AB File Encryptor Icon

Download AB File Encryptor

It allows you to securily encrypt any file with sensitive data.

Download

File Name:
abfe.zip
Primary URL:
Click to download abfe.zip (recommended)
Size:
2002 Kb
Product Info

A small utility that allows you to encrypt securily any file with sensitive data. Once the file is encrypted, he cannot be decrypted with any other tool. You can encrypt one or more files or a directory with all the files contained with just one mouse click.
Please contact AB File Encryptor publisher, geocities.com/win_macro if you have questions or issues regarding this product.
Share Download AB File Encryptor, geocities.com/win_macro Page  Share
Page URL: 

Exclusive Giveaway for Softarea51.com users
Featured downloads
Ad-Aware 2008 Free Review The bottom line: Ad-Aware is your best option for keeping spyware and adware under control on your PC
Adobe Flash Player Review Flash Player is a cross-platform browser plug-in that delivers breakthrough Web experiences to over 98% of Internet users
Google Talk Review Google Talk is a simple and free way to talk with and send instant messages to your friends.
Popular downloads in System Maintenance
PC CMOS Cleaner 2.4 PC CMOS Cleaner 2.4
100% PC CMOS Cleaner is a tool to recover, delete, decode and display the superior passwords stored in BIO. Most types of BIOS are supported. It's an bootable CD that runs on x86 and x86_64 computers. No need to pay expensive fees to experts.
Signature Creator Signature Creator
Signature Creator allows you build your own email signatures with a logo, formatted text, hyperlinks and an handwritten signature above it in few seconds. Use the signatures to accent your individuality in your emails and web sites!
TinySOF DataFileJoinCutter TinySOF DataFileJoinCutter
Cut large file(DVD/VCD/Movie/Video..) into smaller pieces and later reassemble them back to original
Remote Password Stealer Remote Password Stealer
Remote Password Stealer is a special tool to track all the password-input events in the windows system. The main purpose is to:Find password that you have forgotten.
Heavyload Heavyload
HeavyLoad is a benchmark tool that stresses all resources of a PC (like CPU, GPU, RAM, hard disk, operating system, etc.).
Free Undetectable Keylogger Free Undetectable Keylogger
Free Undetectable Keylogger is an easy-to-use monitoring tool. It allows you to investigate everything that happens on your PC. The program works on all Windows systems.
Xp Tweak Mechanic Xp Tweak Mechanic
XP Tweak Mechanic is the best tools designed to improve the performance of your windows XP operating system by speeding up the startup process and making the process of shutdown faster.his powerful software includes a lot of features.
PC Booster PC Booster
Boost your PC, because it will run better than new!
Universal Programmer Analyser-UPA Universal Programmer Analyser-UPA
4 CHANNELS ANALYSER, HEX EDITOR, I2C & Microwire Monitor, EMULATOR, SCRIPT EDITOR, PROGRAMMER:24c01-24c512, 93c46-86, 25c080-640, 7002, 77007/5, sde2506, 68HC05/11, TC89101/2, X2400/44/30, PIC12C508/9, PIC12C518/9, PIC16F84/83/877 and more...
Related Press Releases
Encrypt Fox v1.00 - Security & Privacy::Encryption Tools Software
EncryptFox.com Inc. announced Encrypt Fox. Encrypt Fox software converts YOUR USB flash drive into your personal vault and the key to access and LOCK your private files. EncryptFox software is the most advanced portable security application available on the market today. EncryptFox turns your in-hand serial numbered USB flash drive into an encrypted vault. Encrypt Fox gives you the ability...
Encrypt PDF Program v2.3.8.2 - Security & Privacy::Encryption Tools Software
PDF Encrypt has announced Encrypt PDF Program. Encrypt PDF program support two passwords apply to PDF. The first is the user password to restrict open a PDF file. The second is owner password to disable all restriction of PDF file such as copy, edit, form fill, modify, content, comment, signing, extract, annotations, assemble, content for accessibility. PDF prevents unauthorized distribution...
LetEncrypt - Encrypt your text file with unlimited ways!
Encrypt your text files with unlimited high levels ofencryption algorithms.- LetEncrypt shows you the level of encryption through a security meter.- Encrypt your text file by using unlimited ways.- Import/Export your encryption settings.- 2 main systems of encryption, ASCII and Numeric encryption.Homepage:http:// www.infradrive.com/letencrypt. phpDownload:http://www.infr...
Secure Disk - encryption Software
Secure Disk provides the ultimate security standard forencryption at the physical sector level. Based on the most secure technology,AES256, this product is an outstanding data security tool. Another great feature is the support of flash media and USB hard disk drives, sothat no one will be able to access your data if you lose it.AES256 used for data encoding is considered to be one of the most...
Swap it! Encrypt it! - The Internet's Newest File Transfer Company
The recently launched Swap it! Encrypt it! file transfer service offers users an inexpensive, no membership way to send large files, and Swap it! Encrypt it! Lite is a great way to send small files (up to 25MB) for free! March 23, 2009 Swap it! Encrypt it!, the internet's newest file transfer company, delivers users an unparalleled file transfer service at prices so low it...
Secure IT Easy-to-use Strong Encryption Software
Cypherix announces the release of SecureIT, the 448 bit, easyto use encryption software.Secure IT is a state-of-the-art comprehensive file and folder encryption software.Secure IT is based on the cryptographically secure Blowfish algorithm (448bit). SIT includes a secure e-mail module, that allows you to e-mail data to toother users using existing infrastructure. Secure IT alsooffers a very...
Related software and technology conferences
Data Visualization for Discovery and Analysis: Simple Graphing Techniques for Analyzing Quantitative Business Data
Probably as much as 90% of all Business data analysis can be done using simple graphing techniques to discern meaningful Patterns in the data. Plenty of existing resources already teach the skills and practices involved in doing sophisticated statistical and financial analysis to support the mere 10% of Business data analysis that requires those specialized skills, but where are the resources...
2011 The 2nd International Conference on Data Storage and Data Engineering
2011 The 2nd International Conference on Data Storage and Data Engineering (DSDE 2011) will be held in Xi'an, China during May 13-15, 2011. The aim objective of DSDE 2011 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Data Storage and Engineering. This...
Enterprise Data Governance and Master Data Management
This seminar is designed to help companies formally define and manage their data. It explores the whole area of Enterprise Data Management including how to establish an Enterprise Data Architecture, Data Integration and Master Data Management technologies and opening up access to information by enabling Information As A Services (IAAS) that can be consumed by Portals, processes and...
Enterprise Data Governance and Master Data Management
This seminar is designed to help companies formally define and manage their data. It explores the whole area of Enterprise Data Management including how to establish an Enterprise Data Architecture, Data Integration and Master Data Management technologies and opening up access to information by enabling Information As A Services (IAAS) that can be consumed by Portals, processes and...
Big Data and Data Science in the Intelligence Community
SMi Group is pleased to invite you to our timely, full-day masterclass.  The masterclass focuses on the potential of Big Data and Data Science, which is now widely recognised as a ‘key differentiator’ in assisting with improvement of security and intelligence. The session will incorporate theoretical and practical examples to demonstrate how to gain the best advantage from opportunities...
Data Governance Conference Europe 2013 & Master Data Management Summit Europe 2013
• 2 co-located conferences on MDM and Data Governance • Choose from about 40 conference presentations and 8 pre-conference tutorials • Take an inside look at the successes and challenges behind real-world MDM and Data Governance Implemenations • Discuss your MDM and Data Governance challenges with the world’s leading solution providers