Any Windows Software - Shareware and Freeware Download Center for Windows

Top Downloads

New Downloads

Recent Searches

Latest Reviews


Secret Files 2 Puritas Cordis

From Title
1.  Hide secret files - Internet/Tools & Utilities
... Hide secret files is a security product based on an unequalled data hiding method. As a result of many years research within our company, this product hides and safely protects from erasure your private information. Would you be happy to find your priceless financial plans, your personal ideas or projects, your private photos or movies fallen in unwanted hands, altered or erased? Hide secret files is the ultimate tool allowing you to have exclusive secured access to sensitive information ...
 




2.  Hide secret files 3 - Security/Encryption Tools
... Hide secret files is a security product based on an unequalled data hiding method. As a result of many years research within our company, this product hides and safely protects from erasure your private information. Would you be happy to find your priceless financial plans, your personal ideas or projects, your private photos or movies fallen in unwanted hands, altered or erased? Hide secret files is the ultimate tool allowing you to have exclusive secured access to sensitive information based ...
 
3.  secret files & Folders Pro - Utilities/Security & Encryption
... GoSecret's award-winning secret files & Folders Pro is an easy and efficient security tool for protecting data from any user that logs on to the computer where this software is installed. ...
 
4.  Keep it (a) secret - Utilities/Security & Encryption
... Keep all your passwords, userid's, codes, etc. safe and secure in just one place. - In todays world there are so many codes, that you have to remembers - now you just have to remember one, and all the other will be revealed. Use "Keep It (a) secret". ...
 
5.  Keep It (a) secret! - Utilities/Security & Encryption
... Keep all your passwords, userid's, codes, etc. safe and secure in just one place. - In todays world there are so many codes, that you have to remembers - now you just have to remember one, and all the other will be revealed. Use "Keep It (a) secret". ...
 




6.  secret - Utilities/Security & Encryption
... secret Server is a secure password management system for information technology teams. This password manager features AES 256 bit encryption, the U.S. government standard encryption algorithm. Users can safely store, view, audit and when necessary, share administrator passwords. secret Server features two powerful add-ons: Active Directory (integration, synchronization) and remote password changing. ...
 
7.  Pod secret - Utilities/Security & Encryption
... Pod secret allows one to store encrypted notes, medical vaccinations, credit cards, bank numbers, traveler's check, serial numbers, passport, driver's licenses, or any other data that you wish on removable media such as an iPod or a thumb drive for convenient portable access. ...
 
8.  secret Messenger - Internet/Tools & Utilities
... secret Messenger is used to hide text message into images. The images with hidden messages can still be viewed with any conventional image viewer software. They look just like normal images, no loss of quality, no observably change on size. Nobody knows there are messages hidden with images. You can securely send the images to anyone over the Internet. The receiver can then use secret Messenger to retrieve the message back from images with password. ...
 
9.  secret Word - Security/Encryption Tools
... secret Word is a professional text encryption tool. You can use the secret Word encrypted mail or chat. Encrypted information without fear of network service providers, enterprise information management or intercepted by hackers. secret Word and can effectively protect your mail and instant messaging security. secret Word encryption creative way through the complex encryption algorithms that can effectively ensure safety. Encrypted text can safely free via the Internet. Through the secret Word, ...
 
10.  The secret of Zankas - Utilities/Other Utilities
... This is a student game made by:Edmund Lewry, Steepana Stevenson, Adebayo Banjo and Nadia Jahan.Check the dev blog for installation instructions. ...
 

Secret Files 2 Puritas Cordis

From Short Description
1.  Top secret Crypto - Utilities/Security & Encryption
... Top secret Crypto Gold includes Top secret Chat and Top secret Journal, with file and e-mail encryption. RSA key sizes 480 to 16,384 bits. Insert 180 smileys in e-mail, journal entries, and chat sessions. Free for personal private use. ...
 
2.  Top secret Crypto Gold - Utilities/Security & Encryption
... Top secret Crypto Gold includes Top secret Chat and Top secret Journal, along with file and e-mail encryption. Includes the Sentry Spell Checking Engine for spell checking of your e-mail, journal, and chat messages. Conduct an encrypted peer-to-peer, computer to computer, secure chat over the Internet. Maintain an encrypted journal, or diary, of you daily thoughts, ideas, notes, etc.Free for personal private use. Commercial use requires an inexpensive license. Five new spell checking ...
 
3.  secret Door To Success - Educational/Education
... What is the secret of your success? People never ask a man who is a failure, What is the secret of your failure? It is quite easy to see and they are not interested. People all want to know how to open the secret door to success. For each man there is success, but it seems to be behind a door or wall.  Discover the secret Door That Leads to Achieving Anything that Your Heart Desires in This Powerful Book  ...
 
4.  The Source - Games/Other Games
... There is a secret in this house, and you want it, you want this secret for you. This is not a game, this is the source, the source of life. Find it, if you survive... ...
 
5.  The Art Of War - Home & Personal/Misc
... Ancient secrets to speedy accomplishment of objectives is explored in great detail in this book.  Read about secret diagrams hidden in the 2,500 year-old classic on competitive success.  The book discusses secret symbols, analogies, and metaphors which are painstakingly explained and interpreted for optimum comprehension. ...
 




6.  Turbo Shredder - Utilities/Mac Utilities
... Do you want to delete some top secret files? DON'T do that by only pressing DELETE, because the data would still be on your drive! Use Turbo Shredder and remove files by securely wiping them out.<br><br>Requires JRE 7 to run properly. <br>Overwrite data up to 100 times.<br>Overwrite file names and directory names.<br>Deletes timestamps of files and directories<br>Overwrite data with zeros, ones or random data.<br>Supports several deletion algorithms. ...
 
7.  Vinasoft secret Folder - Internet
... a security application to protect your most sensitive and secret data files or documents ...
 
8.  AsMask - Security/Encryption Tools
... AsMask can encrypt and hide all format secret files or text messages into an image. Encryption method based on 256-bit encryption algorithm. The solution is reliable and you can set a password to protect the encryption files and text messages. You can view the image hidden files and text messages as same as normal image. Nobody can aware of messages hidden in the image. AsMask can hide files and text messages into any format images. ...
 
9.  Hide Folders 2009 - Security/Access Control
... Hide Folders 2009 effectively protects your data by hiding and locking your secret files. It allows you to set different protection (hide, lock, read-only) for your files and folders and protect them with a password. The program comes with smooth graphical user interface with visual styles support and extremely easy in use. You will get several ways to control the program - using program's control panel, Windows Explorer context menu, hotkey or even program command line parameters.Novice users ...
 
10.  Moo0 FileShredder - Security/Misc
... Moo0 FileShredder lets you easily erase your private / secret files perfectly off your HDD. This kind of software is "must have", since all of your private data is usually recoverable by anybody even after you delete it. This software is made very easy to use, and you just need to drag and drop your private files / folders onto this software. It currently supports 4 levels of erasing methods depending on how important the file deletion is to you. ...
 

Secret Files 2 Puritas Cordis

From Long Description
1.  secret Media - Utilities/Security & Encryption
... secret Media uses a specialized technique of hiding information by embedding messages within other, seemingly harmless media files. It works by embedding invisible bits of data in otherwise normal graphics and audio files (such as JPG, MP3, WMA, GIF, BMP, or WAV). Using this technology, you can hide sensitive or private text messages in virtually any media file.Unlike encryption, embedded secret Media files are virtually undetectable. files created with secret Media look just like a regular ...
 
2.  secret Disk - Security/Encryption Tools
... secret Disk creates invisible password protected invisible disk on your PC to store any private files of yours. It will appear as usual disk on your PC. It will completely disappear within one second when you need top privacy. files stored on this disk will be protected. It is password protected. It will act as usual disk to store your files, pictures, videos. When secret Disk is visible a small icon blinks in the tray. Just click it and secret Disk will disappear within one second and all your ...
 
3.  secret User Pro - Security/Misc
... secret User Pro allows you to easily create hidden Windows user accounts. With secret User Pro, you'll never need to delete internet history, recent file lists or personal files. The files within a secret User Pro account are automatically protected from other users and will not show up in file searches made by other users. secret User Pro accounts are properly hidden. They do not show on the welcome screen or in the "documents and settings" or "users" folders on your hard ...
 
4.  Castle Clock ScreenSaver - Desktop Enhancements/Screen Savers
... Long ago in ancient castle the secret of the philosophers' stone was found. The stone is able to turn inexpensive metals into gold and create an elixir that would make humans younger. Since when many people had tried to disclose the secret with almost no success. Now we know the secret - the time is just a feeling and all we need to be always young and happy is to show real interest in life as it is. ...
 
5.  BDV DataHider - Security/Encryption Tools
... BDV DataHider can create a secret Storage in any file or drive which cannot be detected in usual ways. But you can use it as a folder for storing of some secret files and folders. New unique technology of data hiding common with strongest encryption algorithms makes BDV DataHider best choise for protection of your sensitive infromation. ...
 
6.  ELCryptula ActiveX DLL - Programming/ActiveX Components
... ELCryptula is an ActiveX component that allows to encrypt and decrypt data using the unique strong encryption algorithms. The main feature of ELCryptula that it inserts secret information into a fractal picture. So a cryptogram is not a binary file. It is a picture. Due to a customer can hide message and hide a fact of transfer secret information. It supports traditional secret-key encryption as well as public-key encryption, and can encrypt/decrypt memory buffers, strings or files.ELCryptula is ...
 
7.  DigiMode Ream - Multimedia & Design/Players and Editors
... Just Like DigiMode Ream Sigma has the following operation panels: Audio panel: , for fast search and playback of audio files including ogg and mp3, has quick save and search buttons, and quick album lading, in audio panel the player can load as many as 2000 audio files in few seconds. Video Panel, for finding and playback of video media also has quick save and load feature like audio panel, memorize a point on a movie for quick return to spot, video size presets and full screen controls, in this ...
 
8.  Tychicus - Utilities/Security & Encryption
... Tychicus allows you to hide secret messages inside image files without visibly changing the image. Before the messages are encoded into the image, they are encrypted using the popular xICE encryption algorithm. This method of securing messages avoids the suspicion caused by clearly encrypted email messages full of obscure characters, or long strings of hexadecimal. Instead a picture of the sunset will provide the cover for your secret dialog. ...
 
9.  abylon BASIC - Security/Encryption Tools
... The security of sensitive data is often neglected. But the encryption of diaries, pictures or other secret documents with the AES or Blowfish algorithm is so simply. abylon BASIC is a collection for encryption, signing, compressing, searching, copying or moving of files and folders. For the encryption the software supports the blowfish- and AES encryption algorithm and passwords, smart cards, certificates and USB sticks as secret. ...
 
10.  Rhem 4: The Golden Fragments for Mac OS - Games/Other Games
... Reveals another yet unknown part of the mysterious island of Rhem. The story continues where “Rhem 3: The secret Library” ended, but the game can be played on its own as well.At the start of the game you are given the black crystal, which you discovered in “The secret Library” by Zetais. With this crystal you can unlock the gateway to the unknown part of the island. Once again adventuresomeness, logic, attentivness and the ability to solve enigmas will help the player to slowly but ...
 

Secret Files 2 Puritas Cordis

Related Searches:

a - b - c - d - e - f - g - h - i - j - k - l - m - n - o - p - q - r - s - t - u - v - w - x - y - z - #
© 1997-2012 ShareMe Last Update: Thursday, July 24, 2014 shareme | contact | notice | privacy | bookmark | link to us

Welcome to the ShareMe. Shareme is a dedicated internet portal bringing users the latest shareware & freeware from the world's best Software Authors. Shareme allows Shareware & Freeware Authors to submit their latest wares, so you the user are able to download their latest software updates all the time, after they are released! Always visit Shareme for your software needs.