|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
71. | JvCrypt 1.0 (vandaveer.com) | ||
and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
72. | EldoS KeyLord 4.0 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
73. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
74. | EXEsafe 2 (members.aol.com) | ||
such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will process all the information, and decide whether access should be allowed. If not, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | CryptEnCrypt 1.10 (inetprom.com) | ||
CryptEnCrypt is a powerful software application designed for electronic data protection. The files on your hard disk have no protection from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
76. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
77. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
78. | CryptoForge 3.2.5 (cryptoforge.com) | ||
client. CryptoForge provides four encryption algorithms: 448-bit Blowfish, 256-bit Rijndael (AES), 168-bit Triple DES, and 256-bit Gost. It also includes powerful compression to strengthen cryptographic security even more. The command line interface allows quick integration into automated processes and scripts, and lets you perform tasks in both interactive and non-interactive server | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
79. | Data Stash 1.5 (skyjuicesoftware.com) | ||
fully functional. Password protection is also provided, using Blowfish encryption. This is useful if you wish to keep out certain files from prying eyes, under the guise of a normal file. For example you can hide sensitive document files into a bitmap file, and retrieve them later. Opening the bitmap file would only show the image of the bitmap, and not the files that are stored | |||
Updated: 9, 2005 | Rating: 0 | Author: Chooi Guan Lim | Size: 384 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
80. | DigiSecret 2.0 (tamos.com) | ||
by the best mathematicians in the world: CAST (128-bit key), Blowfish (448-bit key), Twofish (256-bit key), and Rijndael (also known as AES, 256-bit key). The program provides the option to choose the interface language: English, German, French, Spanish, or Russian. An application for strong file encryption, compression, and file sharing (peer to peer). It utilizes time-proven | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|