|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
41. | Private Encryptor 6.2 (tropsoft.com) | ||
and Self Decrypting Executables. Registered version has DES, and Blowfish encryption, stronger encryption available as an add on. Features an extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
42. | Utalk Network Messenger 1.00 (unicorntech.net) | ||
File Transfer, Reminder Service and Logs. Message Encryption with Blowfish Algorithm. Multicasting and Broadcasting Supported. Multiple File Attachments Supported. Attractive Interface and Easy to Use. Reminder Utility Added. Logs of The communication Supported. A Network (LAN) Messenger with File Transfer, Reminder Service and Logs. Message Encryption with Blowfish | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 623 kb | Commercial Go to category: Communications > Chat & Instant Messaging Similar programs | |||
43. | CryptoForge 3.2.5 (cryptoforge.com) | ||
client. CryptoForge provides four encryption algorithms: 448-bit Blowfish, 256-bit Rijndael (AES), 168-bit Triple DES, and 256-bit Gost. It also includes powerful compression to strengthen cryptographic security even more. The command line interface allows quick integration into automated processes and scripts, and lets you perform tasks in both interactive and non-interactive server | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
44. | PalmTree 3.5 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
Strength Encryption algorithms with up to 448-bit keys: AES, GOST, Blowfish, 3DES, CAST-128, SAFER, IDEA, RC5. - Three-factor authentication using PKCS#11-compatible tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | CryptoCrat 2005 4.60 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 9, 2005 | Rating: 39 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | Advanced File Protector 2.2 (666soft.com) | ||
Use Advanced File Protector to protect all your private files using the strongest encryption algorithms available, create self extracting/decrypting archives, and much more. Besides using the common passwords, Advanced File Protector can also create physical keys that will be used to encrypt/decrypt your | |||
Updated: 9, 2005 | Rating: 16 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
48. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
49. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
50. | WinZip Compatible Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|