Free Key File Downloads

Public Key File and Email Encryption Freeware

Deltacrypt oneclick encryption Personnal Use
 

Deltacrypt Technologies Inc
 

DeltaCrypt OneClick Personal does it all: This Public Key Encryption Software encrypts files, text and emails with 1024-bit RSA protection, digital signatures, andunalterable public keys. It offers the basic encryption functionalities FREE OF CHARGE.

public key encryption encryption software digital signatures sensitive data rsa oneclick

 
S.Phoenix SCO OpenServer Data Recovery s/w.

Stellar Phoenix SCO OpenServer
 

Stellar Information Systems Ltd
 

Stellar Phoenix (SCO Open Server) is NON-DESTRUCTIVE and READ ONLY file & volume recovery software that helps you in recovering your all-important data. Key File System Data Structures in HTFS and EAFS.Disk Label Structure(VTOC), Super block & i-node

tree structure data recovery recover files file attributes scsi hard drives data structures

 
Stellar Phoenix BSD Data Recovery software

Stellar Phoenix BSD - Unix Data Recovery Software
 

Stellar Information Systems Ltd
 

Stellar Phoenix BSD is NON-DESTRUCTIVE and READ ONLY file & volume recovery software that helps you in recovering your all-important data. Key File System Data Structures in UFS1 and UFS2 File System .

tree structure windows explorer data structures open bsd eide data recovery

Store and manage your passwords in a safe way

1st Password Protector
 

1STDESKTOP.COM
 

1st Password Protector will help you manage your passwords securely. You can put all your passwords in one database which is locked with one master key or a key file so you only have to remember one password or use a key file to unlock the data.

network logon windows network aes encryption algorithms databases passwords

Protect files with military grade encryption.

Advanced File Protector
 

666Soft
 

Advanced File Protector is a professional file encryption tool. It uses very strong military grade encryption algorithms including RSA and the newest AES standard Rijndael to make sure your private data remains confidential.

key case physical key military grade encryption decrypt aes file shredder

S.Phoenix(SCO UnixWare) Data Recovery s/w.

Stellar Phoenix SCO UnixWare - Data Recovery Software
 

Stellar Information Systems Ltd
 

Stellar Phoenix (SCO UnixWare) is NON-DESTRUCTIVE and READ ONLY file & volume recovery software that helps you in recovering your all-important data. Key File System Data Structures in HTFS and EAFS.

veritas file system explorer style interface ufs tree structure corrupt data scsi hard drives

graphical SFTP client for mobile device

zaSFTP
 

zaTelnet
 

SFTP, or secure FTP, is a program that uses SSH to transfer files. Unlike standard FTP, it encrypts both commands and data, preventing passwords and sensitive information from being transmitted in the clear over the network. It is functionally simila

proxy select network mobile device secure ftp sftp server ftp server

 FAT and NTFS recovery software

Stellar Phoenix FAT & NTFS
 

Stellar Information Systems Ltd
 

Stellar Phoenix-is an easy to use FAT & NTFS Partition File recovery Utility that examines your inaccessible hard drives for damages and corruptions and recovers the data back.

lost partition stellar phoenix software malfunction logical drives recover files deleted files

S.Phoenix(Solaris - Intel) Data Recovery s/w.

Stellar Phoenix Solaris-Intel
 

Stellar Information Systems Ltd
 

Stellar Phoenix (Solaris - Intel) is NON-DESTRUCTIVE and READ ONLY file & volume recovery software that helps you in recovering your all-important data. Key File System Data Structures in UFS File system.

solaris intel eide stellar phoenix data structures tree structure folders

Protect your sensitive data.

Paragon Encrypted Disk Personal
 

Paragon Software Group
 

Protect private and sensitive data from potential unauthorized access. No matter what is your particular needs, protecting your data on computer, sharing one computer between several persons or secured transfer of data to friend, co-worker or boss

hard drive encryption algorithms unauthorized access passwords encrypted disk paragon

 

Page 1 out of 2    1 2

 

Copyright 2003-2011 TverSoft Software