Absolute Securit is almost real - look SafE Mail_ SafE Mail_ proprietary encryption and decryption of data, including virtually any kind of computer generated information: text, executable files, databases, spreadsheets, pictures, audio, video, or any other kind of ASCII or binary files
Advanced Perfect Secure Products Perfect Secure Encryption Software, Onetimepad (E-Mail)
Aliroo - Total Document Security Aliroo Ltd. is a software system house dedicated to document security. The company develops, produces and markets products for privacy, security and copyright protection in documents through encryption technology, covering E-mail, Internet file transfer,
Alpinesnow.Com Password Recovery Software and Spying Tools Download free demos of key recorders, password recovery software for decoding pwl files, ms Access, aim, Windows screen saver password, or unmask passwords.
Babylon Interconnect Babylon encrypts all your ISDN traffic with DES. Secure communication for phones, faxes, data transmission. Interoperable with other BABYLON Encryptors.
CipherSaber Fight the crypto ban by learning how to build your own strong encryption program. It's easy!
Click Here to become an International Arms Trafficker Now with just a click of your mouse you can become an Arms Trafficker! This web page lets you export a 3 line encryption program by just clicking a button. A user can optionally check a box to be added to a list of 'Known Arms Traffickers'.
Communication Devices Inc. Manufacturer of data security products including portable encryption modems and secure remote access tokens.
Communications Security using encryption for voice, fax and data General information on encryption. Specific information on CES technologies. Specific information on SignalGuard encryption products, including voice, fax and data encryptors.
Crypto Leader in Total Information Security: Crypto AG offers a comprehensive range of solutions for top notch requirements in securing information. Our challange is to meet the highest security demands and quality standards of our customersZurfluh Reinhold
CyberToken Network Security Model Defines the CyberToken security model which is an augmentation to current encryption. The process removes the current exposure problems with encryption.
D-M Information Systems, Inc. Litigation support company specializing in document coding for big document cases. We design coded databases for litigation. We also scan and OCR documents.
DataSAFE encryption software by NovaStor Encryption software to protect your data. Keep your personal files and business files confidential and private by locking them in electronic data safes. Looks and acts like a real safe!
DataSAFE encryption software by NovaStor for Windows 95/98/NT Data encryption software that looks, acts, sounds and feels like a real combination safe, enabling users to lock their data and protect the confidentiality of their information. DataSAFE uses BLOWFISH, an encryption algorithm that has never been broken.
DEMcom - Deus Ex Machina online Deus Ex Machina Communications provides support and the currentversions of their products, UFO 96 and Steganos.
Developer of data encryption algorithms and software. PAONET Software Inc. specializes in developing data encryption algorithms and software applications. We are pleased to announce theoffering of the LFP Object Key data encryptionalgorithm and software application for commercialand private use.
Digital Delivery, Inc. -- Secure Software and Information Distribution Digital Delivery provides powerful encryption tools and technologies for secure software/information distribution and electronic commerce.
Email security and protection with tough encryption. PC-ENCRYPT is a compact, easy to use, program that will compress and encrypt any type of file used in Windows95/98/NT. The highest level of protection is provided through the use of the proven Blowfish algorithm - one of the strongest encryp
Enkryptonator Enkryptonator is a newly developed encryption system based on the principles of homonymous key cryptography invented by Enkryptonator Co. Homonymous key systems are an exciting, new breakthrough, that solve the 'key management' problem without resorti
Entrust Technologies: Orchestrating Enterprise Security The Entrust family of public-key cryptography products provides encryption, digital signature and automated key management for tens of thousands of users and beyond.