Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Data encryption standard in Title/Summary

MarshallSoft Advanced Encryption Standard (AES) Library

MarshallSoft Advanced Encryption Standard (AES) Library

AES Encryption library provides a simple interface to encrypt/decrypt files, strings or data from Visual Foxpro programs using 256-bit AES (Rijndael) encryption keys. Supports CBC and ECB mode, initialization vectors, and buffer padding. Win32/Win64

  • Publisher: MarshallSoft Computing
  • Home page: www.marshallsoft.com
  • Last updated: January 22nd, 2015
Amazing Any Data Encryption

Amazing Any Data Encryption

Amazing Any Data Encryption is designed to password-protect your folders and files from being seen, read or modified by the priers. It provides enhanced security for files and folders on your Windows PC, blocking the unauthorized access of your private files or folders. It is an ideal utility for those who are concerned about the security of their personal data.

  • Publisher: Amazing-Share.com
  • Last updated: May 27th, 2020
iCare Data Recovery Standard

iCare Data Recovery Standard

iCare Data Recovery Standard can be used to restore deleted files. It can also recover files from formatted hard drives, memory cards, mobile phones, USB drives and any other drive that can be read by the computer. The application supports EXFAT, NTFS, and FAT file systems. The Standard version supports volumes of more than 3TB and RAID volumes.

  • Publisher: iCare Recovery
  • Last updated: April 15th, 2014

Data encryption standard in Description

Logon Automator

Logon Automator

Automatically logs on to multiple web sites simultaneously with a click of a button. All you need to remember is the master password to log on to Logon Automator. It will remember all your user names and passwords, and log on for you.

  • Publisher: Ivertech
  • Home page: www.ivertech.com
  • Last updated: December 6th, 2009
DES Simulator

DES Simulator

Simple freeware program to simulate Simplified DES.You can use the program for educational use, personal use, commercial use or whatever you want.DES ( The Data Encryption Standard) is a block cipher that uses shared secret encryption. DES is the archetypal block cipher an algorithm that takes a fixed-length string of plaintext bits.

  • Publisher: Edi Permadi
  • Last updated: November 16th, 2011
R-Crypto

R-Crypto

To protect the data R-Crypto creates encrypted virtual disks (virtual data storage devices). These disks provide real time data encryption and decryption which are fully transparent to the user, it means that the data is being encrypted just before it is being written to the disk and is being decrypted right after it is being read from the disk without the need of user intervention.

  • Publisher: R-tools Technology, Inc.
  • Home page: www.r-tt.com
  • Last updated: July 23rd, 2009
XSign

XSign

XSign is a software components that bring strong security to your data and applications. rnYou can use it to sign, encrypt and decrypt XML documents using X509 certificates in just few lines of code. The result XML documents are portable to any environment that supports XML Encryption and XML Signature.

  • Publisher: Lizard Labs
  • Last updated: October 14th, 2011
Ashampoo Magical Security 2007

Ashampoo Magical Security 2007

How often do you have an uneasy feeling when you leave sensitive files on your computer or send them to your friends by email? You know it's risky. You know anyone could intercept your mail on its way across the Internet. You know the files aren't safe on your computer. But data encryption is complicated so you try to forget about it.

  • Publisher: ashampoo GmbH & Co. KG
  • Last updated: March 2nd, 2008

Additional Data encryption standard selection

Tenorshare Data Recovery Standard

Tenorshare Data Recovery Standard

Tenorshare Data Recovery Standard helps recover lost data regardless of the reason why the data was lost in the first place: accidental deletion, disk formatting, virus infection, hardware malfunctions, etc. It can recover files of any type, may they be documents, music, videos, images or any other kind of file.

  • Publisher: Tenorshare Software
  • Last updated: November 1st, 2013
7-Zip

7-Zip

Based on the LZ77 algorithm, both LZMA and LZMA2 compression techniques provide an excellent data compression ratio. 7-Zip uses these compression methods to create archives in the 7z format protected with AES-256 encryption, though it supports any compression, conversion, and encryption method.

  • Publisher: Igor Pavlov
  • Last updated: December 15th, 2024
SugarSync Manager

SugarSync Manager

Automatically access and share your photos, videos, and files in any folder. Whether it’s to collaborate on team projects, distribute view-only files, or simply post links to documents on the cloud, you have complete control over how you share your files.

Acronis True Image Home

Acronis True Image Home

Acronis True Image is the only personal backup software that actively defends against ransomware. Reliable. Easy. Secure.

  • Publisher: Acronis, LLC
  • Home page: www.acronis.com
  • Last updated: July 17th, 2021
TrueCrypt

TrueCrypt

TrueCrypt is a utility that enables users to encrypt a disk within a file in order to protect the information stored on that specific disk. The encryption process is a virtual one and it does not affect the functionality of the encrypted disk. You can automatically mount and dismount drives.

  • Publisher: TrueCrypt Foundation
  • Last updated: July 6th, 2020
CuteFTP

CuteFTP

CuteFTP helps you automate file transfer and synchronization operations using scripts. You can write scripts to regularly back up or synchronize your sites, and monitor local folders for changes. You can also do file transfers manually by simply dragging and dropping to its interface.

  • Publisher: GlobalSCAPE, Inc.
  • Last updated: August 15th, 2018
Hideman

Hideman

Hideman can help you protect your privacy, save bandwidth and bypass various types of restrictions by connecting through a virtual private network (VPN). The program has an extremely easy-to-use interface, so much so that you can easily start the connection by pushing just a button. It supports connecting from practically all types of programs.

  • Publisher: Hideman Ltd.
  • Last updated: January 16th, 2017
Syncovery

Syncovery

Syncovery allows you to back up and synchronize your data between PCs, servers, and online storage. As a generic synchronizer, you can set up this program to fulfill all kinds of tasks, including one-way and two-way syncs, backup, replication, and updating or downloading web sites.

AES Encryption Module

AES Encryption Module

AES Encryption module is a free distributive package that convers the data encryption functionality for the Kaspersky Endpoint Security 10 product. You can also install the encryption module by using the setup wizard or by starting it from the command line.

  • Publisher: Kaspersky Lab UK Ltd
  • Last updated: September 6th, 2013
Steganos Safe

Steganos Safe

Steganos Safe can be used to protect sensitive data on your PC, network, or in the cloud using 384-bit AES-XEX encryption with AES-NI-Hardware acceleration. It lets you create safe files and store all your files inside them. Each safe can have a maximum of 2TB in size.

  • Publisher: Steganos Software GmbH
  • Last updated: November 18th, 2024