|
||||||
|
||
|
Home > Decryption software |
Related keywords: self decryption, Self Decryption, DES encryption decryption, guaranteed decryption |
|
|
61. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
Encryption library allows you to easily add strong encryption and decryption capability to your Windows applications. Supports the latest industry-standard strong encryption algorithms and offers both symmetrical and public-key | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
62. | Silver Key 3.3 (filecryption.com) | ||
shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for corporate usage. If you want to protect your data according to the HIPAA privacy regulations, our software lets you easily incorporate HIPAA-compliant encryption. Silver Key is the | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
63. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
Blowfish Cast RC2 RC4 RC5 for symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it comes to data manipulation. Blob is our object that can read files, string variables and bytes | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
64. | CryptIt 1.301 (SinnerComputing.com) | ||
security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
65. | I-Cipher AP 2.2.2 (ambitware.com) | ||
to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form. I-Cipher is ideal for | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | 4UOnly 1.2.7 (dillobits.com) | ||
good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password generator is included to further enhance your security. Convenient automatic launching of login web pages is also provided to reduce you login time. In this era of heightened concern for security, we recommend that you use a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
67. | 4UOnly 1.2.7 (dillobits.com) | ||
good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password generator is included to further enhance your security. Convenient automatic launching of login web pages is also provided to reduce you login time. In this era of heightened concern for security, we recommend that you use a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
68. | Secure Password Store 0.81 (lmphotonics.com) | ||
specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 607 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
69. | Silver Key 3.3 (kryptel.com) | ||
shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for corporate usage. If you want to protect your data according to the HIPAA privacy regulations, our software lets you easily incorporate HIPAA-compliant encryption. Silver Key is the | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
70. | Secure Hive 1.1.0.0 (securehive.com) | ||
permitting encryption of documents and in-place encryption / decryption of parts of documents, including text and graphics. Secure Hive can be used to encrypt clipboard content while preserving the format of the data. Secure Hive can be fully controlled by an administrator Secure Hive supports a command line interface for batch processing of files and archives. Secure | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Morrow | Size: 986 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Decryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|