SlideShare une entreprise Scribd logo
1  sur  33
SOFTWARE TOOLS FOR 
ENCRYPTION 
B Y : CL I FORD JOHN R EANDINO
SOFTWARE TOOLS FOR 
PEN DRIVE
ROHOS MINI DRIVE
ROHOS MINI DRIVE 
• is a free software to protect USB flash drive with 
password. Your data on the USB flash drive is 
secured by creating hidden and encrypted 
partitions. To use it, run the program and select 
Encrypt USB drive and enter a password and it will 
create an encrypted partition on the USB drive. You 
can access the stored data by providing the right 
password.
DISKCRYPTOR
DISKCRYPTOR 
• is a free and easy to use open source disk 
encryption software. It can encrypt all disk partitions 
of your hard drive, USB storage devices and CD-ROM 
drives. It supports both FAT and NTFS file 
systems. It can encrypt your drives using AES, 
Twofish, or Serpent algorithms. You can encrypt any 
drive including USB flash drive by providing the 
password of your choice.
USB FLASH SECURITY
USB FLASH SECURITY 
• is a free software to secure your data on USB Flash 
Drive. You can easily secure files on USB drive by 
adding password protection and encryption. Once 
installed you only need to provide the correct 
password to access your files on the USB drive. It 
supports up to 4 GB USB flash drive in the free 
version. It is very easy to use.
KAKASOFT USB SECURITY
KAKASOFT USB SECURITY 
• is a simple and easy to use USB protection and 
encryption software. It lets you to protect files or 
folders on your USB drive with password. First add 
files or folders to the USB flash drive and then run this 
software, it will installs the USBSecurity executable 
file on your pen drive and hide all the files and 
folders on it. To unprotect or see the contents of the 
USB disk you need to provide the right password.
STORAGECRYPT
STORAGECRYPT 
• is a free software for USB drive encryption. It lets you 
encrypt and password protect your removable 
drives including USB drive, firewire drive, and flash 
cards etc. It uses 128 bit AES encryption technique 
for security. You can set passwords which can be 
maximum of 50 characters. It is a portable software 
and easy to use.
DCCEXPLORER
DCCEXPLORER 
• is a free software to encrypt files or folders on your 
PC as well as on USB drives with password. It uses 
Advanced Encryption Standard (AES) algorithm to 
encrypt or decrypt your files. It has an Explorer like 
interface and you can browse for files through it. 
You can easily drag and drop files or folders to its 
upper pane to encrypt. You can decrypt your files 
or folders with the correct password only.
SOFTWARE TOOLS FOR 
FILES
7-ZIP (WINDOWS)
7-ZIP 
• is open source software under the GNU LGPL 
license. 7-Zip has ZIP container-based AES-256 
encryption. You can easily create a compressed 
archive of files and add a password to it.
AXCRYPT (WINDOWS)
AXCRYPT 
• is an open source file encryption 
software that lets you compress, 
encrypt, decrypt, store, send, and 
work with individual files. It works 
with the Windows shell and it uses 
AES-256 encryption.
CRYPTEXT (WINDOWS)
CRYPTEXT 
• lets you decode and encode 
files with a combined 
technology of SHAa1 and 
RC4. It locks files with a 160-bit 
password-protected keyword.
DISK UTILITY (MAC)
DISK UTILITY (MAC) 
• The Disk Utility software that comes 
bundled with Mac OS X lets you 
create encrypted disk images and 
file volumes using AES 128-bit or 
256-bit. If you have never 
encrypted files using Disk Utility 
and want to learn how to do it, 
click the link above.
DSCRYPT (WINDOWS)
DSCRYPT 
• supports drag and drop and provides 
AES/Rijndael file encryption. The 
software features optimal 
implementation and safety measures. 
dsCrypt has Secure PassPad, brute-force 
password search resistance, and 
verified data/file processing.
ENCRYPT4ALL (WINDOWS)
ENCRYPT4ALL (WINDOWS) 
• Encrypt4all is an application that 
implements a real bit-per bit data 
encryption. It lets you encrypt any 
kind of file and set a password for 
the archives. You can also 
encrypt files that are larger than 
2GB.
FREEOTFE/FREEOTFE 
EXPLORER (WINDOWS/LINUX)
FREEOTFE 
• is an open source transparent disk 
encryption program that lets you 
create one or more “virtual disks” on 
PCs. FreeOTFE has support for Linux 
volumes, supports numerous hash 
(including SHA-512, RIPEMD-320 Tiger), 
and encryption algorithms (AES, 
Twofish, and Serpent) in several modes 
(CBC, LRW, and XTS).
GNU PRIVACY 
GUARD (WINDOWS/MAC/LINUX)
GNU PRIVACY GUARD (GNUPG) 
• is an open source version of the Pretty 
Good Privacy (PGP) encryption 
software. GNUpg lets you encrypt 
individual files and groups of 
files. GNUpg uses a command line 
interface, but there are several front-ends 
with easy-to-use GUIs. Below is an 
image of GnuPG Shell.
TRUECRYPT (WINDOWS/MAC/LINUX)
TRUECRYPT 
• can create secure encrypted virtual 
disks or entire drives. The files can be 
encrypted on-the-fly so that they are 
decrypted as you access them and 
then encrypts again when you are 
done. TrueCrypt lets you create 
hidden volumes in encrypted volumes 
to make files even more secure.

Contenu connexe

Tendances

WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolBrent Muir
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetBrent Muir
 
Powerpoint presentation of windows vista. 2
Powerpoint presentation of windows vista. 2Powerpoint presentation of windows vista. 2
Powerpoint presentation of windows vista. 2MaJanine Ocho
 
Distro Recipes 2013: Secure Boot and Linux: several issues, one solution
Distro Recipes 2013: Secure Boot and Linux: several issues, one solutionDistro Recipes 2013: Secure Boot and Linux: several issues, one solution
Distro Recipes 2013: Secure Boot and Linux: several issues, one solutionAnne Nicolas
 
Usb forensics BSides London 2015
Usb forensics BSides London 2015Usb forensics BSides London 2015
Usb forensics BSides London 2015Russ Taylor
 
Windows Vista
Windows VistaWindows Vista
Windows VistaSamTabor
 
Server hardening methedologies
Server hardening methedologies Server hardening methedologies
Server hardening methedologies Shreya Pohekar
 
How to boot a VM form a Forensic Image
How to boot a VM form a Forensic ImageHow to boot a VM form a Forensic Image
How to boot a VM form a Forensic ImageKrešimir Hausknecht
 
Mozilla Firefox Bhopal
Mozilla Firefox BhopalMozilla Firefox Bhopal
Mozilla Firefox BhopalKomal Gandhi
 
The investigation of operating systems
The investigation of operating systems The investigation of operating systems
The investigation of operating systems gwaite97
 
Virtualisation for Developers
Virtualisation for DevelopersVirtualisation for Developers
Virtualisation for Developerselliando dias
 

Tendances (20)

WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage Tool
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
 
Homework
HomeworkHomework
Homework
 
Powerpoint presentation of windows vista. 2
Powerpoint presentation of windows vista. 2Powerpoint presentation of windows vista. 2
Powerpoint presentation of windows vista. 2
 
Distro Recipes 2013: Secure Boot and Linux: several issues, one solution
Distro Recipes 2013: Secure Boot and Linux: several issues, one solutionDistro Recipes 2013: Secure Boot and Linux: several issues, one solution
Distro Recipes 2013: Secure Boot and Linux: several issues, one solution
 
Usb forensics BSides London 2015
Usb forensics BSides London 2015Usb forensics BSides London 2015
Usb forensics BSides London 2015
 
Windows Vista
Windows VistaWindows Vista
Windows Vista
 
BitlockerToGo
BitlockerToGoBitlockerToGo
BitlockerToGo
 
Secudrive
SecudriveSecudrive
Secudrive
 
VMXray
VMXrayVMXray
VMXray
 
Spec00546
Spec00546Spec00546
Spec00546
 
Server hardening methedologies
Server hardening methedologies Server hardening methedologies
Server hardening methedologies
 
Virtualbox
VirtualboxVirtualbox
Virtualbox
 
How to boot a VM form a Forensic Image
How to boot a VM form a Forensic ImageHow to boot a VM form a Forensic Image
How to boot a VM form a Forensic Image
 
Veracrypt
VeracryptVeracrypt
Veracrypt
 
Info
InfoInfo
Info
 
Presentation on windows
Presentation  on windowsPresentation  on windows
Presentation on windows
 
Mozilla Firefox Bhopal
Mozilla Firefox BhopalMozilla Firefox Bhopal
Mozilla Firefox Bhopal
 
The investigation of operating systems
The investigation of operating systems The investigation of operating systems
The investigation of operating systems
 
Virtualisation for Developers
Virtualisation for DevelopersVirtualisation for Developers
Virtualisation for Developers
 

En vedette

Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101SecurityMetrics
 
Deploying Microsoft BitLocker
Deploying Microsoft BitLockerDeploying Microsoft BitLocker
Deploying Microsoft BitLockerutahmisfit
 
Attacking Windows Authentication and BitLocker Full Disk Encryption
Attacking Windows Authentication and BitLocker Full Disk EncryptionAttacking Windows Authentication and BitLocker Full Disk Encryption
Attacking Windows Authentication and BitLocker Full Disk EncryptionIan Haken
 
Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6sabtolinux
 
From zero to SYSTEM on full disk encrypted windows system
From zero to SYSTEM on full disk encrypted windows systemFrom zero to SYSTEM on full disk encrypted windows system
From zero to SYSTEM on full disk encrypted windows systemNabeel Ahmed
 
Search Engines Presentation
Search Engines PresentationSearch Engines Presentation
Search Engines PresentationJSCHO9
 

En vedette (6)

Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
Deploying Microsoft BitLocker
Deploying Microsoft BitLockerDeploying Microsoft BitLocker
Deploying Microsoft BitLocker
 
Attacking Windows Authentication and BitLocker Full Disk Encryption
Attacking Windows Authentication and BitLocker Full Disk EncryptionAttacking Windows Authentication and BitLocker Full Disk Encryption
Attacking Windows Authentication and BitLocker Full Disk Encryption
 
Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6
 
From zero to SYSTEM on full disk encrypted windows system
From zero to SYSTEM on full disk encrypted windows systemFrom zero to SYSTEM on full disk encrypted windows system
From zero to SYSTEM on full disk encrypted windows system
 
Search Engines Presentation
Search Engines PresentationSearch Engines Presentation
Search Engines Presentation
 

Similaire à List of Software tools for encryption

Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsMicky Metts
 
How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11Muhammad Arsalan
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxchristinemaritza
 
Best 15 file and folder locker for Windows 11
Best 15 file and folder locker for Windows 11Best 15 file and folder locker for Windows 11
Best 15 file and folder locker for Windows 11gaurav yadav
 
Data At Rest Encryption
Data At Rest EncryptionData At Rest Encryption
Data At Rest EncryptionSteven Aiello
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helixJeff Carroll
 
Encase Forensic
Encase ForensicEncase Forensic
Encase ForensicMegha Sahu
 
Hardware
HardwareHardware
Hardwareamal312
 
Encrypted File Services in sustaina.pptx
Encrypted File Services in sustaina.pptxEncrypted File Services in sustaina.pptx
Encrypted File Services in sustaina.pptxanthonyazar2019
 
REMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of ArtifactsREMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of ArtifactsRhydham Joshi
 

Similaire à List of Software tools for encryption (20)

Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
d-crypt
d-cryptd-crypt
d-crypt
 
13.pptx
13.pptx13.pptx
13.pptx
 
How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11
 
File Encryption
File EncryptionFile Encryption
File Encryption
 
Deft v7
Deft v7Deft v7
Deft v7
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
 
File000173
File000173File000173
File000173
 
Best 15 file and folder locker for Windows 11
Best 15 file and folder locker for Windows 11Best 15 file and folder locker for Windows 11
Best 15 file and folder locker for Windows 11
 
Keylogger
KeyloggerKeylogger
Keylogger
 
Data At Rest Encryption
Data At Rest EncryptionData At Rest Encryption
Data At Rest Encryption
 
Clape n
Clape nClape n
Clape n
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helix
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
 
Hardware
HardwareHardware
Hardware
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Deft
DeftDeft
Deft
 
Encrypted File Services in sustaina.pptx
Encrypted File Services in sustaina.pptxEncrypted File Services in sustaina.pptx
Encrypted File Services in sustaina.pptx
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
REMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of ArtifactsREMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of Artifacts
 

Dernier

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Dernier (20)

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

List of Software tools for encryption

  • 1. SOFTWARE TOOLS FOR ENCRYPTION B Y : CL I FORD JOHN R EANDINO
  • 2. SOFTWARE TOOLS FOR PEN DRIVE
  • 4. ROHOS MINI DRIVE • is a free software to protect USB flash drive with password. Your data on the USB flash drive is secured by creating hidden and encrypted partitions. To use it, run the program and select Encrypt USB drive and enter a password and it will create an encrypted partition on the USB drive. You can access the stored data by providing the right password.
  • 6. DISKCRYPTOR • is a free and easy to use open source disk encryption software. It can encrypt all disk partitions of your hard drive, USB storage devices and CD-ROM drives. It supports both FAT and NTFS file systems. It can encrypt your drives using AES, Twofish, or Serpent algorithms. You can encrypt any drive including USB flash drive by providing the password of your choice.
  • 8. USB FLASH SECURITY • is a free software to secure your data on USB Flash Drive. You can easily secure files on USB drive by adding password protection and encryption. Once installed you only need to provide the correct password to access your files on the USB drive. It supports up to 4 GB USB flash drive in the free version. It is very easy to use.
  • 10. KAKASOFT USB SECURITY • is a simple and easy to use USB protection and encryption software. It lets you to protect files or folders on your USB drive with password. First add files or folders to the USB flash drive and then run this software, it will installs the USBSecurity executable file on your pen drive and hide all the files and folders on it. To unprotect or see the contents of the USB disk you need to provide the right password.
  • 12. STORAGECRYPT • is a free software for USB drive encryption. It lets you encrypt and password protect your removable drives including USB drive, firewire drive, and flash cards etc. It uses 128 bit AES encryption technique for security. You can set passwords which can be maximum of 50 characters. It is a portable software and easy to use.
  • 14. DCCEXPLORER • is a free software to encrypt files or folders on your PC as well as on USB drives with password. It uses Advanced Encryption Standard (AES) algorithm to encrypt or decrypt your files. It has an Explorer like interface and you can browse for files through it. You can easily drag and drop files or folders to its upper pane to encrypt. You can decrypt your files or folders with the correct password only.
  • 17. 7-ZIP • is open source software under the GNU LGPL license. 7-Zip has ZIP container-based AES-256 encryption. You can easily create a compressed archive of files and add a password to it.
  • 19. AXCRYPT • is an open source file encryption software that lets you compress, encrypt, decrypt, store, send, and work with individual files. It works with the Windows shell and it uses AES-256 encryption.
  • 21. CRYPTEXT • lets you decode and encode files with a combined technology of SHAa1 and RC4. It locks files with a 160-bit password-protected keyword.
  • 23. DISK UTILITY (MAC) • The Disk Utility software that comes bundled with Mac OS X lets you create encrypted disk images and file volumes using AES 128-bit or 256-bit. If you have never encrypted files using Disk Utility and want to learn how to do it, click the link above.
  • 25. DSCRYPT • supports drag and drop and provides AES/Rijndael file encryption. The software features optimal implementation and safety measures. dsCrypt has Secure PassPad, brute-force password search resistance, and verified data/file processing.
  • 27. ENCRYPT4ALL (WINDOWS) • Encrypt4all is an application that implements a real bit-per bit data encryption. It lets you encrypt any kind of file and set a password for the archives. You can also encrypt files that are larger than 2GB.
  • 29. FREEOTFE • is an open source transparent disk encryption program that lets you create one or more “virtual disks” on PCs. FreeOTFE has support for Linux volumes, supports numerous hash (including SHA-512, RIPEMD-320 Tiger), and encryption algorithms (AES, Twofish, and Serpent) in several modes (CBC, LRW, and XTS).
  • 30. GNU PRIVACY GUARD (WINDOWS/MAC/LINUX)
  • 31. GNU PRIVACY GUARD (GNUPG) • is an open source version of the Pretty Good Privacy (PGP) encryption software. GNUpg lets you encrypt individual files and groups of files. GNUpg uses a command line interface, but there are several front-ends with easy-to-use GUIs. Below is an image of GnuPG Shell.
  • 33. TRUECRYPT • can create secure encrypted virtual disks or entire drives. The files can be encrypted on-the-fly so that they are decrypted as you access them and then encrypts again when you are done. TrueCrypt lets you create hidden volumes in encrypted volumes to make files even more secure.