Editor's choice |
retreive file
File Undelete program restores lost text files from inaccessible hard disk drive
TimeBackup
TimeBackup. Protect your data!
WinLock 4.0
Tough, easy, inexpensive security for Windows95/98. Keep unautorized users o...
Free Recovery.
Get back corrupted images, video, songs, audio and text files from storage media
Retrieve Hotmail Password
Email hacking software break your hotmail or MSN account passwords
NSS File Recovery Tool
NSS File Recovery software to get back nss files from corrupt nss volumes.
Outlook Password Restore
Best free OE password recovery utility retrieve forgotten email account password
|
|
Encryption software tools, free encryption tools, file, email and any data encryption utilities, hard drive encryption, freeware and shareware for data protection.
|
Whitenoise Strong Encryptor
|
|
Download
|
Buy now!
|
View screenshots
|
License: Freeware
File Size: 36.56 Mb
Version: 3.0
Release Date:
12 Dec 2016
OS: Win2000, WinXP, Win7 x32, Win7 x64, Windows 8, Windows 10, WinServer, WinOther, WinVista, WinVista x64
System Requirements:
Windows
Company: Whitenoise Laboratories Canada Inc.
|
Autonomous Privacy Project -
The only one that can insure your privacy is you.
One simple application lets you secure your own files with strong Whitenoise encryption. Whitenoise technologies are patented globally including Canada, US, China, India and the European Union.
Protect data from hackers. Save important data with strong encryption. Send safely by email. Store files securely. Upload secure files to the cloud. You control your own private key with pass phrases. Service providers do not have copies.
Make the key unique and private by choosing two pass phrases. These pass phrases perturb the application key schedule (>25, 000 bits) as subkeys. Use different pass phrases with different people or files.
When passwords are used with existing technology the strength of the resulting perturbed key is weakened to the strength of the password because of a multiplicative process.
With Whitenoise, client passphrases are converted to prime number binary equivalents and become subkeys to make the generic key schedule unique to the user and their private secret.
The generic key schedule is comprised of 10 subkeys. When additional subkeys derived from your pass phrases are added this actually makes your unique client private key stronger. This secret is specific to this unique file encryption. Different pass phrases can be used in different contexts. No one else in the world knows what your private super key is. (See the following presentation to learn how Whitenoise
keys are made.)
http://www.wnlabs.com/pdf/How_is_a_key_made.pdf
http://www.wnlabs.com/products/emailenc.php
|
More to download:
Hotspot Shield
Public wi-fi hotspots are not secure and your computer and communications vulnerable to hackers and security breaches. Hotspot Shield gives you a simple solution to maintain your anonymity and protect your privacy when accessing free wi-fi hotspots.
Restrict Pdf Printing Editing Copying
Pdf encrypt tool provides strong RC4 and AES 40 bit as well as 128 bit encryption security to lock pdf editing, printing and copying. Pdf encryption software restrict pdf features and set user and owner password on bulk pdf documents.
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|