This desktop encryption software stops prying eyes. PC users can now secure documents in such a way that sensitive files on hard drives and e-mail attachments are totally unreadable to unauthorized users. Users can drag and drop sensitive files into the Wincrypt window, select a password, and then e-mail the file to the intended recipient. The only people able to read the document are the holders of the password. The file is protected by 256-bit Advanced Encryption Standard (AES). Encryption is similar to a jigsaw puzzle. Document can be broken or scrambled up into many parts by an encryption application such as Wincrypt. This means that your file is unreadable and can only be reassembled by decrypting it with your chosen password. Wincrypt features further security options, including an antilogging onscreen keyboard that prevents monitoring from keyboard taps and listeners. Its self-decrypting function also allows recipients to decrypt files without the need to install the software.
Like it? Share with your friends!
Other Windows Software of Developer «C2SG»:
BDV DataHider BDV DataHider is software for hiding of data. It can create Secret Storages where you will place your files and folders. Hidden data cannot be found in usual ways. Second kind is Disk Secret Storage. It may be created on NTFS, FAT and FAT32 drives. For exa
BitCrypt BitCrypt is a stego encryption for Intelligence community and the like. The program allows the user to store any text message in an encrypted form which is hidden within user specified image. The text is encrypted with one of the strongest encryption algor
EncrypByte EncrypByte is an experimental file encryption utility. It is based on my WSEA Encryption Algorithm. It has been thoroughly tested to be secure. The more passes you choose to encode your data, the more secure your data is.
Steps have been taken to ensure
Encoding Decoding Free Portable Encoding Decoding Free Portable is an application that offers you to encode and decode any type of file. Be used to hide all the sensitive and important data that we want to keep away from prying eyes. It features coding of any type of files, integrating w
FolderWatch FolderWatch is a program that monitors changes to a number of folders on your computer and makes copies of files found in monitored folders. FolderWatch works in background and makes copies of your work as soon as changes are made to files. In fact, once y
MicroLocked From the developer: "MicroLocked is a small, easy to setup, security program. It locks your computer while leaving the display visible. Once locked your system can not be accessed until the unlock password is entered. Your system screen saver can be used n
i-Guard MailPal i-Guard MailPal is an e-mail companion offering complete security protection from spam, e-mail-borne virus, plus one-click attachment compression, and encryption. Using i-Guard MailPal, user can communicate sensitive data with anyone (friends and associate
Kakra Private Disk Kakra Private Disk is a small, efficient, and reliable program that allows you to create, edit, and remove encrypted virtual disks. It also be used in conjunction with a broad range of portable media, for instance: USB flash drives, external hard disks, MP
ZERO Binary NET Required framework v.2 Protect your privacy. Delete files with zero binary. Function Look clean and fresh (look with hex view tool) can create zero binary file for cleaning drive hard disk. Files deleted cannot be recovered again. Tested with digital photo
Password Spyer 2k Password Spyer 2k is a password recovery tool for windows. Password Spyer 2k reveals passwords hidden by asterkis (***) in all windows version (including 2000 and XP). You can use it to recover lost or forgotten passwords in most windows applications such
Supported Operating Systems:
Windows 2000 |
Windows 95 |
Windows 98 |
Windows Me |
Windows NT |
Windows XP |
Comments on Wincrypt:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10