Iside compares files and folders by computing their hash code (MD5,SHA1,...). Right click on a file, select Copy and by right clicking on another file you will discover if they are equal. Includes file comparison, hash displaying tool plus a complete folder comparison tool. The hash functions can determine if two files are different even if their size is the same. Ideal tool for configuration managers, programmers, deployers.
Definitively erase and destroy any Windows folder or file using low level overwrite and standard procedures such as US Department of Defense DOD 5220.22-M (5 overwrites ) or Gutmann (32 overwrites). With NShred you can eliminate confidential information and data from PC drives. Name, size, and contents of erased file can never be recovered, by any software or hardware means. Unused disk space may be shredded, too.
With Folder Crypt you can password protect any Windows file or folder using low level encryption and standard algorithms, such as DES, Rijndael and Blowfish with keys up to 2048 bits. The program performs a true bit per bit encryption of your data. Original files and folders may be shredded. The encryption process is not reversibile. Easy to use with its improved shell integration. Full international characters support.
This text based encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications. NCrypt TX also has Steganography capabilities on random generated text. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. Convert your text messages into a sequence of encrypted hexadecimal or Base64 characters.
Paloma, the password repository, provides rock solid passwords protection with no underground unknown processes and absolutely no interference with other programs. Easy to use with its "bookmarks like" tree passwords organization. The password database can be encrypted with keys up to 2048 bits and DES, 3DES, AES-Rijndael, Blowfish and ARC4 algorithms.
Print this page
- ZIP File
- Worm
- Virus
- Variant
- VBS
- TSR
- Sniffer
- Scanner
- SMTP
- Redirect
- RTF File
- Payload
- PGP
- NTFS
- Mutant
- Malware
- Macro
- MS-DOS
- MP3 File
- MBR
- Key
- Host
- Hole
- Firewall
- FAT
- EXE file
- Dropper
- DOS
- Cookie
- Checksum
- Boot
- Backup
- BIOS