software:encryption
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| software:encryption [2012/06/14 01:24] – [kruptos2] superwizard | software:encryption [2017/11/03 22:56] (current) – superwizard | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== 7 TrueCrypt Alternatives By Krati Dubey Aug 28, 2013 ====== | ||
| + | |||
| + | From: http:// | ||
| + | |||
| + | ====== VeraCrypt ====== | ||
| + | |||
| + | From: https:// | ||
| + | |||
| + | Also: https:// | ||
| + | |||
| + | HowTo: https:// | ||
| + | |||
| + | VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. | ||
| + | VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format | ||
| + | |||
| + | |||
| + | ====== ciphershed ====== | ||
| + | |||
| + | From: Forked to CipherShed: https:// | ||
| + | |||
| + | Last release 2016 | ||
| + | CipherShed is free (as in free-of-charge and free-speech) encryption software for keeping your | ||
| + | data secure and private. It started as a fork of the now-discontinued TrueCrypt Project. Learn | ||
| + | more about how CipherShed works and the project behind it. | ||
| + | |||
| + | |||
| ====== Folder Lock 7 ====== | ====== Folder Lock 7 ====== | ||
| Line 37: | Line 63: | ||
| ====== truecrypt ====== | ====== truecrypt ====== | ||
| + | |||
| + | Forked to cipherShed: https:// | ||
| http:// | http:// | ||
| Line 70: | Line 98: | ||
| Even the world' | Even the world' | ||
| With " | With " | ||
| + | |||
| + | ====== LURKS ====== | ||
| + | |||
| + | From: https:// | ||
| + | |||
| + | |||
| + | Cryptsetup is utility used to conveniently setup disk encryption based | ||
| + | on DMCrypt kernel module. | ||
| + | |||
| + | These include plain dm-crypt volumes, LUKS volumes, loop-AES | ||
| + | and TrueCrypt (including VeraCrypt extension) format. | ||
| + | |||
| + | Project also includes veritysetup utility used to conveniently setup | ||
| + | DMVerity block integrity checking kernel module | ||
| + | and, since version 2.0, integritysetup to setup | ||
| + | DMIntegrity block integrity kernel module. | ||
| + | |||
| + | |||
| + | LUKS Design | ||
| + | |||
| + | LUKS is the standard for Linux hard disk encryption. By providing a standard on-disk-format, | ||
| + | only facilitate compatibility among distributions, | ||
| + | In contrast to existing solution, LUKS stores all setup necessary setup information in the partition header, | ||
| + | enabling the user to transport or migrate his data seamlessly. | ||
| + | ====== cryptoforge ====== | ||
| + | |||
| + | http:// | ||
| + | |||
| + | The command-line interface allows quick integration into automated processes, scripts and other systems, providing both interactive and non-interactive server running modes. Complementing the command line interface, a built-in visual tool allows you to build command-line parameters without having to learn the syntax for these parameters. | ||
| + | |||
| + | The file encryption module enables you to encrypt, decrypt, and shred -with the built-in file shredder- files of any type, as well as entire folders and drives, from within Windows Explorer or My Computer with right-click ease. The file encryption module handles files of any type and size, on any kind of medium, like hard drives, removable drives, USB PenDrives, tape drives, network drives, etcetera. | ||
| + | |||
| + | ====== My Lockbox ====== | ||
| + | |||
| + | http:// | ||
| + | |||
| + | Freeware version | ||
| + | |||
| + | enables you to hide, lock and password protect almost any folder on your computer. You can use My Lockbox to hide your private data from prying eyes - your files will be not accessible both from local and remote users. | ||
| + | |||
| + | ====== LocK-A-FoLdeR ====== | ||
| + | |||
| + | |||
| + | http:// | ||
| + | |||
| + | is a lightweight and easy to use program that allows you to hide and lock up any folders on your computer, making them invisible and inaccessible to anyone but yourself. After you create a master password, simply select the folder(s) you want to hide and click a button to make them disappear. To unlock a folder, enter your password and select the folder that you want to unlock. | ||
| + | |||
| + | ====== Masker ====== | ||
| + | |||
| + | http:// | ||
| + | |||
| + | Masker is a program that encrypts your files so that a password is needed to open them, and then it hides files and folders inside of carrier files, such as image files, video, program or sound files. The strong encryption up to 448-bit and password protection makes the hidden data inaccessible for unauthorized users! Only you using your password are able to open and extract your hidden files. You can hide any files, and even whole folders with sub-folders! The carrier file will remain fully functional! Images can be viewed, sounds can be played and videos can be displayed on the monitor. You can transfer the carrier file through the internet and the hidden files inside will be transfered simultaneously with the carrier file, because they are the part of the carrier file. Use Masker to keep you sensitive secret files secure hidden and super-protected! | ||
| + | |||
| + | |||
| + | ====== WinGuard Pro 2012 ====== | ||
| + | |||
| + | |||
| + | http:// | ||
| + | |||
| + | Feature | ||
| + | Built-in programs: around 20 common programs built-in for locking | ||
| + | Lock Programs, Applications, | ||
| + | Encrypt Files and Folders 128 bit AEs | ||
| + | Password Lock Web Browser, inc. Internet Explorer, Chrome and FireFox | ||
| + | Screen blank in emergencies, | ||
| + | Lock more features, like; Desktop, Windows Explorer, My Computer, Internet Access and Downloading and more | ||
| + | |||
| + | |||
| + | ====== Encrypted Notes ====== | ||
| + | |||
| + | opensource | ||
| + | |||
| + | encrypted notepad | ||
| + | |||
| + | Encrypted Notes is a very simple to use application providing state of the art industrial-strength encryption to users who want nothing more than to store sensitive information in text documents. Users can be completely at ease in the security provided by Encrypted Notes because it follows best practices in dealing with encryption algorithms and does not try to do anything that is not standard procedure. This is important because "being too clever" | ||
| + | |||
| + | ====== Cryptzone’s free encryption ====== | ||
| + | |||
| + | http:// | ||
| + | |||
| + | |||
| + | Cryptzone’s free encryption solution combines secure encryption of USB flash drives, email encryption and file & folder encryption in one, free solution. Based on Cryptzone’s advanced encryption solutions Secured eUSB, Secured eMail and Secured eFile, this free encryption product delivers high levels of security with ease of use. it does not require new servers or other upgrades to existing infrastructure. | ||
| + | |||
| + | ====== SteadyCrypt ====== | ||
| + | |||
| + | http:// | ||
| + | |||
| + | " | ||
| + | |||
| + | |||
| + | ====== Espionage ====== | ||
| + | |||
| + | http:// | ||
| + | |||
| + | Espionage is the most advanced encryption solution for Mac OS X, yet easiest to use | ||
| + | |||
| + | Protect Individual Folders | ||
| + | |||
| + | Until now it has been surprisingly difficult to password protect a folder on Mac OS X. Now, Espionage is here to solve that problem for good. By encrypting only what is necessary, Espionage lets you stay secure while avoiding the penalties of encrypting too much. | ||
| + | |||
| + | |||
| + | ====== DiskCryptor ====== | ||
| + | |||
| + | From: https:// | ||
| + | |||
| + | |||
| + | 1.1.846.118 Stable 09.07.2014 | ||
| + | |||
software/encryption.1339637067.txt.gz · Last modified: by superwizard
