|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
101. | PrivacyAssistant 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
102. | PrivacyAssistant Professional 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
103. | PrivacyWatcher 1.20 (managebytes.com) | ||
tools for protecting your privacy: - Highly reliable 448-bit Blowfish file encryption algorithm - Secure file deletion to prevent simple recovery with UnErase tools - Startup manager to prevent unwanted programs from loading on Windows startup - Desktop lockout feature for preventing unauthorized access to your PC Without privacy there is no freedom. PrivacyWatcher offers | |||
Updated: 2, 2006 | Rating: 16 | Author: Mikhail Yurasov | Size: 1003 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
104. | PrivacyWatcher 1.11 (managebytes.com) | ||
your privacy: - Highly reliable encryption of files using 448-bit Blowfish algorithm - Secure files deletion to prevent their recovering with UnErase tools - Startup manager to prevent unwanted programs from loading on Windows startup - Desktop lockout feature for preventing the unauthorized | |||
Updated: 3, 2005 | Rating: 0 | Author: Mikhail Yurasov | Size: 995 kb | Shareware Similar programs | |||
105. | Private Encryptor 6.2 (tropsoft.com) | ||
and Self Decrypting Executables. Registered version has DES, and Blowfish encryption, stronger encryption available as an add on. Features an extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
106. | Private Encryptor 6.2 (tropsoft.com) | ||
and Self Decrypting Executables. Registered version has DES, and Blowfish encryption, stronger encryption available as an add on. Features an extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
107. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet, Intranet, or direct dial-up modems. RBackup has many failsafe features, and conforms to standard backup methodology. RBackup can be used to operate a subscription-based retail Remote Backup Service | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
108. | SafeDisk 2.10 (guardcomplete.com) | ||
and use virtual ciphered disks. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK, RSC. Stealth. Built-in protection against keyboard spies. Mode "under enforcement". Locking of access to workstation at Windows loading/idle. Low level wipe. SafeDisk is 128bit on-the-fly disk encription. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK | |||
Updated: 3, 2005 | Rating: 42 | Author: Andre Belokon | Size: 820 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
109. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
SafeHouse provides transparent on-the-fly encryption for your notebook or desktop personal computer. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. All encryption is | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
110. | Secura Archiver 1.6 (cmfperception.com) | ||
encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The integrated Key Manager stores security keys with your descriptions which allows you to quickly and conveniently choose the right | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 1509 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
111. | Secura Backup Professional 2.13 (cmfperception.com) | ||
paths, FTP sites, CD/DVDs, and even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
112. | SecurDataStor 5.01 (encryptx.com) | ||
different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a server-less authentication model. This file encryption software creates an encrypted archive or wrapper around the protected data and stores the permissions in that wrapper. This permission-based rights | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
113. | Secure Network Chat 2.6.43 (secureaction.com) | ||
All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, Ltd | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
114. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
115. | Secure Network Messenger 1.5.5 (networkmessengers.com) | ||
Secure Network Messenger (SNM) - is a real time network communication program able to send and receive messages and files from one computer to another without using dedicated servers. All communication is highly secure! All traffic between copies of SNM is encrypted by strong encryption algorithms. The | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 598 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
116. | Secure Password Manager 2.2.1.1 (securekit.com) | ||
Password Manager uses industrial strength 256-bit AES/Rijndael/Blowfish encryption to keep your passwords secure. Secure Password Manager is well designed to let you store and track names, passwords, credit cards, software serial numbers and confidential notes in an encrypted form securely and easily. It can automatically fill login information for you. Features include password | |||
Updated: 2, 2006 | Rating: 0 | Author: securekit kit | Size: 1327 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
117. | SecureCRT 4.1.2 (promaxum.com) | ||
both SSH1 and SSH2 protocols. SSH2 support provides AES, 3DES, RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
118. | SecureFile 2.0 (securefile.tripod.com) | ||
the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ private key ) for the process of encryption and decryption.It supports secure file deleting and backup of encrypted files It compresses and encrypts selected files and produces a | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
119. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program!. This strong encryption software ensures that it is | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
120. | Simplyzip 1.1b63 (paehl.de) | ||
other think. With filecryption: Rijndael/Twofish (256 bit keysize) + Blowfish (448 bit keysize) Simplyzip is a multi archiver.Can open:ZIP,CZIP,ACE,CAB,RAR,TAR,GZIP,LZH,BZ2,SQX, RS, UUE,XXE,BASE64,UCL,ARJ,ZLIB,RPM,DEB,7-ZIP Create: 7z, ZIP,CZIP,Cab,LHA,TAR,TAR GZ TAR BZ2,ACE (optionale DLL), Deepfreezer SQX,UCL,RS,ZIP-SFX/LHA-SFX and | |||
Updated: 2, 2006 | Rating: 1552 | Author: Dirk Paehl | Size: 1772 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
121. | Simplyzip 1.1b63 (free.pages.at) | ||
other think. With filecryption: Rijndael/Twofish (256 bit keysize) + Blowfish (448 bit keysize) Simplyzip is a multi archiver.Can open:ZIP,CZIP,ACE,CAB,RAR,TAR,GZIP,LZH,BZ2,SQX, RS, UUE,XXE,BASE64,UCL,ARJ,ZLIB,RPM,DEB,7-ZIP Create: 7z, ZIP,CZIP,Cab,LHA,TAR,TAR GZ TAR BZ2,ACE (optionale DLL), Deepfreezer SQX,UCL,RS,ZIP-SFX/LHA-SFX and | |||
Updated: 2, 2006 | Rating: 0 | Author: Dirk Paehl | Size: 1772 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
122. | SPac 1.6.0.28 (qsc.co.uk) | ||
to US export restrictions. Files are encrypted using the very strong BlowFish (448-bit key) algorithm, and high compression keeps the filesize down. SPac is an easy to use, secure, and powerful application for file encryption and sharing. SPac combines both compression and encryption into the one product and utilizes a user-friendly interface to make manipulating your secure archives | |||
Updated: 3, 2005 | Rating: 21 | Author: Ewan McNab | Size: 1552 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
123. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to remote hosts, through | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
124. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to remote hosts, through | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
125. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
Strength Encryption algorithms with up to 448-bit keys: AES, GOST, Blowfish, 3DES, CAST-128, SAFER, IDEA, RC5. - Three-factor authentication using PKCS#11-compatible tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
126. | StrongDisk Pro 3.0 (strongdisk.com) | ||
Strength Encryption algorithms with up to 448-bit keys: AES, GOST, Blowfish, 3DES, CAST-128, SAFER, IDEA, RC5. - Three-factor authentication using PKCS#11-compatible tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
127. | USA Shield 2.15 (usa.safeworld.info) | ||
USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
128. | Utalk Network Messenger 1.00 (unicorntech.net) | ||
File Transfer, Reminder Service and Logs. Message Encryption with Blowfish Algorithm. Multicasting and Broadcasting Supported. Multiple File Attachments Supported. Attractive Interface and Easy to Use. Reminder Utility Added. Logs of The communication Supported. A Network (LAN) Messenger with File Transfer, Reminder Service and Logs. Message Encryption with Blowfish | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 623 kb | Commercial Go to category: Communications > Chat & Instant Messaging Similar programs | |||
129. | virtualCrypt 3.02 (netindiasolutions.com) | ||
drives is in encrypted format using strong 448 bit encryption with blowfish algorithm. Moreover these virtual drives are created in innocent sound files using steganographic technique. virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
130. | WinZip Compatible Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
131. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
for most common crypto algorithms, such as AES DES, TripleDES Blowfish Cast RC2 RC4 RC5 for symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
132. | X-COM 2.75 (mypersonalsoftware.com) | ||
a minimun of privacy: every communications is encrypted using the Blowfish encryption algorithm. You will be able to send messages / files and chat with anyone on your lan and internet. Features: - encrypted communications (Blowfish / 56 bit): - encrypted instant messenger - encrypted public chat - encrypted file transfer Peer2Peer Secure Instant Messenger | |||
Updated: 9, 2005 | Rating: 446 | Size: 2185 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
133. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive configuration | |||
Updated: 2, 2006 | Rating: 82 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
134. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive configuration | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
135. | Xizzo 1.2 (xizzo.com) | ||
"protection" for most users. Xizzo protects all data with enhanced Blowfish (448-bit) encryption, and both the application and all data files can be saved to removable media for further security. Xizzo's password management features includes one-click data entry, a user-friendly interface, an auto-logout feature for added security if you leave your computer, a customizable password | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Tessov | Size: 758 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|