|
||||||
|
||
|
Home > Decryption software |
Related keywords: self decryption, Self Decryption, DES encryption decryption, guaranteed decryption |
|
|
1. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
After you have specified the conditions of the encryption or decryption operation and instructed the program to perform the operation the conditions are checked and any errors or exceptional conditions (such as the non-existence of the specified input files or lack of space on the output disk) are reported. Read more at http://www.hermetic.ch/crypto/me5aeman/prodinfo.htm | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | Auto FTP Premium 4.6 (primasoft.com) | ||
transfer sets for any future date/time. Strong File Encryption / Decryption: encryption allows you easily and quickly to encrypt and decrypt files selected for upload and/or download using the latest industry standard strong encryption. ZIP and UNZIP: Auto FTP Premium enables you to use the most popular ZIP archive file format. Upload and Download Site/Folder, Synchronize: Upload | |||
Updated: 2, 2006 | Rating: 0 | Author: Marek Kosznik | Size: 5100 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
3. | Auto FTP Service 4.6 (primasoft.com) | ||
transfers for any future data and time. Strong File Encryption / Decryption: encryption allows you easily and quickly to encrypt and decrypt files selected for upload and/or download using the latest industry standard strong encryption algorithms (AES known as Rijndael, Twofish, RSA,..). Special Actions: easy to use scripting function allows you to automate the transfer and | |||
Updated: 2, 2006 | Rating: 0 | Author: Marek Kosznik | Size: 5100 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
4. | Silver Key 3.3 (filecryption.com) | ||
shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for corporate usage. If you want to protect your data according to the HIPAA privacy regulations, our software lets you easily incorporate HIPAA-compliant encryption. Silver Key is the | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Silver Key 3.3 (kryptel.com) | ||
shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for corporate usage. If you want to protect your data according to the HIPAA privacy regulations, our software lets you easily incorporate HIPAA-compliant encryption. Silver Key is the | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
DevSolutionsCrypt library is a powerful and easy to use cryptographic ActiveX and DLL component for Windows developers that allows applications to encrypt/decrypt data or files using the latest industry standard strong encryption algorithms.It can be used to encrypt/decrypt strings,memory buffers,Blobs,Files | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
7. | Ultimate ZIP Cracker 7.3.1.5 (vdgsoftware.com) | ||
Customized search will use your own search template. - Guaranteed decryption method will decrypt your .DOC or .XLS file regardless of password used. Very fast on Pentium 4 system! - Plaintext attack will decrypt your whole encrypted .ZIP file if you have another unencrypted ZIP file (called plaintext file) which contains at least one file from the encrypted archive. The trial | |||
Updated: 2, 2006 | Rating: 1397 | Author: Dmitry Sushkov | Size: 920 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
8. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
It compresses and encrypts selected files and produces a self-decryption archive. The encrypted file can be decrypted simply by double clicking the archive with the given password for symmetric key mechanism and no input is necessary for certificate based decryption.. DevSolutions SecureFile also can be used to create a EncryptionArchive file. The encryption archive can | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
9. | CryptIt 1.301 (SinnerComputing.com) | ||
security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
Blowfish Cast RC2 RC4 RC5 for symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it comes to data manipulation. Blob is our object that can read files, string variables and bytes | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
11. | PDF Password Remover 2.5 (verypdf.com) | ||
into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat (including 5.x | |||
Updated: 2, 2006 | Rating: 6506 | Author: verypdf verypdf | Size: 521 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
12. | bitRipper 1.20 (omgsoft.com) | ||
performed after the copying process is completed Third-party CSS Decryption and CPPM authorization modules make bitRipper able to copy protected DVDs. bitRipper does not require gigabytes of space to copy all DVD content to the hard drive before converting to AVI or MPEG. It converts video | |||
Updated: 9, 2005 | Rating: 165 | Author: Mike Tishetsky | Size: 2094 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
13. | Secure Password Store 0.81 (lmphotonics.com) | ||
specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 607 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
14. | I-Cipher AP 2.2.2 (ambitware.com) | ||
to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form. I-Cipher is ideal for | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Chilkat XML Messaging Component 2.0.0 (chilkatsoft.com) | ||
TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
16. | SafeBox Industry 1.0 (aidsoft.com) | ||
SafeBox Industry is a new and powerfull file encryption solution. This application can also provide a strong protection, quite good compression, self-decrypting archives, good presentation (use skins form, splash screen), which may be used for secure distribution package.Features : Create Self-Decrypting | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
17. | Secure Password Store 0.91 (lmphotonics.com) | ||
specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 627 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
18. | SecureFile 2.0 (securefile.tripod.com) | ||
using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ private key ) for the process of encryption and decryption.It | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
19. | SecurityPlus 4.33 (softbytelabs.com) | ||
is a powerful encryption & decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on-the-fly encryption/decryption. SecurityPlus! is very fast and won't take long to encrypt/decrypt even large files (including files on CD-ROM). Current passwords (keys) | |||
Updated: 9, 2005 | Rating: 0 | Author: M. Purkhardt | Size: 568 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
20. | Business PDF Writer 1.02 (bureausoft.com) | ||
PDF compression, PDF split and merge, 128-bit encryption and decryption as well as PDF optimization. More than 60 languages are supported with special characters neatly printed in PDF files. As professional PDF publishing solution, Business PDF Writer offers quality PDF creation, conversion, and management that could be rarely found elsewhere. For more information, visit | |||
Updated: 9, 2005 | Rating: 0 | Author: Pierre Gilles | Size: 5671 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
21. | Multi-ZIP-licity 2.0 (softuarium.com) | ||
Multi-ZIP-licity is a program for people working with multiple ZIP files. Its primary function is to extract files from multiple archives and create multiple archives. Program also includes extra tools designed to encrypt and decrypt files, list contents of a folder as text, change attributes of multiple | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 787 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
22. | GreatCrypt 2.0 (miraxus.com) | ||
Detailed help system Fully compatible with Windows FREE decryption software FREE upgrade to all new versions The powerful file encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
23. | JvCrypt 1.0 (vandaveer.com) | ||
JvCrypt is a powerful encryption and compression utility that allows you to create encrypted files and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
24. | EzCrypt+ 2.01 (kmgi.com) | ||
Windows Explorer • Fast and simple with one-click encryption and decryption • Self-decrypting archives enable you to share encrypted data securely with people who don't have the program. To decrypt the archive the recipient just double-clicks on the archive file and enters the password. • Powerful and flexible: Encrypt single files, folders and entire directory trees • | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
25. | Crypto 2000 4.2 (gregorybraun.com) | ||
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | BestCrypt Corporate 1.12 (jetico.com) | ||
includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic installation/uninstallation and update of BestCrypt on remote client computers, creation of central Administrating Database on the server | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
27. | BlowFish 2000 2.8 (gregorybraun.com) | ||
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
28. | ChilkatZip Self-Extractor 1.0.0 (chilkatsoft.com) | ||
create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little memory. Create self-extracting ZIP files optionally with unbreakable AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 228 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
29. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
30. | Advanced Office Password Breaker 1.40 (elcomsoft.com) | ||
for our line of products. Guaranteed decryption of file open protected MS Word and Excel 97/2000 files regardless of password length or complexity because the encryption key is cracked, not the password. AOPB can open your file within a week on high end | |||
Updated: 9, 2005 | Rating: 4144 | Author: Vladimir Katalov | Size: 633 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
31. | Advanced PDF Password Recovery Std 1.50 (elcomsoft.com) | ||
or adding/changing annotations and form fields (in any combination). Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit, copy, print, annotate functions enabled. Can operate in a batch mode. The | |||
Updated: 9, 2005 | Rating: 4339 | Author: Vladimir Katalov | Size: 1206 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
32. | Without A Trace Surf Guard 5.91 (tekeffect.com) | ||
to completely hide the contents of a file or folder. Encryption and Decryption can also be done with ease by the authorized person. Gain the tools that you need to remain private, secure and get back your ability to surf the internet Without A Trace! Without A Trace Surf Guard is a powerful 3 in 1 privacy tool that combines a history eraser with a powerful pop up stopper and robust | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 4027 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
33. | Scripts Encryptor (ScrEnc) 2.1.3 (dennisbabkin.com) | ||
ScrEnc provides tools to encrypt your JavaScript/JScript, C/C++/MFC scripts before posting them online, or for distribution, preserving full functionality of those but making them very hard to read. ScrEnc can also decrypt previously encrypted scripts into fully readable source code files, including files | |||
Updated: 9, 2005 | Rating: 0 | Author: Dennis Babkin | Size: 202 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
34. | Max Net Shield 4.2 (maxnetshield.com) | ||
feature to transform any file into an encrypted format. Easy decryption capability. Extend the functionality of MNS to locate and erase history files left behind by other applications such as Adobe Acrobat, JASC PaintShop Pro, RealOne Player, Adobe Photoshop, Macromedia Flash Player, Eudora, and many more. Stealth Function allows you to hide the MNS program on the hard drive | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxion Software | Size: 6480 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
35. | CryptaFlix 1.10 (briggsoft.com) | ||
protection using the Advanced Encryption Standard (AES). On-the-fly decryption during playback eliminates the need for temporary files. Create self-playing videos that can be viewed by anyone with the applicable password. CryptaFlix also plays MPG videos. CryptaFlix is a video player for Windows with encryption capabilities for DivX and other AVI format movies. Protect your video | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 948 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
36. | EDCrypt 3.1 (softuarium.com) | ||
Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
37. | ACProtect standard 1.20 (ultraprotect.com) | ||
Special ACProtect Technics: Metamorph Engine- Metamorph decryption routines and several encrypted layers. The code being protected varies every time you protect your application. CodeReplace Engine - ACProtect can replace some of the protected program's code with its own codes without function loss and speed loss. This feature combine the protect code and the program code | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | AntiCrack Software Protector Basic 1.09 (anticrack.us) | ||
machine,the code protected can not decrypt. Polymorph - Polymorph decryption routines and several encrypted layers.The code being protected varied every time your protect your application. Embedded cryptor - You can specify the place in your application to embed the inner cryptor.With the embedded | |||
Updated: 9, 2005 | Rating: 535 | Author: Lusi Chen | Size: 1429 kb | Shareware Go to category: Development > Other Similar programs | |||
39. | Orbital's SQL Decryptor 2.2 (decryptor.orbitaltechnologies.org) | ||
directly on the SQL Server. Uses Unicode technology during the decryption process which allows for International use. Simple point-and-click decryption. Does not require any T-SQL scripting knowledge. Reduces time and money spent restoring lost source code to encrypted SQL objects. Never pay another developer to recreate and debug all of your lost SQL source code | |||
Updated: 9, 2005 | Rating: 0 | Author: Orbital Technologies | Size: 684 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
40. | DriveCrypt 3.03a (drivecrypt.com) | ||
to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
41. | Secura Archiver 1.6 (cmfperception.com) | ||
Secura Archiver is professional archiving software for use in personal or commercial environments that demand 128 bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 1509 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
42. | WinAVI DVD Copy 4.5 (winavi.com) | ||
for one copy. 2. Copy Movies in the Easiest Way! 3. Flawless CSS Decryption. 4. Ability to record on Dual Layer media (when you have a dual layer burner). 5. Excellent compression quality. 6. Compress & copy a dual-layer (D9) movie into a single-layer (D5) disc to save disc space. 7. Supports split DVD-9 into two blanks. 8. Supports DVD-9 to DVD-5 copy, allows you to copy main | |||
Updated: 6, 2005 | Rating: 771 | Size: 1863 kb | Shareware Similar programs | |||
43. | Crypton 1.0 (uic.nnov.ru) | ||
for you files. Crypton uses Blowfish algorithm for encryption and decryption, also allows file compression and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
44. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
45. | Smash! 1.3 (brokenmolds.com) | ||
is a fast, powerful, user friendly encryption and decryption utility, complete with Government level file wiping, and Government approved cryptography. When it comes to keeping your files secure, safe, and out of unwanted hands, Smash! is the answer to your every security need. Sporting familiar user-friendly features, and the capability of encrypting, decrypting, and wiping any | |||
Updated: 3, 2005 | Rating: 0 | Author: Broken Molds | Size: 1086 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
46. | Softcrypt Shellex 3.0.3 (righteoustech.com) | ||
files that can deactivate themselves automatically after too many decryption attempts, SecuPAD to avoid keyloggers, customizable interface, scrambled encrypted files names, data deletion beyond recovery, drag 'n drop, lost key recovery, shell integration - just to name a few of the great features of this software! Complete multithreaded high performance encryption software. Interface | |||
Updated: 3, 2005 | Rating: 16 | Author: Righteous Technologies | Size: 3266 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | Super Password Guard 3.1 (topaim.net) | ||
(for enhanced security, master password is used as encryption/decryption key only and is not stored anywhere). You can also assign a short master password hint text so if you accidentally forget your master password, the hint will help you to recall it. 3. Make custom categories/subcategories to divide your accounts into logical categories for easier access. 4. Security lock. you | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
48. | Private Sitez 3.0.1 (dcm-services.com) | ||
browser functions,modify/edit, printing, notes, auto-encryption and decryption. This programs minimizes to icon tray for conveniance. Built in utilities allow user to repair and backup main database file. The ultimate password organizer for Windows. Featuring URL Capture, auto-backup and | |||
Updated: 3, 2005 | Rating: 0 | Author: David Melvin | Size: 596 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
49. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
Lucigenic Crypt is a COM component that enables software developers to provide advanced cryptographic services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Decryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|