Featured 

Encrypted Networks

Software
ProtonVPN
rating
3,644
ch.protonvpn
ProtonVPN is a client application that allows you to browse the web using a VPN...
of encryption ...encrypted tunnel. Besides, a kill switch feature automatically blocks network
Shimo
rating
676
ChungwaSoft
Shimo is a VPN client that allows you to establish an encrypted connection through...
you to establish an encrypted connection through...traffic. In relation to encryption, it is good
Lantern
rating
517
Lantern
Lantern can help you access blocked websites and services. It is actually a proxy, not a VPN service...
respect, Lantern can use encrypted HTTPS connections. Moreover
My IP Hide
rating
99
My-Proxy
My IP Hide is the client-end software of our encrypted proxy service. It can help you to unblock...
sites. It uses encrypted connections to bypass...proxy. It uses encrypted connections to unblock
SecurePhotoCloud
free rating
26
BerliTec GmbH
Secure Photo Cloud makes an encrypted backup of your photos...
Photo Cloud makes an encrypted backup of your photos
Slick VPN
rating
23
SlickVPN.com
Slick VPN offers fast encrypted services to surf anonymously and unblock...
Slick VPN offers fast encrypted services
NouveauPG
free rating
12
John Hill
NouveauPG is a PGP client that offers to protect confidential information from prying eyes. Therefore...
bears an exclusive encryption key that can...enable the encryption. Exporting the encrypted text can
SecretSync Manager
rating
11
Completelyprivatefiles
SecretSync - Turn cloud sync into a private, encrypted pipeline...
into a private, encrypted pipeline...possession without being encrypted first. SecretSync
CryptCloudViewer
free rating
11
lithium03
CryptCloudViewer is a cloud storage viewer that can play media files while keeping them encrypted...
files while keeping them encrypted. In addition, this app
Kremlin Decrypt
rating
8
KremlinEncrypt
Kremlin Decrypt allows you to decrypt the files you have encrypted. To use it...
the files you have encrypted. To use it, just...double-click on the encrypted .kgb file
TextCrypt
rating
8
SubRosaSoft Inc.
TextCrypt was created to help Mac users prevent unauthorized users from accessing...
uses a powerful encryption algorithm so it's...interface, the utility encrypts
UVa Network Setup Tool
free rating
7
University of Virginia
The Network Setup Tool enables UVa faculty, staff, and students to: - Access UVa's encrypted...
The Network Setup...Access UVa's encrypted cavalier wireless network. Log into NetBadge
DataGuard
rating
7
Franck Mereo
DataGuard allows you to create a password-protected and encrypted using AES128 bit or AES 256 key bits...
a password-protected and encrypted using AES128...application does not encrypt
myVault
rating
7
Steve Cholerton / Arten Science Limited
myVault is a Secure Encrypted Personal Information and Document Management...
is a Secure Encrypted Personal...your eyes only - encrypted but easily accessible ?
SME File Decryption App
free rating
6
Vehera LTD
This application enables client side decryption...
files that have been encrypted onto an underlying cloud
crowbarDISK
free rating
5
soyer egregor
crowbarDISK is a dictionary attack tool for encrypted disks on Macs. The application also supports filevault2...
a dictionary attack tool for encrypted disks on Macs
Kronolab
free rating
5
Kronolab Limited
Kronolab VPN Client creates an encrypted connection between your devices and your server. You can build small personal...
creates an encrypted connection...that supports storage encryption. You can access
CiM

CiM

free rating
1
DMTF
CIM provides a common definition of management information for systems, networks, applications and services...
information for systems, networks, applications and services...systems throughout the network. CIM
Polarbear (Beta)
free rating
1
Andre Weier
Polarbear lets you post messages to multiple social networks and blogs at once, including Twitter...
messages to multiple social networks and blogs at once
VPN Unlimited for Mac
rating Keepsolid Inc
In present-day reality, a VPN is a must because of the identity thieves...
disruptions. Whitelist trusted networks you consider secure...connect to networks that you consider