|
||||||
|
||
|
Home > Des software |
|
|
41. | PowerKey 2.0 (gals1.chat.ru) | ||
any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process. After it the encryption is done and you receive a file with the extension .pkey as output. You are free to select any cipher mode to be used by the programm | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
42. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
Magic Folders makes any folder you choose and all the files in that folder completely invisible to others, even on the network! Your invisible folders and files can't be deleted, viewed, modified, or run. For all practical purposes they don't exist. Use Magic Folders to protect your finances, taxes, and | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
43. | NetSender Pro 2.60 (aborange.de) | ||
»NetSender Pro« is an efficient, easy to use tool to send short messages in NT networks. By sending messages you can be sure that your co-workers see the messages immediately on their screen without the necessity to run a mail program or to look into the mail inbox. NetSender Pro is very easy to use: Select | |||
Updated: 9, 2005 | Rating: 0 | Author: Jochen Milchsack | Size: 1487 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
44. | Hot Crypt 1.2 (softcomplete.com) | ||
is one touch text encryption software. Using algorithms Blowfish, DES, Diamond, IDEA, Mars, MISTY1, RC2, RC4, RC5, RC6, RedocIII, Sapphire, Skipjack, Tea. Support compression and Base64 encoding. Working with embedded in text pictures and objects. Can be activated under any edit windows (MS Word, Notepad, Outlook, Eudora, TheBat, etc). HotCrypt is one touch text encryption software | |||
Updated: 9, 2005 | Rating: 48 | Size: 848 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
45. | EldoS KeyLord 4.0 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
46. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | CryptEnCrypt 1.10 (inetprom.com) | ||
encryption algorithms to protect your data. These are AES, Triple-DES, GOST, RC2, RC4 and Data Protection API based algorithms. Strong encryption ensures that your information would not be easily stolen from your computer by hackers, government, or global surveillance networks. CryptEnCrypt was developed and compiled outside of the US and is not a subject to US export restrictions | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
49. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
50. | CryptoForge 3.2.5 (cryptoforge.com) | ||
algorithms: 448-bit Blowfish, 256-bit Rijndael (AES), 168-bit Triple DES, and 256-bit Gost. It also includes powerful compression to strengthen cryptographic security even more. The command line interface allows quick integration into automated processes and scripts, and lets you perform tasks in both interactive and non-interactive server running modes. Additional features include | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Des software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|