PenProtect 1.45

... using your Password and a special technique (AES algorithm 256 bit key). PenProtect requires no installation. It is a single file located in the home folder of your Flash Drive. Ability to encrypt or decrypt only required files. No size limit of encrypted files. ...

Author EasyLine
License Demo
Price $19.00
Released 2008-11-12
Downloads 1635
Filesize 1.81 MB
Requirements Windows 98/Me/NT/2000/XP/2003 Server/Vista
Installation Install and Uninstall
Keywords flash drive, USB, password, flash memory, pen drive, crypt, encrypt, decrypt, software, key, file, folder, AES, AES 256, security, cryptography, secure, stick, device, lock, penprotect
Users' rating
(38 rating)
PenProtectEncryption ToolsWindows 2000, Windows XP, Windows 2003, Windows Vista, Windows Vista x64, Windows Vista
Our rating 5 award
PenProtect algorithm - Download Notice

Using PenProtect Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of PenProtect on rapidshare.com, depositfiles.com, megaupload.com etc. All PenProtect download links are direct PenProtect full download from publisher site or their selected mirrors.
Avoid: algorithm oem software, old version, warez, serial, torrent, PenProtect keygen, crack.
Consider: PenProtect full version, algorithm full download, premium download, licensed copy.

PenProtect algorithm - The Latest User Reviews

Most popular Encryption Tools downloads

Guardian Of Data

3.009 download

... it's a breeze. With AES encryption (Rijndael Encryption Algorithm) you protect any type of document, so that it can only be read after entering the correct password! With up to ...

Digital Security Suite

2011 download

... file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so ... Infosec Standard 5, Baseline & Enhanced Peter Gutmann's algorithm U.S.Department of Defense Sanitizing (DOD 5220.22-M) Bruce Schneier's ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...

Abacre File Encryptor

1.0 download

... files or folders by using 39 advanced encryption algorithms (CAST, Blowfish, Twofish, Rijndael and others). Files maybe encrypted into either one single file either individually. It's also possible to compress ...

5 award

Any File Encryptor

3.4.29 download

... Advanced Encryption Standard (AES), a highly secure encryption algorithm used globally, including for top-secret government documents. This ensures a high level of security for your encrypted files. Support for Multiple ...

GiliSoft Private Disk

11.5.27 download

... Encryption: Files are encrypted with a powerful 256-bit algorithm, which is a standard for secure data encryption, rendering the encrypted files inaccessible without the correct password. 2. Password Protect Your ...

Easy File Encryptor

1.3 download

Easy File Encryptor is a file encryption software available as Windows explorer context menu extension that uses the very strong and industry standard Advanced Encryption Standard (AES) to easily and securely ...

abylon ENTERPRISE

23.60.1 download

... or DVD. The using of the recognized encryption algorithm AES and Blowfish guarantee the security of the files. abylon SYMM CRYPT and abylon HYBRID CRYPT are a context sensitive PlugIn ...

Rohos Disk Encryption

3.2 download

... encryption Rohos disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly. No risk of data loss Partition password reset option allows ...

Toms Hash Explorer

1.2 download

... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, ... + Calculate Hash Values using industry standard hashing algorithms + Calculate File Entropy using Shannon's Entropy algorithm ...