoft's Yukon Gets Encryption Protection Database administrators running SQL Server can look forward to a bit more free time and less worries about unauthorized access to sensitive data files, thanks to new database features announced by Microsoft Corp. at its TechEd 2004 conference on Tuesday .