Confidential Free Edition 1.0 freeware

... to 10 million characters and 100 megapixels for images with Silver and Gold Edition) is encrypted using the AES-256 bit algorithm before being hidden in an image. Once the image is sent to the web, the only way to decrypt the data it hides is to have an ID key ...

Author Eagle-Soft
Released 2018-05-17
Filesize 16.11 MB
Downloads 177
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords Security, encryption, Communication, confidentiality
Users' rating
(6 rating)
Confidential Free EditionEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Confidential Free Edition - hidden in image Freeware Download Notice

Confidential Free Edition Free Download - we do not host any Confidential Free Edition torrent files or links of Confidential Free Edition on rapidshare.com, depositfiles.com, megaupload.com etc. All Confidential Free Edition download links are direct Confidential Free Edition download from publisher site or their selected mirrors.

Confidential Free Edition freeware - The Latest User Reviews
Confidential Free Edition freeware - The Latest Versions History
1.0 May 17, 2018 New Release

Most popular Encryption Tools freeware downloads

SteganographX Plus

2.0 freeware download

... you to hide a text inside a bitmap image, the text will not be visible and the changes to the bitmap image will not be noticeable in BMP's with 16, ...

5 freeware award

Plain Sight

1.0 freeware download

... functional, for example, if you hide inside an image, the image still opens, prints, and looks the same. The ... with your password are needed to extract the hidden data. It is extreamly difficult for someone ...

Confidential Free Edition

1.0 freeware download

... the world. It allows you to hide an image and/or text within a visible image. Confidential uses the AES-256 bits encryption algorithm as ... other security measures. Moreover, the presence of the hidden data is undetectable. Confidential can be executed from ...