Quick Navigation
. Home / New Additions
. Browse By Category
. Comics of the Day
. Feedback
. Fun Filter
. FTP Search
. Link to Us
. Site Search
. Advertising Info
. Newsletter Information
. Submit/Update Freeware
. FreewareWeb Articles
. Top Downloads Today

 Freeware Search
 Subscribe to our
 Freeware Newsletter

More Information

 Free Services

Download Taxi

 Feeling Lucky
. Random Freeware Download
. Random Desktop Download

  


Utilities: Encryption & Security:
Sorted Order: Newest Additions First.

Pages: [<<] 1 2 3

 BestCrypt v3.2 
  Broken Link? Report it!
Homepage: Is Available
Screen Shot: Is Available
Category: Encryption, Security
Our Rating: Freeware: 3/5
Description: BestCrypt is a 16-bit application designed to utilize all advantages of "on-the-fly" encryption under DOS/Windows 3.x. It allocates a portion of free space of a user's drive where all private files are kept in encrypted form. Then, BestCrypt creates a new virtual drive in the system which corresponds to the previously created container. All files which are being written to the container are being encrypted "on-the-fly", the same applies for a reading operation. Thus, the container always contains data in encrypted form.

Download Now: [481kb]

 

 System Locked 
  Broken Link? Report it!
Homepage: Not Available
Screen Shot: Not Available
Category: Encryption, Security
Our Rating: Not Rated
Description: System Locked is a Windows 9x security lockout program that totally disables a computer terminal until the correct password is entered. If you must leave your PC running and unattended for a period of time, enjoy the peace of mind that your privacy is protected. Even if a user presses the reset button with the hope of being able to use the computer "System Locked" will automatically re-load on startup to provide complete security. Features: Key Disk Password Recovery, Anti-Reset Function which re-locks the terminal if the user presses reset, Auto load with computer System, Tray Activation, Disables Alt-Ctrl-Del etc. when system is locked, Logs Incorrect Passwords with date and time stamp. Also includes Password Keeper, a sub program that can be used to hold a list of all your passwords. The utility is password protected and all passwords are stored in a encrypted format. Note: Even though this program is freeware, registration is required using a code number that the program provides.

Download Now: [2.7Mb]

 

 JVDE EBackup Standard v2.50 
  Broken Link? Report it!
Homepage: Not Available
Screen Shot: Is Available
Category: Encryption, Security
Our Rating: Freeware: 4.5/5
Description: JVDE EBackup lets you encrypt and decrypt your files in a snap. Because this program uses the Blowfish algorithm and also compresses the files, it's virtually impossible to crack. JVDE EBackup also allows you to edit, encrypt, and decrypt the contents of your Clipboard. Other features include file compression, secure file wipes, email support, a self-extractor feature and more.

Download Now: [1.3Mb]

 

 EzCipher 
  Broken Link? Report it!
Homepage: Not Available
Screen Shot: Not Available
Category: Encryption, Security
Our Rating: Freeware: 3.5/5
Description: EzCipher a small, simple, and easy to use file encryption utility. Allows batch processing for on the fly multiple files encryption and decryption. A great way to increase the security of communicating through the Internet.

Download Now: [38Kb]

 

 JBoot v6.1 
  Broken Link? Report it!
Homepage: Not Available
Screen Shot: Not Available
Category: Encryption, Security
Our Rating: Not Rated
Description: If you're worried about people accessing your PC when you're not there, JBoot attempts to keep them out. It runs from AUTOEXEC.BAT, interrupting the Windows bootup and prompting the user for a password before allowing them to proceed.

Download Now: [52kb]

 

 Eraser v5.86a 
  Broken Link? Report it!
Homepage: Not Available
Screen Shot: Is Available
Category: Encryption, Security
Our Rating: Freeware: 5/5
Description: Eraser is a great advanced security tool which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and are selected to effectively remove the magnetic remnants from the hard disk making it impossible to recover the data. Other methods include one defined in the National Industrial Security Program Operating Manual of the US Department of Defence and overwriting with pseudorandom data. You can also define your own overwriting methods.

Download Now: [8.6Mb]

 

Pages: [<<] 1 2 3

Protect privacy with VPN
PROTECT YOUR PRIVACY ONLINE!
Get your online privacy back! Whether you are searching, downloading, watching, working, checking email or browsing forums, did your know your online activities are always being tracked?! PROTECT YOURSELF with full money back guarantee with PIA! This award winning VPN provider encrypts your activities and doesn't keep ANY logs - EVER! Click here to get it at a special price!

 Copyright Information, Disclaimer & Privacy Policy