Menu
Submit Site
Home
Computer
Security
All sites of Security
PrivacyCrypt
PrivacyCrypt- Information and DLLs to assist the implementation of DES and RSA cryptographic subsystems. ...
Softwinter
Softwinter- Offers tools for transparent encryption on Pocket PC and Windows based computers. ...
ccrypt
ccrypt- Command-line file and stream encryption utility based on Rijndael, designed to replace crypt. Open source and GPL. ...
CryptDecrypt
CryptDecrypt- File and folder encryption utility supporting AES, GOST, 3DES, RC2, RC4 and Windows data protection API. ...
MAXA Research Int'l Inc
MAXA Research Int'l Inc- Software for encryption, steganography, Word file cleaning, cookie cleaning etc., in German, English or Spanish. ...
Cryptzone AB
Cryptzone AB- Secured eGuard software for encryption and access control over removable media (data leak prevention). ...
IronKey
IronKey- Tamper-resistant USB flash drives with AES data encryption in hardware. ...
commissum
commissum- Provides a range of information security services to a broad cross-section of businesses and government organisations. ...
Secward Technologies Inc.
Secward Technologies Inc.- Encryption products to secure digital content transparently and provide secure collaboration for distributed software developers. ...
Folder-Protector
Folder-Protector- Folder encryption utility supporting 256-bit BLOWFISH algorithm. ...
AutoKrypt
AutoKrypt- Encryption software that will automatically encrypt or decrypt files and folders. Encryption methods include password based, public and private key, secret key, OpenPGP password, OpenPGP public and private key ...
SafeHouse Professional
SafeHouse Professional- Hard disk and USB memory stick file encryption for Windows. Includes AES and Twofish encryption, administration, policy settings and deployment tools. ...
WinSesame
WinSesame- Encryption software to password protect folders on hard disk, network, CD, and external drives on Windows 98, Me, 2000, XP, Vista computers. ...
WinTrezur
WinTrezur- Encrypts images and other files in strongly encrypted archives. Allows direct preview of images in archives. [Windows] ...
Private File Encryption
Private File Encryption- Software to encrypt sensitive documents and email attachments using the Advanced Encryption Standard (AES). ...
GoldKey Security Corporation
GoldKey Security Corporation- USB tokens for multi-factor authentication plus 256-bit AES encryption of hard drives, laptops, emails, backups and other sensitive data with hierarchical group permissions. ...
SecurStar
SecurStar- Supplier of DriveCrypt hard drive encryption software, and PhoneCrypt telephone encryption system. ...
Secure Systems Limited
Secure Systems Limited- Supplier of Silicon Data Vault encryption device that connects into the IDE cable and requires a password at boot time to decrypt the hard drive. Uses 128-bit AES and is designed to meet FIPS 140- ...
PGPDisk v6.0.2i
PGPDisk v6.0.2i- PGPdisk was a stand-alone freeware program but it is now integrated with the commercial PGP package. The freeware version 6.0.2i remains available here for both Macs and PCs. ...
Softwinter
Softwinter- Supplier of Sentry 2020 disk encryption software for Windows. ...
SpyProof!
SpyProof!- Disk drive that automatically encrypts all data blocks written to it and then transparently decrypts them for any application, if logged in. Once logged out, the special disks are completely unreadable by unau ...
Real-Time Hardware IDE/SATA encryption
Real-Time Hardware IDE/SATA encryption- Enova Technology specializes in developing,manufacturing and marketing real-time hard disk encryption chipset. ...
Corsaire Limited
Corsaire Limited- Provides auditing, penetration testing, application testing and code reviews. Includes useful guides on security topics. ...
The CryptoGraphic Disk Driver
The CryptoGraphic Disk Driver- Short description of The CryptoGraphic Disk Driver (CGD) for NetBSD and a reference to the FREENIX paper written about it. ...
Neobyte Software
Neobyte Software- SafeBit software creates encrypted virtual disk drives using the AES algorithm. ...
TrueCrypt
TrueCrypt- Can create a virtual encrypted disk within a file and mount it as a real disk. It can also encrypt an entire hard disk partition or storage device. Supports plausible deniability. Open source. ...
TurboCrypt
TurboCrypt- Creates encrypted disk drives which can be mounted at any time. ...
Psaltech Software Pvt. Ltd.
Psaltech Software Pvt. Ltd.- Supplier of CryptArchiver disk encryption software, both free and commercial versions. ...
CryptDisk.4h
CryptDisk.4h- A free encryption system that sets up a Windows file as an encrypted virtual disk drive. Uses the AES or Twofish algorithms. ...
Alertsec
Alertsec- Web-based service to deploy and administer Pointsec disk encryption software on customer PCs. ...
Aiko Solutions Ltd.
Aiko Solutions Ltd.- SecuBox software provides AES disk encryption for Smartphones and Pocket PCs. ...
PC Dynamics Inc.
PC Dynamics Inc.- Supplier of SafeHouse encryption software for hard drives and memory sticks, including free and commercial products for business and personal use under Windows. ...
BlockMaster AB
BlockMaster AB- Supplier of SafeStick, rugged and strongly encrypted USB thumb drives, plus SafeConsole, the associated configuration and key management software for enterprise-wide use. ...
Linux Unified Key Setup
Linux Unified Key Setup- Collaborative project developing a hard disk encryption system for Linux. LUKS stores configuration information in the partition header, enabling users to migrate encrypted partitions between dev ...
A security analysis of PGP
A security analysis of PGP- Contains the result of a research project into PGP. It describes the Otterloo attack, aka PGPsdk Key Validity Vulnerability , an important attack on various windows versions of PGP. The full p ...
Stamper
Stamper- A free digital timestamping service which uses PGP and operates via email. ...
Open PGP Alliance
Open PGP Alliance- A group of companies and other organizations that are implementers of the OpenPGP standard. Documentation, resources. ...
Phil Zimmermann's Home Page
Phil Zimmermann's Home Page- Phil Zimmermann is the original creator of PGP and a founder of PGP, Inc. The site offers historical background and current resource links. ...
International PGP Home Page
International PGP Home Page- Information on the PGP program, the OpenPGP standard and the PGPi project. Detailed documentation, lists of products and services. ...
PGP Web of Trust Statistics
PGP Web of Trust Statistics- Statistics about the position of all keys within the Web of Trust. ...
PGP pathfinder and key statistics
PGP pathfinder and key statistics- Statistics of PGP keys. The pathfinder finds trust paths between keys in the PGP web of trust. ...
A Few Thoughts on Cryptographic Engineering: What's the matter with PGP?
A Few Thoughts on Cryptographic Engineering: What's the matter with PGP?- Matthew Green's blog entry, discussing the problems with keys, key management, lack of forward secrecy, the OpenPGP format and mail client impleme ...
15 reasons not to start using PGP
15 reasons not to start using PGP- The collection of reasons to prefer more advanced cryptographic communications tools and stop investing in the old PGP over e-mail architecture, the problem mostly being e-mail rather t ...
ProPublica: The World's Email Encryption Software Relies on One Guy, Who is Going Broke
ProPublica: The World's Email Encryption Software Relies on One Guy, Who is Going Broke- Werner Koch's code powers the email encryption programs around the world. If only somebody would pay him for the work. Article by J ...
Encrypt.to
Encrypt.to- Encrypts the message with PGP (client-side) and sends it on to the mail account. A user who does not use PGP can send fairly secure mails to PGP-users. The public key will be loaded from a public keyserver. ...
Phuctor: The RSA Super Collider
Phuctor: The RSA Super Collider- Online tool for testing PGP/GnuPG public keys for obvious flaws using Euclid's Greatest Common Divisor theorem as well as shared moduli. ...
Reasonably Adequate Privacy
Reasonably Adequate Privacy- Steganography technique which uses the tendency of dried vegetable juices to become colored when heated as its base technology. ...
Hermetic Stego
Hermetic Stego- Supports hiding data files in one or more BMP image files. Usage instructions, pricing and downloadable evaluation copy. [Windows] ...
Steganography and Digital Watermarking
Steganography and Digital Watermarking- Collection of papers on data hiding and digital watermarking, including countermeasures. ...
ACM Queue
ACM Queue- Article discussing steganographic techniques and methods for detecting data hidden by them. ...
« First
Previous
Page 36 of 42.
Next
Last »
Latest sites from Security
HoneyDrive Desktop
SecureLab
Security Focus
CERT Coordination Center
CR80 News
Heimdal
CyberEvidence, Inc.
JurInnov Ltd.
G-C Partners
Secure Crossing
Privacy Scan
Red Iron
Degausser.co.uk
TSFactory
Nmap
Avatier Corporation
Yoggie Security Systems
Nsauditor.com
Inguama
Sybari Software, Inc.
Declude Virus
Avira
CAcert
Checkpoint
InfoExpress
Send feedback
submit