Encryption (174 programs)
Pros: Provides file and text encryption functions. Includes public and private key loading tools. Supports direct output display for processed text. Uses a single-window layout for all operations.
Cons: Does not include multi-window or tab-based structure.
Cons: Doesn't integrate with Explorer.
Pros: Can recover encrypted drives. Simple interface.
Cons: May not work. Crashes sometimes.
Pros: Open-source. Offers license: GNU. Boots system partitions. User-friendly interface. Encrypts disks with ISO images. Functions with external and internal drives.
Cons: Limited in-app help resources.
Pros: Password protected. Portable application. Keeps files hidden. Locked USB is still usable.
Cons: Does not automatically lock your USB after usage. Plain and simple interface.
Pros: Provides a great deal of functionality given that it is a freely available app. Helpful part of a security regime for things like corporate laptop inspections. Works with all types of PCs.
Cons: No graphical user interface.
Pros: Simple and easy to understand. Neat interface. Password protected. Hides files from view.
Cons: Password cannot be changed. Not portable. No hotkeys. No help files included.
Pros: 3 types of protection. Simple and neat interface. Keeps files hidden from other users. Easy to understand.
Cons: May be confusing for first time users.
Pros: Discard iOS device passcode. Remove Apple ID. Bypass Screen Time. Process is streamlined in three simple steps.
Cons: Free version is extremely limited in capabilities.
Pros: Can be launched from context menu. Several encrypting methods to choose from.
Cons: Self-extracting files don't seem to work properly.
Pros: Hide important files. Assign personal password to folders. Prevent data compromise. Compatible with Windows XP and beyond.
Cons: May not absolutely encrypt files. Requires strong level of password for setup. More features available at upgraded version. Minimal functionality.
Pros: User-friendly interface. Can encrypt and decrypt your files. Can generate and compare checksums. Supports various algorithms.
Cons: Does not allow users to set a master password for all encryptions.