Internet Secure Tunneling Forward otherwise insecure TCP traffic through encrypted SSH tunne.

Internet Secure Tunneling

Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road.

encrypt, tunnel, secure shell

Secure Information Courier 1.2: Allows visitors to your web site to send you secure encrypted email.

Secure Information Courier 1.2

Secure Information Courier brings secure email encryption to your organization`s web site. Visitors to your web site can send secure email to your organization and even convey digital documents securely using industry standard encryption. Secure Information Courier is easy to use and nothing is assumed about the skill level of visitors to your site or about software pre-installed on their computers. To use Secure Information Courier, you simply deploy

secure email, e mail, email forms, encryption, corporate email encryption, email, web mail form, secure web mail

CompuApps DriveEraser 1.20.1: DriveEraserâ„¢ permanently erases data which can`t be recovered.

CompuApps DriveEraser 1.20.1

Secure Data Clean up: DriveEraserâ„¢ permanently erases data from hard disks, removable media, partitions, files and folders. It is specifically designed to eliminate data that is no longer needed and should not be recovered by anyone else. Major Functions Secure Erase hard/removable Disk Drives Secure Erase any selected partition Secure Erase files/folders Secure Erase Methods Create virtually any Custom Secure Erase rules

us dod, erase disk, secure disk erase, secure erase, custom erase metod, disk eraser

FileStream Secure Disk Secure, Store, Share Your Digital Assets, Protecte Data with Strong Encryption

FileStream Secure Disk

FileStream Secure Disk is the perfect solution for protecting sensitive information from theft and other attacks. This program makes a part or all of your hard disk, or removable drive, into a secure vault. All your private information stored on the Secure Disk will be protected by Strong Encryption. You can create multiple Secure Disks to compartmentalize data with the ability to move files from one Secure Disk to another.

secure disk, disk, drive encryption, file, secure e mail, xp certfied, e mail encryption, folder, data security, data locker, vista certfied

Secure Hive Encryption tool for emails, documents and part documents

Secure Hive

Secure Hive is a powerful tool for secure archiving and sharing of files. It enables you to create encrypted archives and self-extracting .exe files for secure storage and file sharing. It also includes a simple but powerful means of encrypting parts of, or entire, documents, email messages, etc. Secure Hive offers the enterprise a method of: Securing sensitive documents Protecting information during transfer Securing emails

secure file transfer, encrypt, file protection, encryption, compression, email, office, security, file encryption

Secure HTML -Lizard HTML Security viewer 2.0.9: HTML security viewer with secure DRM copy, print, login, and expiry controls.

Secure HTML -Lizard HTML Security viewer 2.0.9

secure web pages (secure HTML and secure images). Note: publishers of secure HTML pages may have implemented DRM controls to stop copying, or prevent printing, or used secure login HTML copy protection measures to prevent intellectual property theft. Secured HTML is also protected from screenshots and screen grabbing. Copy control measures enforce HTML protection (protect html code and protect images) whilst remaining transparent to the user. HTML

protect html code, encrypt html code, secure login html, secure images, encrypted html, secure html, html security

Blank And Secure 3.13: Is a portable tool to securely delete the data and block the recovering of data

Blank And Secure 3.13

"Blank And Secure" is a portable tool to securely delete the data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because "Blank And Secure" overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted.

safe, obliterate, dependable, unconditioned, absolute, trustworthy, clean, reliable, sterile, delete

Whitenoise Computer File Security 5.0: Identity key for your hard drive. There is no change in user behavior.

Whitenoise Computer File Security 5.0

SCM Preventing the Wiki Leaks scenario and creating a secure network requires ONLY three things: 1. Secure network access. All users are identified by a UNIQUE key that performs dynamic identity verification and authentication (DIVA). 2. Secure data transmission. All transmission had identity based encryption. Secure File Interchange 2 (SFI) establishes a dynamic distributed key infrastructure (DDKI) framework. 3. Secure data storage. All data is automatically saved with identity based encryption.

google, network security, entrust, apple, symmetric, encryption, wiki leaks, mobile security, microsoft, government used, hard disk encryption

Bitobit Mithril Password Manager 1.07: Quick and secure password storage and management

Bitobit Mithril Password Manager 1.07

securely in a single place. Bitobit Mithril Password Manager makes password management easier and more secure by marrying a single-click user interface with secure cryptographic algorithms to protect your sensitive information. Use Bitobit Mithril Password Manager as a secure scratch book to keep sensitive information such as activation codes, product keys and credit card numbers securely protected yet easily accessible. Make your passwords more

password generator, password security, password manager, password, password management, security

SecureCAPI 1.1.0: You can use SecureCAPI to cryptify your ISDN connections (both voice and data).

SecureCAPI 1.1.0

SecureCAPI to cryptify your ISDN connections. It can be used to secure both voice and data connections. SecureCAPI accesses the driver of any ISDN cards. To build up cryptify connections, both stations have to be equipped with the SecureCAPI. Any commercial available ISDN applications can be used, without any further requirements or special functions. Application examples: Online banking via cryptified ISDN connections, Secure ISDN Data transfer (

telephone, capi, cryptification, cryptify, isdn, bugproof, secureisdn, securecapi, line