CipherShed
CipherShed is a program that can be used to create encrypted files or encrypt entire drives…
20 Alternatives To CipherShed
AES Crypt
AES Crypt is an advanced file encryption utility that integrates with the Windows shell or runs from the Linux command prompt to provide a simple, yet powerful, tool for encrypting files using the Advanced Encryption Standard (AES).
Apple Disk Utility
Disk Utility is a system utility for performing disk and disk volume-related tasks on the macOS operating system by Apple
Axcrypt
We have a newer web site! Visit axcrypt. net instead! AxCrypt - Password Protect Files With Strong Encryption. AxCrypt is the leading open source file encryption software for Windows.
BoxCryptor
Boxcryptor encrypts your sensitive files before uploading them to cloud storage services like Dropbox, Google Drive, Microsoft OneDrive, Box and many others.
Cryptomator
When it comes to saving your files on a cloud server, it is important to ensure the security of those files. Keeping your delicate files out of the wrong hands can save you a lot of time and hassle.
DiskCryptor
DiskCryptor is the only truly free solution, provided under GNU General Public License (GPLv3)…
FileVault
FileVault is a method of using encryption with volumes on Mac computers.
GPG4Win
GPG4Win is an encryption program for files and emails. The program encrypts emails and files so that they can only be read by those intended to receive them.
Kryptel
Kryptel is file encryption program designed for nontoxic defense of sensitive knowledge.
Tor
The Tor Project’s free software protects your privacy online. Site blocked? Email [mailto:[email protected]] for help downloading Tor Browser.
VeraCrypt
When you need to know that your information is secure, VeraCrypt offers an added layer of protection. Their encrypting process keeps your files and data safe from prying eyes.
Vormetric Transparent Encryption
Vormetric Transparent Encryption allows safe and secure information encryption, authorized person access control and the gathering of security intelligence logs without re-engineering functions, databases or infrastructure.
Windows BitLocker
This topic provides a high-level overview of BitLocker, including a list of system requirements, practical applications, and deprecated features.