|Added: December 12, 2011|
File size: 8.30Mb
Available in: English
Publisher: Silver Elm Systems LLC
AttachShield provides simplified single-click email encryption for users of Microsoft Outlook. Seamless integration into Outlook 2007 and 2010. Government-grade encryption with a simple interface that anyone can use.
Learn more at the attachshield homepage: attachshield.com
Programs similar to AttachShield
|A2DCrypt 2048 Bits Encryption||March 04, 2010|
Encrypt files, folders and disks with a 2048-bit algorithm virtually unbreakable.
|File size: 1.84Mb||License: Shareware||Details|
|KaKa Folder Protector||November 22, 2012|
KaKa Foder protector is a powerful and easy-to-use program for protection
|File size: 1.44Mb||License: Freeware||Details|
|Wi-Fi WEP Key Generator||August 19, 2004|
Manage your Wi-Fi wireless easily with the Wi-Fi WEP Key Generator Utility
|File size: 2.05Mb||License: Shareware||Details|
|Sage Password Recovery||October 10, 2006|
Recover your Sage Instant Accounts, Line 100, and Line 50 passwords.
|File size: 0.1491Mb||License: Shareware||Details|
|FoxCrypt File Protection standard||March 06, 2009|
Protect your sensitive files from revising or usurping by others.
|File size: 3.62Mb||License: Shareware||Details|
|KeePass Password Safe Professional||July 20, 2013|
Store your passwords in single database locked with master key or key disk.
|File size: 1.7Mb||License: Freeware||Details|
|Advanced Encryption Package 2014||January 16, 2014|
128-2048 bit file encryption, secure file deletion, self-decrypting files
|File size: 7Mb||License: Shareware||Details|
|eSecurityNet PE||January 06, 2007|
Recover and store login IDs and passwords.
|File size: 8.19Mb||License: Freeware||Details|
Skiffer software is used to encrypt information, primarily to be sent as e-mail. An add-in to Microsoft Outlook 2003 and 2007 is also available and makes it convenient to send encrypted messages from Outlook. Two accounts are available in the free version. You and the receiver of the messages must agree upon a key. After your first encrypted message, a computer-generated key can be assigned.
|File size: 1.5Mb||License: Freeware||Details|
Many organizations use disk image cloning to perform mass rollouts of Windows. This technique involves copying the disks of a fully installed and configured Windows computer onto the disk drives of other computers. These other computers effectively appear to have been through the same install process, and are immediately available for use. While this method saves hours of work and hassle over other rollout approaches, it has the major problem that every cloned system has an identical Computer Security...
|File size: 0.0498Mb||License: Freeware||Details|
remember, single, 802.11b, versions, application, sites, database, installed, manager, 802.11g, locked, Linksys, WEP, removable media, navigate, disk drives, data safe, directory, router management, protected, AES 256