|
||||||
|
||
|
Home > Cipher software |
Related keywords: stream cipher, secure email encrypted e mail encryption crypto online privacy rsa twofish block cipher stream ciphe |
|
|
31. | I-Cipher AP 2.2.2 (ambitware.com) | ||
with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
32. | virtualCrypt 3.02 (netindiasolutions.com) | ||
virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
33. | XFILEBOX 1.0 (wisehuman.com) | ||
your files more easily, and also a security utility with built-in cipher that enables you to store your files securely. XFILEBOX is a powerful, easy to use utility for managing, protecting, and backuping your important files or folders. It is a wonderful archive manager that enables you to organize your files more easily, and enables you to store your files | |||
Updated: 9, 2005 | Rating: 0 | Author: Xia Mou | Size: 1562 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
34. | ZoomMagic 2.03 (peakstars.com) | ||
ZoomMagic is a powerful tool to magnify any portion of your screen, measure distances or capture a screen area. Targeted users are: designers and developers on the hunt for those lost pixels .. or in the need for a fast screencapture, users with visual impairments or anybody who needs to find the shortest way | |||
Updated: 9, 2005 | Rating: 0 | Author: Peak Stars | Size: 1668 kb | Freeware Go to category: Graphic Apps > Other Similar programs | |||
35. | USA Shield 2.15 (usa.safeworld.info) | ||
USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
36. | SafeCryptor 1.5 (gemiscorp.com) | ||
SafeCryptor provides you with safe, fast and reliable text encryption anywhere, anytime, and lets you securely and quickly send all of your sensitive and personal information (e.g., login, password, credit card number) via e-mail or chat session to your partners, customers, friends or family. SafeCryptor is | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 1472 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | SecExFile Home 1.1 (bytefusion.com) | ||
to use, password based, intuitive + Strong 128/384 bit SecExMail cipher, incorporating 256 bit Twofish + Encrypt multiple files and folders into a single encrypted archive + Known plain text attack and frequency analysis protection SecExFile brings one-click file protection to the desktop. It integrates with Windows Explorer to make securing your personal or corporate data easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 1747 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | Invisible CHAOS 5.1 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | Crypto 2000 4.2 (gregorybraun.com) | ||
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Cipher software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|