This gives you access to unbreakable OTP encryption. You can encrypt to and from files or directly to the clipboard. Paste cipher-text directly into text documents. Generate real random keys with no more than a radio and a sound card.
If you own a web site with imporant information, this software is the only product available today (to the best of our knowledge) that can secure your data from spidering programs. This software is easy to use with Microsoft IIS server.
SSH Tunnel Client allows to connect to different SSH-Servers. With the SSH Tunnel Client it is possible to connect each TCP/IP Service over a secure SSH-Tunnel. Supports local and remote forwarding with SSH1 and SSH2.
Stealth Files hides any type of file in almost any other type of file. This is called steganography. This is a way of encrypting data so that it is hard to find. You can not decrypt something unless you know what to decrypt...
Storm allows you to hide your confidential files and compressed folders in regular JPEG picture files. Your information is encrypted and hidden inside the JPEG file without affecting the picture's appearance, quality or dimensions.
Strong File Encryption / Decryption: encryption allows you easily and quickly to encrypt and decrypt files selected for upload and/or download using the latest industry standard strong encryption algorithms (AES known as Rijndael, Twofish, RSA,..).
SuperEncryptor is a powerful professional encryption tool with a nice and friendly interface. Tt provides the safest way to store your information or sensitive data and protect them against malicious or unintended intrusions.
SuperKeylogger is professional yet very easy to use key logging software for big and small companies, network administrators, concerned parents and PC owners.
SuperStorm allows you to hide your confidential files and folders in a wide variety of media files such as pictures, audio, video, executable programs among many other file types.