Freeware and Shareware Downloads Tech Articles and Forum Technology News Contact File Champ
 
Google
 
 

Subcategories
Adware/Spyware Detection
Anti Virus (Specialized)
Anti-Virus Tools
Cookie Management
File Encryption Tools
Internet Cleanup Tools
Password Manager
Password Recovery Tools
PC Access Control
PC Activity Monitoring
Personal Firewalls
Secure File Deletion
Security Tools
Download HIT Mail Privacy LITE HIT Mail Privacy LITE 1.01 - hide messages in pictures, Subcategory: File Encryption Tools
Price: Free OS: 98/ME/2000/XP Size: 963 KB Version: 1.01
HIT Mail Privacy LITE allows you to hide a message within a picture. It supports most popular image formats (JPG, GIF, TIFF, BMP, etc) for picture input. Files can be saved in BMP format, HIT archive or BMP in a zip file. Since the program can only save to BMP file, the resulting files are usually very large - several megabytes in size, which limits the usability for email or other communication use.
Inside Website Logger 2.2 - monitor all websites visited, Subcategory: File Encryption Tools
Price: 29.95 OS: WinXP,Windows2000,Windows2003 Size: 907 KB Version: 2.2
Inside Website Logger is an invisible surveillance application that monitors and records all websites visited by a user or computer.The report containing all accessed websites is available in web format or can be sent to a specified email address. Stealth Website Logger is suited for both office and home use, monitoring one computer or an entire network. For enhanced security, Inside Website Logger interface is password protected and requires a hotkey combination for accessing it. When running, Inside Website Logger is not visible in Program Files and Task Manager.
Internet History Eraser 8.01.01 - Erase traces of your Internet and Computer Activities, Subcategory: File Encryption Tools
Price: $19.00 OS: Windows XP,Windows 2000,Windows 2003,Windows Vista Size: 2939 KB Version: 8.01.01
Internet privacy eraser software to protect your internet privacy and remove traces of the internet and computer activities. It supports Internet Explorer, Mozilla Fire fox, Opera, and Netscape for its operations. It helps to erase and remove traces of internet explorer cookies, cache files, temp files, address bar history, typed url's, search computer history, open/save history, recent documents list, application logs, start menu run history, printer stream history, application logs, start menu click history, media player url list and much more. In addition, our software provides two customizable features for your internet explorer web page and windows tool bar - change colors and background images of your web pages and local windows with options to enable and disable or menu bar and tool bar options in your web page. Internet history eraser software runs smoothly on Windows Vista, XP, 2003, 2000 operating systems and is available for free download with a time period of 7 days of evaluation.
Download Invisible Secrets Invisible Secrets 4.0.7 - encrypt and hide your data, Subcategory: File Encryption Tools
Price: $39.95 (Free Trial) OS: 98/ME/NT/2000/XP Size: 2715 KB Version: 4.0.7
Invisible Secrets is a security tool that can encrypt your data and files for safe keeping or for secure transfer across the internet. It can also hides them inside other files, that appear totally innocent, such as picture or sound files or web pages. These types of files are a perfect disguise for sensitive information since would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets allows you to encrypt and hide files directly from Windows Explorer, and then automatically transfer them by e-mail or via the Internet. The program features strong encryption algorithms and a wizard that guides you through all the necessary steps needed to protect your data. Additional features include a secure password manager, a file shredder, a file locker, and option to clean your Internet tracks including cache, cookies and more.
Download Iron Key Iron Key 1.3 - file encryption, Subcategory: File Encryption Tools
Price: Free OS: 98/NT/ME/2000 Size: 1001 KB Version: 1.3
Iron Key is a program for encrypting files, that you can safely send over the Internet. The encrypte file is a self-extracting executable - your correspondent must run it and enter the right password for decrypting. No crypto software needs to be installed on the receiving side! Integrated file shredder! Uses the industry-standard DES cipher in the Electronic Codebook mode for data encryption.
Download JPHIDE and JPSEEK JPHIDE and JPSEEK 0.5 - , Subcategory: File Encryption Tools
Price: Free OS: 98/NT/ME/2000 Size: 175 KB Version: 0.5
JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. As the insertion percentage increases the statistical nature of the jpeg coefficients differs from "normal" to the extent that it raises suspicion. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal.
Kiwi Secure Tunnel 1 - Free Secure Tunnel Service, Subcategory: File Encryption Tools
Price: 0 OS: WinXP,WinNT 4.x,Windows2000,Windows2003 Size: 5808 KB Version: 1
Kiwi Secure Tunnel is a free Secure Tunnel Service for use with Kiwi Syslog Daemon (or compatible syslog daemon). It receives, compresses, and securely transports syslog messages from distributed network devices to a Kiwi Syslog Daemon. With Kiwi Secure Tunnel it is now possible for you to securely and reliably transport your syslog data across any potentially insecure network, such as the Internet. The Kiwi Secure Tunnel also has the ability to monitor files and send any new information from these files as syslog messages to Kiwi Syslog Daemon.
Download Kryptel Kryptel 5.2 - encryption tool, Subcategory: File Encryption Tools
Price: $29.95 (Free Trial) OS: 98/ME/NT/2000/XP Size: 4413 KB Version: 5.2
Kryptel is reliable and easy-to-use software, protecting your private data with strong cryptographic algorithms. With Kryptel, your files are safe from any unwanted access - and you can do it with a single mouse click from within Windows Explorer. The program offers efficient data compression using ZIP or BZIP methods, enhanced password dialogs, support for binary keys as well as command line support and advanced operations. Kryptel supports strong ciphers, such as AES, Triple-DES, Blowfish, Twofish, Serpent, and IDEA and also includes a DoD-compliant (specification 5220.22-M) file shredder.
Download Kryptel Lite Kryptel Lite 1.01 - file encryption and shredding, Subcategory: File Encryption Tools
Price: Free OS: 98/ME/NT/2000/XP Size: 1052 KB Version: 1.01
Kryptel Lite is a free version of Kryptel. While it lacks some advanced Kryptel features, it is a fast and easy-to-use program, which will perfectly suit your needs if your security demands are not very high. It supports drag-and-drop operation and integrates to the Windows Explorer right-click menu. Kryptel Lite uses industry-standard DES cipher for encryption and includes a single-pass file shredder for secure file deletion.
Download Masker Masker 7.0.5.4 - hide files inside files, Subcategory: File Encryption Tools
Price: $30.00 (Free Trial) OS: 98/ME/NT/2000/XP Size: 2081 KB Version: 7.0.5.4
Hide any files and have them automatically encrypted! Masker is able to hide your sensitive data in other files (carrier files), which are absolute discrete and look like regular files - without a sign that they in fact contain addtional data. Of course these files will also act just like regular files, which means you can still view the picture, the movie or read the document that contains the didden files (you just can t edit it). For additional protection, the inserted file is encrypted using one of four highly secure encryption algorithms: CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit or TWOFISH. As carrierfile you can use: image files (bmp, gif, jpg, tif); audio files (wav, mid, snd, mp3); program files (exe, dll, ocx) and video files (avi, mov, mpg, asf). If you ever forget which file you used to hide your data in, the program offers a scanning feature that can find it for you.
[8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18][19] [20] [21] [22] [23] [24] [25] [26] [27]