|
||||||
|
||
|
Home > Decryption software |
Related keywords: self decryption, Self Decryption, DES encryption decryption, guaranteed decryption |
|
|
1. | 4UOnly 1.2.7 (dillobits.com) | ||
good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password generator is included to further enhance your security. Convenient automatic launching of login web pages is also provided to reduce you login time. In this era of heightened concern for security, we recommend that you use a unique | |||
Updated: 2, 2006 | Rating: 36 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
2. | 4UOnly 1.2.7 (dillobits.com) | ||
good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password generator is included to further enhance your security. Convenient automatic launching of login web pages is also provided to reduce you login time. In this era of heightened concern for security, we recommend that you use a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
3. | 4UOnly 1.2.7 (dillobits.com) | ||
good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password generator is included to further enhance your security. Convenient automatic launching of login web pages is also provided to reduce you login time. In this era of heightened concern for security, we recommend that you use a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
4. | ABCCrypto 2.0 (websupergoo.com) | ||
ABCCrypto is an ATL COM component for encrypting and decrypting data. It's incredibly simple to use and works with virtually any format you'll ever come across. You can encrypt or decrypt variants, BLOB data or files. ABCCrypto uses the standard Windows Cryptography API to ensure consistent | |||
Updated: 9, 2005 | Rating: 0 | Author: WSG Developers | Size: 2000 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
5. | ACProtect standard 1.20 (ultraprotect.com) | ||
Special ACProtect Technics: Metamorph Engine- Metamorph decryption routines and several encrypted layers. The code being protected varies every time you protect your application. CodeReplace Engine - ACProtect can replace some of the protected program's code with its own codes without function loss and speed loss. This feature combine the protect code and the program code | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | Advanced Office Password Breaker 1.40 (elcomsoft.com) | ||
for our line of products. Guaranteed decryption of file open protected MS Word and Excel 97/2000 files regardless of password length or complexity because the encryption key is cracked, not the password. AOPB can open your file within a week on high end | |||
Updated: 9, 2005 | Rating: 4144 | Author: Vladimir Katalov | Size: 633 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
7. | Advanced PDF Password Recovery Std 1.50 (elcomsoft.com) | ||
or adding/changing annotations and form fields (in any combination). Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit, copy, print, annotate functions enabled. Can operate in a batch mode. The | |||
Updated: 9, 2005 | Rating: 4339 | Author: Vladimir Katalov | Size: 1206 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
8. | AntiCrack Software Protector Basic 1.09 (anticrack.us) | ||
machine,the code protected can not decrypt. Polymorph - Polymorph decryption routines and several encrypted layers.The code being protected varied every time your protect your application. Embedded cryptor - You can specify the place in your application to embed the inner cryptor.With the embedded | |||
Updated: 9, 2005 | Rating: 535 | Author: Lusi Chen | Size: 1429 kb | Shareware Go to category: Development > Other Similar programs | |||
9. | Auto FTP Premium 4.6 (primasoft.com) | ||
transfer sets for any future date/time. Strong File Encryption / Decryption: encryption allows you easily and quickly to encrypt and decrypt files selected for upload and/or download using the latest industry standard strong encryption. ZIP and UNZIP: Auto FTP Premium enables you to use the most popular ZIP archive file format. Upload and Download Site/Folder, Synchronize: Upload | |||
Updated: 2, 2006 | Rating: 0 | Author: Marek Kosznik | Size: 5100 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
10. | Auto FTP Service 4.6 (primasoft.com) | ||
transfers for any future data and time. Strong File Encryption / Decryption: encryption allows you easily and quickly to encrypt and decrypt files selected for upload and/or download using the latest industry standard strong encryption algorithms (AES known as Rijndael, Twofish, RSA,..). Special Actions: easy to use scripting function allows you to automate the transfer and | |||
Updated: 2, 2006 | Rating: 0 | Author: Marek Kosznik | Size: 5100 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
11. | BestCrypt Corporate 1.12 (jetico.com) | ||
includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic installation/uninstallation and update of BestCrypt on remote client computers, creation of central Administrating Database on the server | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
12. | bitRipper 1.20 (omgsoft.com) | ||
performed after the copying process is completed Third-party CSS Decryption and CPPM authorization modules make bitRipper able to copy protected DVDs. bitRipper does not require gigabytes of space to copy all DVD content to the hard drive before converting to AVI or MPEG. It converts video | |||
Updated: 9, 2005 | Rating: 165 | Author: Mike Tishetsky | Size: 2094 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
13. | bitRipper 1.30 (bitripper.com) | ||
only selected tracks (both video and audio) Third-party CSS Decryption and CPPM authorization modules make bitRipper able to copy protected DVDs. bitRipper does not require gigabytes of space to copy all DVD content to the hard drive before converting to AVI or MPEG. It converts video on-the-fly, copying data and writing it to AVI or MPEG file at the same time. bitRipper is a | |||
Updated: 9, 2005 | Rating: 165 | Author: Mike Tishetsky | Size: 1726 kb | Freeware Similar programs | |||
14. | BlowFish 2000 2.8 (gregorybraun.com) | ||
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Business PDF Writer 1.02 (bureausoft.com) | ||
PDF compression, PDF split and merge, 128-bit encryption and decryption as well as PDF optimization. More than 60 languages are supported with special characters neatly printed in PDF files. As professional PDF publishing solution, Business PDF Writer offers quality PDF creation, conversion, and management that could be rarely found elsewhere. For more information, visit | |||
Updated: 9, 2005 | Rating: 0 | Author: Pierre Gilles | Size: 5671 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
16. | Chameleon 2.0 (members.optushome.com.au) | ||
Chameleon is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
17. | Chilkat Create Self-Extracting EXE from Zip 8.1.0 (zip-compression.com) | ||
create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little memory. Create self-extracting ZIP files optionally with unbreakable AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
18. | Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) | ||
Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure | |||
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Development > Other Similar programs | |||
19. | Chilkat XML Messaging 1.0.6 (chilkatsoft.com) | ||
TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Web Development > XML/CSS Tools Similar programs | |||
20. | Chilkat XML Messaging Component 2.0.0 (chilkatsoft.com) | ||
TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
21. | Chilkat Zip Self-Extractor 8.1.0 (zip-compression.com) | ||
create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little memory. Create self-extracting ZIP files optionally with unbreakable AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: Development > Other Similar programs | |||
22. | ChilkatZip Self-Extractor 1.0.0 (chilkatsoft.com) | ||
create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little memory. Create self-extracting ZIP files optionally with unbreakable AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 228 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
23. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | CryptaFlix 1.10 (briggsoft.com) | ||
protection using the Advanced Encryption Standard (AES). On-the-fly decryption during playback eliminates the need for temporary files. Create self-playing videos that can be viewed by anyone with the applicable password. CryptaFlix also plays MPG videos. CryptaFlix is a video player for Windows with encryption capabilities for DivX and other AVI format movies. Protect your video | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 948 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
25. | CryptIt 1.301 (SinnerComputing.com) | ||
security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | cryptlib 3.0 (download.componentspot.com) | ||
The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
27. | Crypto 2000 4.2 (gregorybraun.com) | ||
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
28. | Cryptocx v5 5.1.6 (easybyte.com) | ||
with 128Bit Blowfish encryption. · Has the Fastest file encryption/decryption · 256 Bit AES encryption/decryption for files and string · Easily add Cryptocx v5 to your website or application in minutes. Cryptocx is a PGP and AES compatible encryption component designed for use in any modern | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
29. | Cryptocx v6 6.1.3 (easybyte.com) | ||
and files with 448 Bit Blowfish Has the Fastest file encryption/decryption 256 Bit AES encryption/decryption for files and string Easily add Cryptocx v6 to your website or application in minutes Cryptocx is an Open PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
30. | Crypton 1.0 (uic.nnov.ru) | ||
for you files. Crypton uses Blowfish algorithm for encryption and decryption, also allows file compression and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
31. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
After you have specified the conditions of the encryption or decryption operation and instructed the program to perform the operation the conditions are checked and any errors or exceptional conditions (such as the non-existence of the specified input files or lack of space on the output disk) are reported. Read more at http://www.hermetic.ch/crypto/me5aeman/prodinfo.htm | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
32. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
DevSolutionsCrypt library is a powerful and easy to use cryptographic ActiveX and DLL component for Windows developers that allows applications to encrypt/decrypt data or files using the latest industry standard strong encryption algorithms.It can be used to encrypt/decrypt strings,memory buffers,Blobs,Files | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
33. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
It compresses and encrypts selected files and produces a self-decryption archive. The encrypted file can be decrypted simply by double clicking the archive with the given password for symmetric key mechanism and no input is necessary for certificate based decryption.. DevSolutions SecureFile also can be used to create a EncryptionArchive file. The encryption archive can | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
34. | DLOCK2 2.01 (eBible.org) | ||
is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2, except recompiled | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
35. | DriveCrypt 3.03a (drivecrypt.com) | ||
to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | EDCrypt 3.1 (softuarium.com) | ||
Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
37. | Encryption Toolkit 2003 Trial Edition 1.0 (nickellie.com) | ||
a Win32 context menu extension that makes file encryption and decryption from Windows Explorer a snap. The Nickellie Encryption Toolkit includes everything you need to add data encryption and file encryption capabilities to your software applications. This includes all necessary runtime and debug DLLs; complete technical manual in Windows Help format; sample projects in Visual | |||
Updated: 9, 2005 | Rating: 0 | Author: Daniel Maddox | Size: 1062 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
38. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | EzCrypt+ 2.01 (kmgi.com) | ||
Windows Explorer • Fast and simple with one-click encryption and decryption • Self-decrypting archives enable you to share encrypted data securely with people who don't have the program. To decrypt the archive the recipient just double-clicks on the archive file and enters the password. • Powerful and flexible: Encrypt single files, folders and entire directory trees • | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
40. | FileEncryptor 1.0.6.0 (arxsoft.com) | ||
FileEncrypter is a small freeware utility that is capable of encrypting any file on any media storage with the officially recognized encryption algorithm - AES (Rijndael). The key length of the algorithm may vary from 128 to 256 bit to ensure the maximum protection of encrypted information. The use of | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Wetherell | Size: 388 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
41. | GreatCrypt 2.0 (miraxus.com) | ||
Detailed help system Fully compatible with Windows FREE decryption software FREE upgrade to all new versions The powerful file encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
42. | I-Cipher AP 2.2.2 (ambitware.com) | ||
to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form. I-Cipher is ideal for | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
43. | Intech Pop3 1.0 (intech2.com) | ||
ActiveX control that includes text-to-speech and automatic decryption capabilities. The installation package comes complete with SDK documentation and application samples for VB, Scripting, and C. ITPop3 is a full-featured ActiveX control that includes text-to-speech and automatic decryption capabilities. The installation package comes complete with SDK documentation and | |||
Updated: 3, 2005 | Rating: 0 | Author: Kevin Crawford | Size: 325 kb | Demo Go to category: Development > Other Similar programs | |||
44. | JvCrypt 1.0 (vandaveer.com) | ||
JvCrypt is a powerful encryption and compression utility that allows you to create encrypted files and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
45. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
Lucigenic Crypt is a COM component that enables software developers to provide advanced cryptographic services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
46. | Max Net Shield 4.2 (maxnetshield.com) | ||
feature to transform any file into an encrypted format. Easy decryption capability. Extend the functionality of MNS to locate and erase history files left behind by other applications such as Adobe Acrobat, JASC PaintShop Pro, RealOne Player, Adobe Photoshop, Macromedia Flash Player, Eudora, and many more. Stealth Function allows you to hide the MNS program on the hard drive | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxion Software | Size: 6480 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
47. | Multi-ZIP-licity 2.0 (softuarium.com) | ||
Multi-ZIP-licity is a program for people working with multiple ZIP files. Its primary function is to extract files from multiple archives and create multiple archives. Program also includes extra tools designed to encrypt and decrypt files, list contents of a folder as text, change attributes of multiple | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 787 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
48. | Orbital's SQL Decryptor 2.2 (decryptor.orbitaltechnologies.org) | ||
directly on the SQL Server. Uses Unicode technology during the decryption process which allows for International use. Simple point-and-click decryption. Does not require any T-SQL scripting knowledge. Reduces time and money spent restoring lost source code to encrypted SQL objects. Never pay another developer to recreate and debug all of your lost SQL source code | |||
Updated: 9, 2005 | Rating: 0 | Author: Orbital Technologies | Size: 684 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
49. | PDF Password Remover 2.5 (verypdf.com) | ||
into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat (including 5.x | |||
Updated: 2, 2006 | Rating: 6506 | Author: verypdf verypdf | Size: 521 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
50. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
PlexCrypt protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, ElGamal, IDEA, IES, RC4, RC6, RSA, Serpent, etc | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
51. | Private Sitez 3.0.1 (dcm-services.com) | ||
browser functions,modify/edit, printing, notes, auto-encryption and decryption. This programs minimizes to icon tray for conveniance. Built in utilities allow user to repair and backup main database file. The ultimate password organizer for Windows. Featuring URL Capture, auto-backup and | |||
Updated: 3, 2005 | Rating: 0 | Author: David Melvin | Size: 596 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
52. | Robo-FTP 2.1.0 (robo-ftp.com) | ||
scheduling utility. Robo-FTP also features integrated PGP encryption/decryption to maintain the highest level of data security. Robo-FTP also supports integrated zip archive management, sending and receiving e-mail messages (no separate e-mail client required), single command local-server | |||
Updated: 9, 2005 | Rating: 0 | Author: David Keenan | Size: 8757 kb | Commercial Go to category: Network & Internet > FTP Clients Similar programs | |||
53. | SafeBox Industry 1.0 (aidsoft.com) | ||
SafeBox Industry is a new and powerfull file encryption solution. This application can also provide a strong protection, quite good compression, self-decrypting archives, good presentation (use skins form, splash screen), which may be used for secure distribution package.Features : Create Self-Decrypting | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
54. | Scripts Encryptor (ScrEnc) 2.1.3 (dennisbabkin.com) | ||
ScrEnc provides tools to encrypt your JavaScript/JScript, C/C++/MFC scripts before posting them online, or for distribution, preserving full functionality of those but making them very hard to read. ScrEnc can also decrypt previously encrypted scripts into fully readable source code files, including files | |||
Updated: 9, 2005 | Rating: 0 | Author: Dennis Babkin | Size: 202 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
55. | Secura Archiver 1.6 (cmfperception.com) | ||
Secura Archiver is professional archiving software for use in personal or commercial environments that demand 128 bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 1509 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
56. | Secure Hive 1.1.0.0 (securehive.com) | ||
permitting encryption of documents and in-place encryption / decryption of parts of documents, including text and graphics. Secure Hive can be used to encrypt clipboard content while preserving the format of the data. Secure Hive can be fully controlled by an administrator Secure Hive supports a command line interface for batch processing of files and archives. Secure | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Morrow | Size: 986 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
57. | Secure Password Store 0.91 (lmphotonics.com) | ||
specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 627 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
58. | Secure Password Store 0.81 (lmphotonics.com) | ||
specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 607 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
59. | SecureFile 2.0 (securefile.tripod.com) | ||
using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ private key ) for the process of encryption and decryption.It | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
60. | SecurityPlus 4.33 (softbytelabs.com) | ||
is a powerful encryption & decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on-the-fly encryption/decryption. SecurityPlus! is very fast and won't take long to encrypt/decrypt even large files (including files on CD-ROM). Current passwords (keys) | |||
Updated: 9, 2005 | Rating: 0 | Author: M. Purkhardt | Size: 568 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
61. | SharpZipLib 0.5 (download.componentspot.com) | ||
#ziplib (pronounced SharpZipLib) is a free, open-source compression library for the .NET Framework. Data can be handled using the following formats: · Zip: This format archives multiple files into one file and compresses the results. Uses the deflate algorithm. · Gzip: This format is often used in Unix | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 1255 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
62. | Silver Key 3.3 (filecryption.com) | ||
shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for corporate usage. If you want to protect your data according to the HIPAA privacy regulations, our software lets you easily incorporate HIPAA-compliant encryption. Silver Key is the | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
63. | Silver Key 3.3 (kryptel.com) | ||
shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for corporate usage. If you want to protect your data according to the HIPAA privacy regulations, our software lets you easily incorporate HIPAA-compliant encryption. Silver Key is the | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
64. | Smash! 1.3 (brokenmolds.com) | ||
is a fast, powerful, user friendly encryption and decryption utility, complete with Government level file wiping, and Government approved cryptography. When it comes to keeping your files secure, safe, and out of unwanted hands, Smash! is the answer to your every security need. Sporting familiar user-friendly features, and the capability of encrypting, decrypting, and wiping any | |||
Updated: 3, 2005 | Rating: 0 | Author: Broken Molds | Size: 1086 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
65. | Softcrypt Shellex 3.0.3 (righteoustech.com) | ||
files that can deactivate themselves automatically after too many decryption attempts, SecuPAD to avoid keyloggers, customizable interface, scrambled encrypted files names, data deletion beyond recovery, drag 'n drop, lost key recovery, shell integration - just to name a few of the great features of this software! Complete multithreaded high performance encryption software. Interface | |||
Updated: 3, 2005 | Rating: 16 | Author: Righteous Technologies | Size: 3266 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | Super Password Guard 3.1 (topaim.net) | ||
(for enhanced security, master password is used as encryption/decryption key only and is not stored anywhere). You can also assign a short master password hint text so if you accidentally forget your master password, the hint will help you to recall it. 3. Make custom categories/subcategories to divide your accounts into logical categories for easier access. 4. Security lock. you | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
67. | TabMail 2.7 (dlg.krakow.pl) | ||
text (see htmlp for more details). * Easy PGP message encryption/decryption * SMTP and POP3 authentication * Support for SSL/TLS connections * Scanning attachments for viruses * Multi-user and multi-account * Tracing for diagnosing TCP, POP3, SMTP or filter errors E-mail client with: automatic attachments compression, message filtering, multi-account, SSL, PGP | |||
Updated: 9, 2005 | Rating: 16 | Author: Krzysztof Kochański | Size: 1217 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
68. | Ultimate ZIP Cracker 7.3.1.5 (vdgsoftware.com) | ||
Customized search will use your own search template. - Guaranteed decryption method will decrypt your .DOC or .XLS file regardless of password used. Very fast on Pentium 4 system! - Plaintext attack will decrypt your whole encrypted .ZIP file if you have another unencrypted ZIP file (called plaintext file) which contains at least one file from the encrypted archive. The trial | |||
Updated: 2, 2006 | Rating: 1397 | Author: Dmitry Sushkov | Size: 920 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
69. | venta-sign 2.0.0.142 (ventasoft.de) | ||
venta-sign: high-security signature and encryption with smartcards and soft token (PKCS#12). All german qualified Trustcenter supported. This programm is evaluated and certified by "ITSEC E2 high"(european security standard & Level). venta-sign is a suite for cryptography with 2 main components: venta-sign - All german qualified Trustcenter supported. venta-sign is a suite for cryptography with 2 main components: venta-sign - shell extension and venta-container | |||
Updated: 9, 2005 | Rating: 0 | Author: F. Byszio | Size: 14489 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
70. | WinAVI DVD Copy 4.5 (winavi.com) | ||
for one copy. 2. Copy Movies in the Easiest Way! 3. Flawless CSS Decryption. 4. Ability to record on Dual Layer media (when you have a dual layer burner). 5. Excellent compression quality. 6. Compress & copy a dual-layer (D9) movie into a single-layer (D5) disc to save disc space. 7. Supports split DVD-9 into two blanks. 8. Supports DVD-9 to DVD-5 copy, allows you to copy main | |||
Updated: 6, 2005 | Rating: 771 | Size: 1863 kb | Shareware Similar programs | |||
71. | Without A Trace Surf Guard 5.91 (tekeffect.com) | ||
to completely hide the contents of a file or folder. Encryption and Decryption can also be done with ease by the authorized person. Gain the tools that you need to remain private, secure and get back your ability to surf the internet Without A Trace! Without A Trace Surf Guard is a powerful 3 in 1 privacy tool that combines a history eraser with a powerful pop up stopper and robust | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 4027 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
72. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
Blowfish Cast RC2 RC4 RC5 for symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it comes to data manipulation. Blob is our object that can read files, string variables and bytes | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
73. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
Encryption library allows you to easily add strong encryption and decryption capability to your Windows applications. Supports the latest industry-standard strong encryption algorithms and offers both symmetrical and public-key | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
|
Home > Decryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|