|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
91. | Advanced File Protector 2.2 (666soft.com) | ||
Use Advanced File Protector to protect all your private files using the strongest encryption algorithms available, create self extracting/decrypting archives, and much more. Besides using the common passwords, Advanced File Protector can also create physical keys that will be used to encrypt/decrypt your | |||
Updated: 9, 2005 | Rating: 0 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
92. | AES Home 4.0 (aes.safeworld.info) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
93. | AES Pro 5.5 (aes.safeworld.info) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 16 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
94. | Aha Password and Info Manager 7.03.01 (fronture.com) | ||
You can store ID, passwords, and all the information securely in your computer or our network server and access it from anywhere on the glove. Instead of typing or inconvenient copy-and-paste, you can just press hot key (Ctrl+1 for ID, Ctrl+2 for Password, Ctrl+3 through Ctrl+9 for your other data) or | |||
Updated: 9, 2005 | Rating: 0 | Author: Edward Kang | Size: 281 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
95. | X-COM 2.75 (mypersonalsoftware.com) | ||
a minimun of privacy: every communications is encrypted using the Blowfish encryption algorithm. You will be able to send messages / files and chat with anyone on your lan and internet. Features: - encrypted communications (Blowfish / 56 bit): - encrypted instant messenger - encrypted public chat - encrypted file transfer Peer2Peer Secure Instant Messenger | |||
Updated: 9, 2005 | Rating: 446 | Size: 2185 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
96. | Secure Network Chat 2.6.43 (secureaction.com) | ||
All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, Ltd | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
97. | Secure Network Messenger 1.5.5 (networkmessengers.com) | ||
Secure Network Messenger (SNM) - is a real time network communication program able to send and receive messages and files from one computer to another without using dedicated servers. All communication is highly secure! All traffic between copies of SNM is encrypted by strong encryption algorithms. The | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 598 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
98. | SecureCRT 4.1.2 (promaxum.com) | ||
both SSH1 and SSH2 protocols. SSH2 support provides AES, 3DES, RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
99. | NoTrax 1.4 (heidi.ie) | ||
activate at any time during browsing. The Cache is encrypted using Blowfish. NoTrax supports SSL (Secure Socket Layer) and TLS (Transport Layer Security). The root certificates are built-in. NoTrax comes with an automatic shutdown option if idle for a certain amount of time (you decide). NoTrax does | |||
Updated: 9, 2005 | Rating: 0 | Author: Garrett Trant | Size: 2221 kb | Commercial Go to category: Security & Privacy > Other Similar programs | |||
100. | ISequre for Windows 1.4 (isecure.tripod.com) | ||
will protect your chat session encoding all messages with the Blowfish encryption algorithm. ISequre works transparently and does not add any new interface elements except its icon on the systray. You can use different keys for each of your chat partners simultaneously. ISequre is a security software application that enables you and your friends or co-workers to exchange encrypted | |||
Updated: 9, 2005 | Rating: 0 | Size: 152 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|