|
||||||
|
||
|
Home > Des software |
|
|
61. | cryptlib 3.0 (download.componentspot.com) | ||
include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various hashed message authentication code algorithms: · HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
62. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
4 modes): Rijndael (AES) 128 and 256, Blowfish, Twofish 128 and 256, DES single, double and tripple, Square. TCPSManager component for compression and encryption settings, list of opened stream, memory leaks prevention. Native VCL, does not require any DLLs. 7 Demos, Component Reference with | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
63. | axsStrongBox 2.1 (morello.co.uk) | ||
algorithms - choose between Rijndael (AES), Twofish, Blowfish, DES and Triple DES (private key) or RSA (public key). ECB and CBC modes are available, with various standard padding options, for compatibility with other systems. Encrypting a file or a block of memory takes just a single method call. File encryption provides a convenient way of securing sensitive data files | |||
Updated: 9, 2005 | Rating: 116 | Author: Tom Duncan | Size: 473 kb | Demo Go to category: Development > Active X Similar programs | |||
64. | Personal Assistant 1.1 (shelltoys.com) | ||
them after that in your database. Personal Assistant uses 64-bit DES encryption to keep your value information away from prying eyes. You can protect your data with a password to save your privacy. How to organize the day of our life? Try Personal Assistant - powerful personal information manager and | |||
Updated: 9, 2005 | Rating: 42 | Author: Kirill Kirillov | Size: 1316 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
65. | Diary Defender 1.8 (xaltra.net) | ||
your diary securely on your computer, using password protection with DES encryption. Several people can keep their diary on the same computer, and Diary Defender has a nice login window. You can store pictures with your entries, which gives your diary entries a more personal look and feel. Combine | |||
Updated: 9, 2005 | Rating: 0 | Author: Vegard Larsen | Size: 1116 kb | Freeware Go to category: Home & Hobby > Personal Finance Similar programs | |||
66. | DriveCrypt 3.03a (drivecrypt.com) | ||
cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des and Triple Des. DRIVECRYPT requires minimal administration and user training. DRIVECRYPT protects your data with very fast and a true "on the fly" encryption process. Using special so called "Steganographic" functionalities, DRIVECRYPT allows you to hide all your sensitive information into music | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
67. | INCREDIBLE - Die projektbezogene Zeiterfassung. 2.0.5 (softwarekoch.com) | ||
Vorgabezeit zugewiesen werden kann, ist es möglich beim Erstellen des Auftrages eine einfache Vorkalkulation durchzuführen. Durch eine sogenannte Ampellogik wird dem Mitarbeiter beim Buchen der Stunden farblich der Stand eines Auftrages mitgeteilt. Erklärung der Ampellogik : Grün : Der | |||
Updated: 9, 2005 | Rating: 16 | Author: Dietmar Koch | Size: 10240 kb | Shareware Go to category: Business > Other Similar programs | |||
68. | InterBack 1.80 (interback.info) | ||
original size. The compressed file(s) can then be encrypted using DES encryption (sales are subject to USA export regulations). The files can then be transfered to any Internet ftp site that the user has an account on.Events are automated to run at any pre-selected time. At the end of the file transfer, the user can be notified by email on the success of the event. InterBack | |||
Updated: 3, 2005 | Rating: 0 | Author: David Councill | Size: 3831 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
69. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. Of course, if you are really concerned about privacy of your data, there's nothing to stop you | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
70. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
|
Home > Des software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|