Top 15 Img.bi Alternative and Similar Softwares | Jan 2017

Open source secure image hosting with client-side AES-256 encryption.

1. ImmediateCrypt

ImmediateCrypt is an utility for encryption and decryption of plain text messages with the AES-256 cipher.It is released under the GPLv3 license (full Java source available) and works under any Java-enabled environment (Windows, Linux and Mac OSX).......

2. east-tec SafeBit

east-tec SafeBit is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, keep them encrypted all the time, but still work with them just like you work with normal files. Data is......

3. eCryptfs

The enterprise cryptographic filesystem for Linux......

4. GoAnywhere OpenPGP Studio

GoAnywhere OpenPGP Studio™ is a free desktop tool that makes it easy to protect sensitive files using the popular Open PGP encryption standard. Documents can be encrypted, decrypted, signed and verified from your PC or workstation using this intuitive tool. An integrated key manager allows you to quickly create, import,......

5. TrueCrypt

[TrueCrypt is not exactly "Open Source", but the source is available. See the reviews to get......

6. EDS (Encrypted Data Store)

With EDS (Encrypted Data Store) you can store your files in the encrypted container to prevent unauthorized access to sensitive information. TrueCrypt container files are supported.Main features:* Supports AES, Serpent, Twofish encryption algorithms.* SHA-512, RIPEMD-160, Whirlpool hash algorithms.* Encrypt/decrypt any kind of file.* TrueCrypt compatible container files.* All the......

7. USBCrypt

Password protection and strong encryption of the external and internal drives, flash drives, backup drives, etc.......

8. iSteg

iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.......

9. AreaGuardNeo

AreaGuardNeo is file encryption and USB protection tool integrated with Microsoft Active Directory.......

10. oneshar.es

Sending confidential information such as passwords, account information and other sensitive data in emails and IM is not necessarily safe. That data is typically stored with remnants of the bits in places you don't need it to be.......

11. Cryptix

Cryptix is a complete solution to study cryptography, encoding and ciphers. Hide your datas, encrypt your texts and documents.Cryptix contains password generators, Mnemonic, .htpasswd generator, RSA 512 bits key generator, Wordlist generator and numerous security tools.......

12. SharkSSL

The SSL/TLS and Certificate tutorial for Windows enables you to fast track your understanding of the SSL/TLS protocol, Certificate Management, and secure communication. The download includes many C source code examples, including a secure WebSocket tutorial. You can either compile the examples "as is" or modify them to suite your......

13. ScramDisk for Linux - SD4L

SD4L is a suite of Linux tools and a graphical user interface (GUI) which allow the creation of, and access to ScramDisk encrypted container files. In particular, SD4L provides a Linux driver which enables mounting ScramDisk containers. ScramDisk for Linux also encrypts partitions on a hard disk or storage media......

14. Oubliette

A compact yet feature-full password manager.You can store a lot of information with each account: URL, Email, Category and even a memo where you can type unlimited text.A configurable password generator allows you to create strong passwords easily.The program uses Blowfish or IDEA for encryption.The program is not maintained anymore......

15. CryFS

CryFS encrypts your files, so you can safely store them anywhere. It works well together with cloud services like Dropbox, iCloud, OneDrive and others. The goal of CryFS is not only to keep file contents, but also file sizes, metadata and directory structure confidential.......