Generate and use passwords for TrueCrypt.
Build an entire document ecosystem in a digital manner - sign, send, track, archive, and manage.
Explore the application (k, n) Threshold Secret Sharing Scheme Utility.
Fix a vulnerability in Windows 2000 that could allow a malicious user to run code on an affected machine.
Lock your private documents, photos, videos, and other files from hackers, thieves, and prying eyes.
Protect and encrypt your media files.
Hide data into image - png, jpg, bmp.
Patch a vulnerability in PowerPoint that could allow arbitrary code to be executed on your computer.