Encrypt Care 2.4 |
Date Added: June 15, 2019 | Visits: 2.015 |
|
||||||||||||
Encrypt Care is an easy to use, but powerful encryption software which allows user to encrypt or decrypt text and files in batch mode, generate, verify and export ckecksums. Encrypt Care allows you to protect your data using the most powerful encryption algorithms, as well as protect your messages. Flexible options will help you to encrypt and decrypt your data in a matter of seconds. With Encrypt Care you can do a lot of tasks with checksums - generate checksum of any text or file, export checksums to TXT file or copy to clipboard, generate hash for multiple files, verify checksums.
|
License: Freeware | Size: 1.97 MB |
USER REVIEWS
ENCRYPT CARE RELATED
Security Tools
-
EasyHideIP.com Simple Encrypt Decrypt Text 2.0
EasyHideIP.com Simple Encrypt Decrypt Text is a simple text encryption software. Encrypt text, encrypt emails and messages. You can use it to encrypt Text, Email, MSN, YM, ICQ and more.... Encrypt and decrypt rich text messages using cut and... |
||
Security Tools
-
EasyHideIP.com Encrypt Decrypt Text 1.0
Simple Encrypt Decrypt Text - free text encryption software for personal. Encrypt text, encrypt emails and messages. You can use it for encrypt Text, Email, MSN, YM, ICQ and more.... Encrypt and decrypt rich text messages using cut and paste.... |
843 KB | |
Home & Leisure
-
Encrypt Text Tool 2.0
Encrypt and decrypt text, credit card numbers, SSN numbers, bank account numbers, license keys, or other sensitive information. Uses 256-bit AES strong encryption. |
1.53 MB | |
Security Tools
-
Simple Text Encryptor 0.13
Simple Text Enctyptor is a simple program that will encrypt and decrypt text using 128-bit AES encryption. You will simply need to enter your text, then easily encrypt it. It is now very easy to encrypt your text. |
||
Security Tools
-
GPG-Crypter 0.3.5
GPG-Crypter is a GTK+ frontend to GnuPG (GPG) and it is intended to decrypt and encrypt text into ASCII-armored gpg-ciphers. Whats New in This Release: - implemented edit menu funktions (cut, copy, paste and delete) - activated "copy to... |
||
File Security
-
GPG-Crypter 0.3.5
GPG-Crypter is a GTK+ frontend to GnuPG (GPG) and it is intended to decrypt and encrypt text into ASCII-armored gpg-ciphers. |
40.96 KB | |
Security Tools
-
ARC4 Text Encryptor 1.0
The ARC4 Text Encryptor allows you to encrypt and decrypt text based data using the ARC4 encryption algorithm. Wikipedia says: - In cryptography, RC4 (also known as ARC4 or ARCFOUR) is the most widely-used software stream cipher and is used in... |
1.19 MB | |
Security
-
GPG-Crypter 0.3.5
GPG-Crypter is a GTK+ frontend to GnuPG (GPG) and it is intended to decrypt and encrypt text into ASCII-armored gpg-ciphers. |
||
Security Tools
-
nCRYPTION 1.0
nCRYPTION is a very simple program allowing you to encrypt/decrypt text with a bit shifting algorithm. Enc/Dec/Bin text can be saved/loaded. nCRYPTION features: Easy to use text encryption program. Encrypts using an advance algorithm' Fast... |
1.1 MB | |
Business
-
ppc CryptText 1.5
Crypt / Decrypt text database. Register on the phone to secure your passwords or sensitive text. Ability to save so cryptato details of login or other sensitive data for later retrieval if necessary. The data can be seen clearly only with the key... |
332 KB |
NEW DOWNLOADS IN SECURITY TOOLS, FILE SECURITY
Security Tools
-
Privacy Eraser Free 6.3
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox,... |
9.41 MB | |
Security Tools
-
WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:... |
9.39 MB | |
Security Tools
-
USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock... |
11 KB | |
Security Tools
-
Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and... |
407 KB | |
Security Tools
-
Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should... |
29.53 MB | |
File Security
-
Absolute Folder Hider 1.3
The product can hide and protect folders on your computer to ensure security of your privacy. It is very useful if you want to keep your files away from peoples's prying eyes. The hidden folders are invisible in Windows Explorer and can not be... |
986.33 KB | |
File Security
-
Auto File DRM Encryption Tool 5.2.5.4
Auto File DRM Encryption Tool was developed with EaseFilter Encryption Filter Driver(EEFD) SDK. The tool can encrypt the file transparently in file system level, it allows you to embed the digital rights management( DRM) data to the encrypted... |
3.35 MB | |
File Security
-
Motion Detection - Webcam Monitoring 2.4
The motion detection feature will turn your PC into a complete security system, allowing you to keep an eye on your surroundings even when you are away. When motion is detected, the app will perform predefined actions such as recording from... |
20.43 MB | |
File Security
-
Smart ID Scan 2.0
Smart ID Scan helps you protect your most valuable personal information. You might actually be surprised when you run a Smart ID Scan and find out how much personal information is easily available to hackers in the documents or files on your PC.... |
2.64 MB | |
File Security
-
SSuite Agnot StrongBox Security 2.2.2
Now this is what I call real security!... You may use any one of nineteen, industrial and military strength, encryption ciphers to secure your most precious private information. There is BlowFish, TwoFish, CAST-128, Cast-256, DES, 3DES, ICE,... |
4.67 MB |