Free File Encryption Software Mac Os X

By Gina Barrow, Last updated: April 24, 2020

Encryption is the safest and best way to protect data as it encodes a certain file or information in such a way that only authorized users or those with passwords can access. Information including bank details, sensitive personal records should be encrypted to avoid data theft.

Computer operating systems have built-in encryption features but these provide easy to medium form of security and still prone to expert hackers. You need to invest in encryption software if it is a requirement for your type of usage. Here are the top 5 best encryption software for Macin 2020. Check out which one works for your needs.

Part 1. Why Need to Encrypt Mac Files?

All vital files stored inside a computer including Mac need to be encrypted for security purposes. If you happen to hear, watch, and read the news, there are reported cases of stolen identities and bank information due to unsecured files saved inside people’s stolen laptops and computers.

To avoid such hassle, you can rely on encryption software for Mac but the main concern here is what the best software to use is.

A kind of Tomb porting on Mac OS X. MacTomb is a free and open source system for file encryption on Mac OS X, facilitating the backup of secret files through encrypted storage containers. MacTomb shares most concepts with Tomb, that is, it can be considered its little brother. Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux. Enigmail It enables you to write and receive email messages signed and/or encrypted with the OpenPGP standard.

A free, open source program that allows for disk encryption, with an easy to use interface. File encryption software for users of Mac OS X 10.3 and later editions of this operating system. Secure browsing tool that tunnels your traffic through distant servers. Download Encrypt Files Lite 3.1 for Mac from our website for free. The actual developer of this free software for Mac is GoodLuck technology team. This free software is compatible with Mac OS X 10.6 or later. The software lies within Security Tools, more precisely Personal Security. Our antivirus analysis shows that this Mac download is clean. A kind of Tomb porting on Mac OS X. MacTomb is a free and open source system for file encryption on Mac OS X, facilitating the backup of secret files through encrypted storage containers. MacTomb shares most concepts with Tomb, that is, it can be considered its little brother.

Part 2. Apple’s Encryption Software for Mac for free

If you are concerned about data privacy and your Mac contains sensitive information that must be kept personal, then you should use encryption. Apple has its own encryption software that users can utilize for free. There are actually different ways on how to encrypt files on Mac.

Encryption via Disk Utility

  1. Use the spotlight search and type in Disk Utility. You can also go to Utilities under Applications.
  2. Go to File on the topmost tools and hover to New Image then click on Image from Folder
  3. Select the folder you wish to encrypt from the newly popped-up window
  4. Rename the file you want to encrypt and go to the bottom part where you can set the encryption settings
  5. You can choose between the 128 and the 256-bit. (The higher the encryption the better but it takes slower time to complete request)
  6. Once you have selected your encryption method, you need to provide and verify your password. (Note: Remember your password because it will never grant you access to the given folder until the correct password is supplied). Click Choose.
  7. For the Image format, you can choose compressed.
  8. Wait until the encryption is completed.

This type of encryption affects the folder and its file contents so anytime you wish to open the folder and the files inside, you need to provide the password.

  1. You can now see a new Archive folder on the desktop which was the same file you encrypted
  2. You can delete the old folder to remove any access to it

People Also ReadHow to Clean up A MacHow Do You Speed Up Your Mac?

Use FileVault

FileVault is full-disk encryption that uses XTS-AES-128 encryption with a 256-bit key to preventing unauthorized access to your personal information on the startup disk. Basically, you won’t be able to go through Mac unless you provide the password.

The FileVault2 is available in OS X Lion and later versions. All you need to take advantage of this feature is to turn on FileVault in your Mac. Here’s how:

  1. Go to Security & Privacy under System Preferences
  2. Click the FileVault tab and click on the lock icon
  3. Enter the administration username and password
  4. Turn on FileVault

If you are using multiple users on Mac, you can enable each user and type in their assigned password.

Print to PDF

Another file encryption method in Mac is the Print to PDF wherein you can do the security lock on the print window itself after creating or editing certain file/s.

  1. Go to Print
  2. Choose PDF
  3. Click Save as PDF
  4. Before saving it, go to Security Options
  5. Check the box for your desired password security measures
  6. Don’t forget to verify the password and click Save

Part 3. The Best Encryption Software for Mac in 2020

In the sea of many software and applications, there seems to be plenty of programs dedicated to single-use or single-function. They are good because they focus on one solution, however, they also cost more expensive.

If you browse thoroughly, you will discover that there are a few applications that offer sets of operations and toolkits specially designed for Mac. FoneDog PowerMyMac - Cleaner provides comprehensive modules dedicated to Mac OS. It has three powerful modules: Toolkit, Status, and Cleaner.

Inside FoneDogPowerMyMac-Cleaner Toolkit, there is a robust function called Hide and Encrypt Files. This feature allows you to create a password-protected folder and store sensitive files in it by drag and drop. It lets you turn on and off in case you may not use the feature.

  • User-friendly
  • Free download version
  • Auto-lock setup
  • Uses the safest encryption system

How cool is that? This program has made an easier way to protect you from possible data theft.

Part 4. Other Mac Encryption Tools

Apart from FoneDog PowerMyMac-Cleaner, there is other top performing software that also provides convenience and security.

Hider 2

Hider2 has the ability to hide and encrypt data on your Mac securely including notes, documents, photos, etc. One of its positive scores is the user-friendly interface which suits beginner to average users.

  • Provides auto-lock feature when the user is inactive or idled
  • Uses AES-256 encryption for the safest system

Cisdem AppCrypt

Cisdem AppCrypt offers both website and app encryption system that locks you apps and accessed websites with passwords. It creates a blacklist for suspicious access and whitelist for trusted users. However, it does not have the file encryption ability that sets passwords for the desired file and folders.

  • Keeps a list of login attempts to let you know who opens your apps
  • User-friendly

GNU Privacy Guard

GNU Privacy Guard is hybrid Mac encryption software that uses a combination of standard symmetric-key cryptography and public-key cryptography. It mainly features a versatile key management system to protect your personal privacy and the privacy of the people you are communicating with.

  • Versatile (has Windows and Mac versions)
  • Free Software

However, since it provides you with a private key for safekeeping, you might end up having a hard time figuring out how to decode it once the keys are lost.

Concealer

Concealer is another trusted name in terms of hiding files and encryption. It provides an automatic password assistant that generates “strong” passwords. One of its main advantages is providing and organizing folders by having default templates for various accounts such as bank accounts, email, software registration, and more.

  • Customizable auto-lock system
  • Easy to use with drag and drop features
  • Uses the master password and assigns separate or individual passwords to each file inside

Part 5. Factors to Consider when Choosing the Best Encryption Software for Mac

Mac

I know you may have gotten confused on which program to use or will work best for you after reading through the different software you can choose from. There is plenty of encryption software for Mac; however, bear in mind that you need to consider quality and multi-function when it comes to having a “good buy”.

You need a program that provides an all-in-one solution that you can rely on when things go rough on your device. I recommend using FoneDog PowerMyMac for the following factors:

  1. Security– It the important concern above all. You have to be keen about how these programs work to secure your files and your Mac overall.
  2. Encryption– Based on the above-mentioned encryption data, there are different types of password-protection format. Choose the one that provides the safest and considers your files their topmost priority.
  3. Encryption Speed- Consider a program that can encrypt even your large files at the shortest period of time. We know that large files take a while to be fully encrypted so you need software that can minimize the time constraints.
  4. Software License- Although free programs are good such as the GNU Privacy Guard, an open source software, you need to consider that free software is not entirely best for your needs since everyone can download it. The same thing goes for paid programs; you have to be extra cautious on how much it costs and its corresponding features. To be sure, you can take advantage of their free-trial versions first so you can determine if it works for you or not.

Part 6. Conclusions

We care so much about data privacy and we understand how crucial it is to be well-protected. You cannot simply store important files in your Mac especially when you have multiple users or you plan to sell it later on.

File

We know how much you want to protect your files from prying eyes and suspicious people that is why we have compiled and researched the different programs that can help you secure them. The encryption software for Mac we listed has their own Pros and Cons where you can assess according to their features.

Simply choose a program that will password-protect your files, optimize your system, and provide you with complete troubleshooting toolkit. Do you have any other concerns regarding encryption software for Mac? Please write your concerns in the comments below!

>Tips >Top 5 Best Encryption Software for Mac in 2020
Comment ()

Last year, in between writing Take Control books and Macworld articles, I managed to squeeze in another little project – writing the 900-page “Mac Security Bible,” published in January 2010 by Wiley. Although Rich Mogull is the real staff expert when it comes to Mac security, I’ve also written a good deal on the subject, including Take Control titles dealing with backups, spam, and passwords. This new book is a compendium of everything a typical (or even advanced) Mac user might want to know on a wide range of security topics.

This article is an excerpt from Chapter 13, “Encrypting and Securely Deleting Files,” reprinted with the kind permission of Wiley. File encryption is of course just one tiny piece of the security puzzle, but it’s worth knowing about if you keep confidential data on your Mac, especially if the computer is ever out of your physical control – which would include being lost or stolen.

Think about it this way: Would it bother you or any of your friends or family if the entire contents of your Address Book were made public? Would you be disturbed to know that a stranger could see years’ worth of your family photos, read all your email, and discover every Web site you’ve visited in the past month? Even the least secretive of us would probably agree that all this sounds pretty creepy, and that we have good reasons to keep private information private.

The way to keep your data safe while it’s sitting on your hard disk is to encrypt it – to scramble it in such a way that it looks like garbage to anyone without your password or key. Encryption comes in many forms, some of which are almost trivially easy to use, and others that require extra thought and effort. The chapter from which this article is excerpted explores a variety of different approaches to encrypting some or all of your files.

Encryption Algorithms — An encryption algorithm, also known as a cipher, is a particular method for encrypting data – a sort of mathematical formula that takes the input (sometimes called cleartext), processes it using a secret piece of information (a key), and produces encrypted output (sometimes called ciphertext). Over the centuries, countless thousands of encryption algorithms have been developed, ranging from the extremely simple to the breathtakingly elaborate. In the modern computing world, you’re likely to run into at least a half-dozen common ciphers considered especially well-suited for encrypting and decrypting data on your Mac.

Two factors influence how secure (resistant to being broken) an encryption algorithm is. First is the design of the algorithm itself. Some have weaknesses or design flaws that could enable an attacker to decrypt data even without knowing the key. The other factor is the complexity of the key. If you use the world’s most complex and powerful cipher but give it a simple key, such as the word “cat,” it becomes quite easy for someone to figure out how to decrypt your data. The best results come from combining solid, reliable algorithms with long, random keys.

I could spend many pages simply listing encryption algorithms and their variants, but I want to briefly acquaint you with just a few especially common ones:

  • AES. The Advanced Encryption Standard is one of the world’s most commonly used ciphers and one accepted by the U.S. government for protecting secret data. AES can use 128-, 192-, or 256-bit keys (see just ahead for a discussion of key length); these variants are commonly known as AES-128, AES-192, and AES-256, respectively.
  • Blowfish. This fast, open-source encryption algorithm, designed by security expert Bruce Schneier, can use key lengths from 32 to 448 bits.
  • CAST. The term CAST is used for a family of algorithms; the name comes from the initials of its developers, Carlisle Adams and Stafford Tavar. The original version, with a 128-bit key, was called CAST-128 or CAST5; a modern successor is CAST-256.
  • DES. The Data Encryption Standard, which dates back to 1975, was formerly approved for use by the U.S. government and can therefore be regarded as a forerunner to AES. But it supports only 56-bit keys, and because it’s been shown to be breakable with relative ease and speed, it’s no longer considered secure.
  • IDEA. The International Data Encryption Algorithm, which uses 128-bit keys, is considered a highly secure cipher, and was designed as a potential replacement for DES.
  • Triple DES. Also known as 3DES or TDES, this cipher is based on DES but applies the DES algorithm three times to each block of data, thus increasing the possible key size to 168 bits (that is, three separate 56-bit keys).
  • Twofish. Designed by a team of cryptologists, including Bruce Schneier, Twofish is in the same family as Blowfish but considered more modern and advanced. Twofish can use key lengths up to 256 bits.


Passwords and Keys — As previously mentioned, a key is a piece of information that a cipher uses to encrypt (and decrypt) data. If you encrypt two copies of the same data with identical ciphers but different keys, the resulting ciphertext is different; likewise, if you use the same key to encrypt two copies of some data with different ciphers, the results are different.

One form a key can take is a password (or passphrase). In other words, feed your password into an encryption algorithm to encrypt some data; then use the same password later to decrypt it. This example assumes a system in which the same key is used both for encryption and for decryption – a symmetric cipher. Asymmetric, or public-key, ciphers use one key to encrypt data and another one to decrypt it. A key can also be, among other things, a string of data stored on a token, a smart card, an electronic key, or another device.

An algorithm’s key length is the longest key it can use. So, AES-128 can use a key that’s 128 bits long. For those of you unaccustomed to thinking in binary, that translates to 16 characters. Likewise, a 256-bit key can be up to 32 characters in length.

When you choose a password for encrypting data, most encryption algorithms don’t use the password itself as the key. Behind the scenes, the algorithms run your password through some mathematical functions that turn it into a number with the maximum key length the algorithm supports. This is done partly to protect your password from discovery (even if the key is cracked) and partly to make sure the key has exactly the right number of bits. If a cipher uses a 128-bit key but I enter an 8-character (64-bit) password, the software performs its magic to give itself a longer and more secure key to work with. That means if someone attempts to break the encryption by trying every key, that person has a much wider range of possibilities to test.
But if, instead, that person tries to break the encryption by testing passwords directly (running each one through the necessary process to derive a key), he or she might break the encryption sooner.

On the other hand, if I enter a password that’s longer than the supported key length (say, a 20-character password for a 128-bit cipher), the software typically discards the extra characters before deriving its key. The result would be that an attacker trying to decrypt my files by trying all possible password combinations would have just as much trouble as someone trying all possible key combinations.

The upshot of all this is that it’s to your benefit to choose a password that’s as long as possible – but no longer than the maximum key length supported by the algorithm you use. If you use 56-bit DES, a 20-character password is no safer than a 7-character password. However, with AES-256, a 32-character password is exponentially safer than a 31-character password!

For any given encryption algorithm, longer keys (and therefore, to a point, longer passwords) are more secure. However, as I stated earlier, not all algorithms are created equal. That means key length alone doesn’t tell the whole story; one algorithm’s 128-bit keys might be, in practice, just as secure as another’s 256-bit keys if the 256-bit algorithm has flaws that reduce its effective strength. In other words, given the choice of a longer key length with a given algorithm, you should take it; but don’t assume that cipher A is stronger than cipher B just because the former uses longer keys. For all practical purposes, any modern cipher with 128-bit or larger keys is secure against all but the most determined attacks – assuming you’ve
chosen a good password.

Choosing What to Encrypt — How much you encrypt or whether you encrypt anything at all depends on several factors, including where you use your Mac, how sensitive the information on it is, what other security measures you’ve taken (protecting against theft, for example), and what your tolerance for inconvenience is.

Needless to say, the greater the confidentiality of your data and the less physically secure your Mac is, the more important it is to encrypt data. But you shouldn’t overlook the convenience factor. In general, the larger the unit of data you encrypt, the more convenient it is in the long run. That is, it’s less bother (in some senses, at least) to encrypt your entire disk than to encrypt just your home folder; it’s less bother to encrypt your home folder than to encrypt a conventional folder; and it’s less bother to encrypt a folder than to encrypt a single file. That may all sound counterintuitive, but it has to do with things such as the amount of manual effort required to encrypt and decrypt files and how often you have to type a
password.

However, also keep in mind that how and when you use encryption depends on context. For example, in some situations, it may not make sense to encrypt even a very sensitive file when it’s sitting on your hard disk, but if you transfer it to a flash drive to take it with you somewhere or if you send it to someone via email, FTP, or some other method, encryption suddenly becomes quite important because you lose the security otherwise provided by your normal computing environment.

With those thoughts in mind, consider the following units of data you could potentially encrypt, all of which are elaborated on in the full chapter:

  • Individual files
  • Individual folders
  • A disk image
  • Your home folder
  • An entire volume
  • Your startup disk
  • A complete hard drive

As I describe in the book, there are good arguments for choosing any point along this continuum. The way you go about encrypting data depends on how much you want to encrypt and what combination of features and trade-offs works best for you.

Encryption Pitfalls and Misunderstandings — Encryption can sound like a magical process that makes your data impervious to discovery. But merely encrypting something doesn’t necessarily make it safe. Encryption involves a number of potential holes and hidden dangers, and if misused (or trusted indiscriminately), it can cause more problems than it solves. Before you embark on an encryption crusade, however worthwhile your ultimate objective may be, keep in mind the following possible gotchas.

Forgetting the Originals: In most cases, when you encrypt a file, you actually create an encrypted copy of the file, leaving the original intact. Even encryption programs that automatically delete the original after encrypting it often do so in such a way that the unencrypted file could later be recovered. Later in the chapter from which this excerpt is taken, I discuss secure deletion as a way to solve this problem.

Leaving Files Unlocked: Encryption protects data on your disk only when it’s not actively in use. For example, your keychain is encrypted, but when you unlock it, you (or someone else) can freely access its contents until you lock it again or it locks on its own (based on your preferences). Similarly, if you encrypt a disk image, it’s safe as long as it’s closed, but when you mount it, its files become available to anyone with access to your computer. Therefore, you should always close, unmount, or lock encrypted files when they’re not actively in use.

Choosing an Insecure Password: Poorly chosen passwords are the Achilles heel of any encryption system. Longer, random (or seemingly random) passwords do a vastly better job at protecting your data than short or easily guessable passwords.

Forgetting Your Password: The flip side of choosing an insecure password (which might let someone else get at your data) is choosing a great password but then forgetting it (which prevents you from seeing your own data). If you’re not sure you can remember your passwords, store them in your keychain or in a third-party password management program.

Not encrypting everything that needs protection: If you’re working on a secret business plan or composing an illicit love letter, it’s easy to see why that one particular file should be encrypted. But one of the most common mistakes in data security is overlooking data that may not appear, at first glance, to be confidential but which can contain extremely sensitive information. Here are some examples:

  • Virtual Memory. As you use your Mac, Mac OS X constantly swaps information between physical RAM and virtual memory on disk to improve performance. The result, though, is that something you thought was only fleetingly stored in memory (such as text you copied to the Clipboard) can be stored on disk – sometimes for hours, days, or longer.
  • Your Clipboard(s). Speaking of the Clipboard, information that you copy or paste could be recovered, even if not stored in a virtual memory file, by using a cold boot attack (described in the book). And if you use any of the numerous utilities that offer multiple clipboards, they almost certainly store their information on disk long after you copy it.
  • Cache Files. Many applications, from your Web browser to your word processor, maintain cache files of recently (or frequently) accessed information to help them run faster. These cache files can contain a surprising amount of personal information.
  • The Contents of Your iDisk. If you’re a MobileMe member, you should be aware that anything you put on your iDisk is unencrypted (unless you manually encrypt it), and therefore anyone who knows your MobileMe user name and password can access anything on it.
  • Backups. Some programs can store extra backup copies of your files as you work, possibly in locations you wouldn’t expect. Also, some backup programs, particularly those that back up to Internet servers, keep caches of files on your disk, which may be unencrypted.
  • Spotlight. Apple’s system-wide Spotlight indexes could contain cleartext traces of data from files you’ve encrypted. Some encryption programs expressly delete such data.


Encrypting Individual Files and Folders — The most basic approach to encryption is to apply it only to the particular items that are especially sensitive. Although it would be extremely awkward to individually encrypt each file you use on a daily basis, encrypting specific files or folders makes sense when sending the info over the Internet (by email, FTP, or otherwise) or if you’re using any other unencrypted transmission or storage method, such as employing a flash drive, external hard drive, or optical disc to move files from one location to another.

As mentioned earlier, it’s important to remember that when you encrypt a file or folder, you actually create an encrypted copy, leaving the original intact and unencrypted. The same is true if you decrypt a file or folder, modify it, and then re-encrypt it. Therefore, the safest practice to follow after encrypting something is to securely delete the original; for example, by dragging it to the Trash and choosing Finder > Secure Empty Trash.

If this is the sort of encryption you want, you have many tools to choose from. Mac OS X includes command-line utilities that can encrypt files (as described in just a moment), although they’re not terribly convenient to use. Numerous third-party vendors offer easy-to-use alternatives, with a wide variety of encryption algorithms, interfaces, and extra features. Regardless of which type of program you use to encrypt your files, consider the following factors when choosing an encryption tool:

  • Compatibility. Will someone else have to decrypt this file – or will you have to decrypt it on another computer – and is suitable decryption software available on the target computer? If you choose a Mac-only encryption program, for example, the recipient will be out of luck if she has only Windows available.
  • Convenience. How well does the program’s interface fit in with your workflow? Be sure to download the program and try it out a few times with test data before committing to it for live use.
  • Sending a Password. The most securely encrypted file isn’t secure at all if an attacker or thief learns its password. So, if you’re sending an encrypted file to someone else, you must also find a secure way to let him or her know how to decrypt it. Sending a password in a cleartext email or writing it on a slip of paper is an insecure method. Better methods include sending it in an encrypted message, using Skype or another encrypted instant messaging service, or delivering the password orally in person.


Encrypting Files on the Command Line — You can encrypt individual files using the openssl program included with Mac OS X, as long as you don’t mind getting your hands dirty on the command line. Basic instructions follow; for more detail, enter “man openssl” in Terminal.

Apple Iphone Encryption Software

To encrypt a file with openssl, follow these steps:

  1. Open Terminal (in /Applications/Utilities).
  2. Choose an encryption algorithm. Openssl supports dozens of ciphers, and your choice is significant in that you must know which cipher was used to encrypt a file when you want to decrypt it later. To get a list of available ciphers, enter “openssl list-cipher-commands”. In this example, I use des3 – that is, Triple DES.
  3. Enter the following line. Substitute des3 with your preferred cipher. The first filename is the name of the file you’re encrypting, and the second filename is the name of the resulting, encrypted file.
  4. openssl enc -des3 -salt -in filename -out filename.enc

  5. When prompted, enter and confirm the password. Openssl immediately encrypts the file.
  6. To decrypt the file later, enter the line below. Again, substitute des3 with your preferred cipher, and replace the filename references with the actual filenames.
  7. openssl enc -d -des3 -in filename.enc -out filename

  8. When prompted, enter the password used to encrypt the file.


Encrypting Files and Folders with Third-Party Software — Of the many Mac OS X applications that can encrypt individual files and folders, I’ve selected a small sampling to give you an example of your options:

  • BitClamp. BitClamp compresses individual files using your choice of AES-256, 256-bit Serpent, or 448-bit Blowfish algorithms. Drag one or more files into the window, click Encrypt, enter and confirm a password, and you’re done. To decrypt files, double-click them and enter your password. ($19.95)
  • Drop Secure Pro. Drop Secure Pro is available for Mac OS X, Windows, and Linux. As the name suggests, it lets you encrypt files, folders, and raw text by drag and drop. It offers no fewer than 15 encryption algorithms, including all the usual suspects (such as AES, Blowfish, IDEA, and Triple DES). You can optionally compress the items you encrypt using gzip or bzip2 compression. ($57)
  • FileWard. This easy-to-use utility, which relies on the openssl tool built into Mac OS X, lets you encrypt files and folders as well as the contents of the Clipboard by drag and drop using any of the following algorithms: Blowfish, Cast5, Triple DES, DES-X, AES-128, or AES-256. After encrypting files, it securely deletes the unencrypted temporary files created by openssl. ($9.99)
  • PGP Desktop Home and PGP Desktop Professional. These security packages, which I discuss in more detail in the book, offer a variety of ways to encrypt data. Among them is the option to encrypt individual files or folders, either with a password or using public-key encryption, which can eliminate the security concerns associated with sending someone else a password to decrypt a file. (Home version, $99; Professional version, $239)
  • StuffIt Deluxe. This suite of file compression tools has existed, in one form or another, since the early days of the Mac and is also available on Windows. In its current version, you can compress and/or encrypt files and folders using either StuffIt Archive Manager or DropStuff (the latter of which is designed for quick drag-and-drop operations and also lets you create droplets – stand-alone applications with specific combinations of compression and encryption settings for particular tasks). With these products, you can encrypt files in the StuffItX format using any of four algorithms: 512-bit RC4 (the default), 64-bit DES, 448-bit Blowfish, or AES-256.
    You can also use StuffIt Deluxe to encrypt ZIP files (using only the AES-256 algorithm), but because of the way the ZIP format handles encryption, someone could see the names of the files and folders in an encrypted ZIP archive even without decrypting it. ($79.99)

There’s another category of software that can encrypt individual files and folders, but instead of storing them separately on disk, it stores them in a proprietary container, sometimes known as a vault. Often, such programs are used to secure not only files but notes, passwords, credit card numbers, and other random snippets of information. Obviously, such programs are more appropriate for securing data for your own use than for sending it to others. Two examples of software in this category are:

Free File Encryption Software Mac Os X Lion 10 7 5 11g63

  • AllSecure. This snippet keeper can store files, folders, notes, and other confidential information. When you add files to AllSecure, they’re ZIP-compressed with AES-256 encryption. ($25)
  • Yojimbo. Yojimbo is a popular repository for random information of all kinds. When you store files or text notes, you can optionally encrypt them individually using AES-256 by clicking an Encrypt button and then typing your password. To view an encrypted item, click the View button and then enter your password; to decrypt it permanently, choose Item > Decrypt and then enter your password. ($39)


More Encryption and Beyond — That’s just the beginning of what I cover in the chapter on encrypting files. I go on to discuss working with encrypted disk images, using FileVault, encrypting an entire disk, using hardware-encrypted drives, securely deleting files, securely erasing disks, and recovering deleted files.

Encrypto

And, of course, encryption is only one of a great many topics pertaining to Mac security that I explore in the book. It also includes complete details on secure email, chat, and Web browsing; protecting your Mac against malware; network security; sharing your Mac’s resources safely; securing Mac OS X Server; and dozens of other subjects. If you’re interested in Mac security and want the ultimate all-in-one reference, I think you’ll find the “Mac Security Bible” to be a valuable reference. The retail price of the book is $49.99; Amazon.com offers it for $31.49 at the moment.