PenProtect 1.45

... using your Password and a special technique (AES algorithm 256 bit key). PenProtect requires no installation. It is a single file located in the home folder of your Flash Drive. Ability to encrypt or decrypt only required files. No size limit of encrypted files. ...

Author EasyLine
License Demo
Price $19.00
Released 2008-11-12
Downloads 1631
Filesize 1.81 MB
Requirements Windows 98/Me/NT/2000/XP/2003 Server/Vista
Installation Install and Uninstall
Keywords flash drive, USB, password, flash memory, pen drive, crypt, encrypt, decrypt, software, key, file, folder, AES, AES 256, security, cryptography, secure, stick, device, lock, penprotect
Users' rating
(33 rating)
PenProtectEncryption ToolsWindows 2000, Windows XP, Windows 2003, Windows Vista, Windows Vista x64, Windows Vista
Our rating 5 award
PenProtect aes algorithm - Download Notice

Using PenProtect Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of PenProtect on rapidshare.com, depositfiles.com, megaupload.com etc. All PenProtect download links are direct PenProtect full download from publisher site or their selected mirrors.
Avoid: aes algorithm oem software, old version, warez, serial, torrent, PenProtect keygen, crack.
Consider: PenProtect full version, aes algorithm full download, premium download, licensed copy.

PenProtect aes algorithm - The Latest User Reviews

Most popular Encryption Tools downloads

Guardian Of Data

3.008 download

... With Guardian Of Data, it's a breeze. With AES encryption (Rijndael Encryption Algorithm) you protect any type of document, so that ...

USB Flash Security#

4.1.11 download

... from PC, it will lock automatically. [Automated encryption] AES encryption which is recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

Drive Encryption

3.526 download

... System : FAT12, FAT16, FAT32, and NTFS Encryption Algorithm : 256 Bits AES, High Security Level Supported Maximum Storage Capacity: No ...

abylon ENTERPRISE

23.60.1 download

... or DVD. The using of the recognized encryption algorithm AES and Blowfish guarantee the security of the files. ...

Rohos Disk Encryption

3.2 download

... On-the-fly disk encryption Rohos disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic ...

Digital Security Suite

2011 download

... file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so ... The following standards and technologies are currently supported: AES-standard Rijndael, 256 bits Blowfish, 448 bits Twofish, 256 ...

abylon BASIC

23.60.1 download

... diaries, pictures or other secret documents with the AES- or Blowfish-Algorithm is relatively simple. With the help ... the Blowfish- (448 bits key length) or the AES-Algorithm (256 bit key length). The encrypted files can ...

USB Flash Security#g

4.1.11 download

... from PC, it will lock automatically. [Automated encryption] AES encryption which is recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

Easy File Encryptor

1.3 download

Easy File Encryptor is a file encryption software available as Windows explorer context menu extension that uses the very strong and industry standard Advanced Encryption Standard (AES) to easily and securely ...

Paranoia Text Encryption for PC

15.0.4 download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, ... text within an image - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen ...