Code Virtualizer is a
Quickbooks Corrupt or Damaged
SSH Tunnel Client allows to
A steganography program which
powerful code-obfuscation
File Repair or Recovery
connect to different
allows you to encrypt and
system that helps developers
SSH-Servers. With the SSH
hide a file of any size in
protect their sensitive code
Tunnel Client it is possible
BMP image files, with or
areas against Reverse
to connect each TCP/IP
without the use of a stego
Engineering while requiring
Service over a secure
key, so that the presence of
minimum system resources.
SSH-Tunnel. Supports local
the hidden file is
and remote forwarding with
undetectable, even by
SSH1 and SSH2.
software using statistical
methods.
Date: Sep, 19 2006 Date: Jan, 01 2006 Date: Jun, 29 2004 Date: Dec, 20 2006 |
Secura Archiver is
Encrypts a given file using a
Cryptic Disk 2.4 provides a
Max File Encryption is a
professional archiving
password or a file used as a
simple and affordable way to
powerful yet easy-to-use
software for use in personal
password. A hash is
protect disks and disk
encryption/steganography
or commercial environments
generated from the file or
partitions by encrypting
software. With Max File
that demand 128 bit data
the password and then the
them. The encrypted data
Encryption, you can encrypt
encryption to meet and
file is encrypted with the
cannot be accessed without
files, hide files and create
exceed today's security
generated hash.
entering the password, even
self-decrypting packages.
standards.
if a hacker gets access to a
The program uses the strong
PC or the hard drive is
Blowfish algorithm, ensuring
stolen.
data safety
Date: Apr, 04 2006 Date: Mar, 05 2007 Date: Feb, 05 2007 Date: Aug, 10 2006 |