System administration
 » Storage management
 » » File encryption
Sections : System administration > Storage management > File encryption
Good visitors rating
Click to RATE : OneTwoThreeFourFive
Buy Free Touch Crypto for s60 E3 download

Touch Crypto for s60 E3 1.80

A smart and handy encryption tools to protect your private files on your mobile!

 

Advertisement

Touch Crypto for s60 E3 1.80 facilities

Vendor
Shangdi, Haidian district
100022 beijing
Vendor`s Webhttp://www.kenvast.com
Kenvast Software Inc. webshot
OSSymbian
LimitationsInstall and Uninstall
Actualizedmore than year ago
Downloads561
LocalizedEnglish
LicenseFree to try
SnapshotTouch Crypto for s60 E3 snapshot
Snapshot of Touch Crypto for s60 E3

Use this security logo:

100% SAFE logo

Touch Crypto for s60 E3 manufacturer description

Touch Crypto is the best encryption tools to protect your private files - photos, multimedias, audios, videos, songs, voice - all confidential documents on your mobile! It uses 128bits AES algorithm to encrypt your files. Without password, no one can access your encrypted data.

Just find your file, tap a button, encrypt it! The Safe File Index records and collects all your encrypted file indexes, by which you can process all your encrypted files in just the Safe File Index in a centralized way

Features:
- 128bits AES algorithm for file encryption
- Encrypt or decrypt files in batches
- All founction has shortcut, fast operation
- Safe File Index:
- Encrypt or Decrypt operation on a file in the folder view will add an index into - Safe File Index
- Encrypt and Decrypt operation on the index will encrypt and decrypt the original file
- Remove an index, which does not affect the original file
- Fast switch between the Safe File Index and the folder of the original file
- Fast accessed file browser: open file, remove file, browse file, select file
- Set specific password or use default password for each encryption/decryption operation
- Autolock application when system is inactive
- Show thumbnail for jpeg and gif picture

Touch Crypto for s60 E3 1.80 supports all S60 E3 mobiles, including Nokia N95, N93i, N93, N92, N91, N81, N82, N85, N86, N96, N80, N80i, N79, N78, N77, N76, N75, N79, N73, N71, N6790, N6760, N6730, N6720, N6710, N6780, N6700,N5730, N5630, N5320, N6124, N6650, N6290, N6210, N6220, N6290, N6121, N6120, N6110, N5700, N5710, N5500, N3250, C5, E90, E70, E71, E73, E71-3, E71-2, E71x, E72, E75, E66, E65, E63, E62, E61i, E61, E60, E55, E52, E51, E50, E5-00, E78, x5-01,Samsung i8510M INNOV8, SGH-G810, SGH-i400, SGH-i450, SGH-i520 (i520v), SGH-i550, SGH-i550w, SGH-i560, SGH-i7110, SGH-i8510 Innov8, LG KS10 (Joy), LG KT610
free download Touch Crypto for s60 E3 1.80QUICK DOWNLOAD
Free download Touch Crypto for s60 E3 1.80

Advertisement

Touch Crypto for s60 E3 video tutorials

Tutorial not found. Let know us about any useful video tutorial.

Touch Crypto for s60 E3 categories

data encryption, decrypt, file security, file protection, encrypted, decryption, file password, encryption key, file secure, encrypting, encrypt file, file encryption, encryption tool, software encryption, encryption software, AES

What is new in 1.80 changeinfo log

Can set new password now if the user forget the previous password by upgrading to 1.80, uninstalling it and then reinstalling.

Given stickers for Touch Crypto for s60 E3 & download buttons

NOTE: move cursor over buttons to get html sources.
Clean award
DownloadAtlas.com guarantees that Touch Crypto for s60 E3 was tested by antivirus program and is absolutely clean, which means it does not contain any form of malware, including computer viruses, adware, trojans, spyware, rootkits, badware and other malicious and unwanted software.
Report view
TouchCryptoE3.sisx - CLEAN
Get from DownaloadAtlas.com
Get from DownaloadAtlas.com
Do you like Touch Crypto for s60 E3 ? Move mouse cursor over the buttons and just copy one of those links, paste the code you copied right where you want on your blog or website.

Touch Crypto for s60 E3 permissions

SHAREWARE DISTRIBUTION. These additional terms apply to distribution of the unregistered

shareware version of the SOFTWARE.

DISTRIBUTION. The following may distribute the unregistered shareware version of the

SOFTWARE without further permission provided they convey a complete and unaltered shareware

version of the SOFTWARE and provided they make no claim to ownership of the SOFTWARE:

- Private individuals charging no fees.

- Members of Association of Shareware Professionals (ASP) and other shareware associations.

- Other bona fide shareware distributors and directories including FTP and WWW sites, BBSs,

user groups, mail-order disk vendors, CD-ROM publishers, file-distribution networks etc.

BUNDLING. In no case may the SOFTWARE be bundled with hardware or other non-shareware

software without prior written permission from Kenvast Software Inc.

VIRUSES. All distribution of the SOFTWARE is further restricted with regard to sources which

also distribute virus source code and related virus construction/creation materials. It is

unlawful to attach any virus to the SOFTWARE and the SOFTWARE may not be made available on

any site, CD-ROM, or with any package which makes available or contains viruses, virus

source code, virus construction programs, or virus creation material.

TRANSFERABILITY. Permission to distribute the SOFTWARE is not transferable, assignable,

saleable or franchisable. Each entity wishing to distribute the package must independently

satisfy the terms of the distribution license.

REVOKATION. Kenvast Software Inc may revoke any distribution permissions granted here, by

notifying you in writing. All rights not expressly granted here are reserved to Kenvast

Software Inc.

End user agreement for Touch Crypto for s60 E3

Please be advised:
This application allows you to modify and remove files on your device. These features could make your phone inoperable, or to lose important data, if they are used without care. Developer takes no responsibility for inoperable device resulting from use of this application.

This application is a shareware. You can use unregistered version for 15 days from the installation. After the 15 days' trial, the encryption function will not work.


Full license agreement follows:

This End User License Agreement("EULA") is a legal agreement between you(either an individual or a single entity) and Kenvast Software Inc ("DEVELOPER") the developer of Touch Crypto("SOFTWARE"). By installing, copying or otherwise using the SOFTWARE, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, the DEVELOPER is unwilling to license the SOFTWARE to you. In such event, you may not use or copy the SORTWARE and you should remove it from your device.

-LICENSE
DEVELOPER grants you, and you accept, a non-exclusive license to use the SOFTWARE on one mobile device according to the following terms:

-SOFTWARE LICENSE
The SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE is licensed, not sold. The SOFTWARE is licensed to single user on his/her single mobile device.


-GRANT OF LICENSE
You may make copies of the SOFTWARE only for backup and archival purposes.
You are expressly prohibited from sublicenseing, assigning, renting, loaning, copying, or otherwise transferring the SOFTWARE or documentation to anyone, except as specifically provided in this Agreement. You may not alter, modify, adapt, create a derivative work, merge, translate, decompile, disassemble, or reverse engineer the SOFTWARE. Any attempt to do any of the foregoing shall automatically terminate your license. This license and your right to use the SOFTWARE automatically terminate if you fail to comply with any provision of this license agreement. Upon termination you will destroy all documentation, disks, and working copies of the SOFTWARE.

-LIMITED WARRANTY
DEVELOPER warrants that the SOFTWARE will substantially conform to published specifications and to the documentation, provided it is used with compatible computer hardware and operationg systems.

EXCEPT AS SPECIFICALLY PROVIDED ABOVE, DEVELOPER MAKES NO OTHER WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH RESPECT TO THE SOFTWARE, DISKETTES OR DOCUMENTATION, INCLUDING THEIR QUALITY, MERCHANTABLILITY, OR FITNESS FOR A PARTICULAR PURPOSE. DEVELOPER DOES NOT WARRANT THAT THE SOFTWARE'S FUNCTIONS WILL MEET YOUR REQUIREMENTS OR THAT ITS OPERATION WILL BE UNINTERRUPTED OR ERROR FREE. IN NO EVENT WILL DEVELOPER OR ANYONE ELSE INVOLVED IN THE CREATION, PRODUCTION, OR DELIVERY OF THIS SOFTWARE BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF USE OR INABLILITY TO USE THE SOFTWARE OR DOCUMENTATION. EVEN IF DEVELOPER HAS BEEN ADVISED OF THE POSSIBILITY TO SUCH DAMAGES.

Developer is not responsible for any costs including, but not limited to, those incurred as a result of lost of profits or revenue, loss of time, data, or use of the software, the costs or recovering such software or data, the costs of substitute software, claims by third parties, or other similar costs. IN NO CASE WILL DEVELOPER LIABILITY EXCEED THE AMOUNT OF THE RETAIL LICENSE FEE.

THE WARRANTIES AND REMENDIES SET FORTH ABOVE ARE EXCLUSIVE AND IN LIEU OF ALL OTHERS, ORAL OR WRITTEN, EXPRESS OR IMPLIED.

The warranties provided give you specific legal rights. You may have other rights which vary from state to state. Some states do not allow the exclusion or limitation of implied warranties or of incidental or consequential damages, so some of the above may not apply to you.

-SUPPORT
DEVELLPER provides technical and customer support for this application through its website for up to two years from the date of purchase of this software. DEVELOPER offers to transfer license for free to user's new device, for time of up to two years after purchase, and maximally three times. After either conditin expires, purchased license is no more transferable to another device. The license transer is performed by Developer by issuing new unlock key and updating customer records associated with license purchase.

-GENERAL
This Agreement is the entire agreement between you and DEVELOPER relative to the SOFTWARE and supersededs all prior written statements, proposals or agreements relative to its subject matter. DEVELOPER owns all title to the SOFTWARE and documentation, all rights not expressly granted are retained, and no rights under federal copyright or other applicable laws are waived.