Software for Internet and Computer Security
Copysafe PDF Protector

Copysafe PDF Protector

CopySafe PDF provides the most secure copy protection for eBook and PDF documents with the option of preventing sharing and expiry by hours or days from first use. Ideal for secure distribution by email, download, CD or displayed on your web page.

PDF Anti-Copy

PDF Anti-Copy

PDF Anti-Copy is a free PDF security utility that prevents PDF content from copying and ing to editable formats. After processed by this tool, your important PDF content could be viewed, but will never be copied and ed to editable files

PDF Page Lock

PDF Page Lock

PDF Page Lock enables users to lock or hide selected pages of a PDF document with a password encryption. With PDF Page Lock, users could hide or lock selected pages of a PDF file while leaving all other pages available.

PDF Postman

PDF Postman

With PDF Postman, you can send secure Outlook email messages in a manner that is easy for recipients to receive on any device. The PDF Postman add-in uses the strong AES-256 bit encryption in the PDF specification. Try it free for 15 days!

pfEncryptor

pfEncryptor

Provides interactive UI for defining and managing encryption tasks. Supports AES, TripleDES, and DES encryption standards. Can encrypt either files or standalone strings. Encryptions can either be to binary or base64 Text encoding.

pfPgpEncryptor

pfPgpEncryptor

Provides interactive UI for defining and managing PGP encryption tasks. Supports a wide range of cipher, hash and compression standards. Can encrypt either files or standalone text. Encryptions can either be to binary or Armored text.

Secure Doc

Secure Doc

The *Secure Doc* product s general documents to secure documents. This secure document can have policies such as expiration date and expiration count, output control, and so on. Administrators can also control this secure document remotely.

 

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .