|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
1. | ABC CHAOS 2.71 (safechaos.com) | ||
ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. | |||
Updated: 3, 2006 | Rating: 42 | Size: 438 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | ABC CHAOS 2.71 (safechaos.net) | ||
ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. | |||
Updated: 3, 2006 | Rating: 0 | Size: 438 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
3. | Masker 7.0.6 (softpuls.com) | ||
encrypts files using strong encryption algorithms. (CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit, TWOFISH) The encrypted files will then be hidden within a carrierfile. MASKER is able to compress files in order to reduce size of the carrier file. As a carrier file you can use: image files (bmp, gif | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | Advanced Encryption Package 2006 4.2.9 (secureaction.com) | ||
your private files. Program supports strong encryption algorithms Blowfish with 448 bit key, Rijndael with 256 bit key, CAST with 256 bit key, DES with 128 bit key. AEP2006 supports skins technology and has 10 nice additional skins! Moreover program has full support for ZIP files! I.e. ability to add | |||
Updated: 2, 2006 | Rating: 105 | Author: SecureAction Research, LLC | Size: 2558 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, SAFER, 3-WAY, GOST, SHARK, SQUARE, SKIPJACK, TWOFISH, MARS, SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | Secure Password Manager 2.2.1.1 (securekit.com) | ||
Password Manager uses industrial strength 256-bit AES/Rijndael/Blowfish encryption to keep your passwords secure. Secure Password Manager is well designed to let you store and track names, passwords, credit cards, software serial numbers and confidential notes in an encrypted form securely and easily. It can automatically fill login information for you. Features include password | |||
Updated: 2, 2006 | Rating: 0 | Author: securekit kit | Size: 1327 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Password Manager XP 2.1.322 (cp-lab.com) | ||
information with several encryption algorithms simultaneously (Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish). Importantly, no temporary files are ever created, guaranteeing the encrypted data will never be intercepted. The blocks of information are cleared from the computer memory as soon as they are no longer needed. And if the program is left idle for a set | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
8. | Simplyzip 1.1b63 (paehl.de) | ||
other think. With filecryption: Rijndael/Twofish (256 bit keysize) + Blowfish (448 bit keysize) Simplyzip is a multi archiver.Can open:ZIP,CZIP,ACE,CAB,RAR,TAR,GZIP,LZH,BZ2,SQX, RS, UUE,XXE,BASE64,UCL,ARJ,ZLIB,RPM,DEB,7-ZIP Create: 7z, ZIP,CZIP,Cab,LHA,TAR,TAR GZ TAR BZ2,ACE (optionale DLL), Deepfreezer SQX,UCL,RS,ZIP-SFX/LHA-SFX and | |||
Updated: 2, 2006 | Rating: 1552 | Author: Dirk Paehl | Size: 1772 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
9. | Simplyzip 1.1b63 (free.pages.at) | ||
other think. With filecryption: Rijndael/Twofish (256 bit keysize) + Blowfish (448 bit keysize) Simplyzip is a multi archiver.Can open:ZIP,CZIP,ACE,CAB,RAR,TAR,GZIP,LZH,BZ2,SQX, RS, UUE,XXE,BASE64,UCL,ARJ,ZLIB,RPM,DEB,7-ZIP Create: 7z, ZIP,CZIP,Cab,LHA,TAR,TAR GZ TAR BZ2,ACE (optionale DLL), Deepfreezer SQX,UCL,RS,ZIP-SFX/LHA-SFX and | |||
Updated: 2, 2006 | Rating: 0 | Author: Dirk Paehl | Size: 1772 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
10. | MySQL Dump Timer 1.6.0 (richtsoft.com) | ||
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL | |||
Updated: 2, 2006 | Rating: 311 | Author: Dirk Richter | Size: 1871 kb | Shareware Similar programs | |||
11. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to remote hosts, through | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
12. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive configuration | |||
Updated: 2, 2006 | Rating: 82 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
13. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
Standard (AES) .It also supports Serpent, Mars, Triple DES,Blowfish algorithms. DevSolutionsCrypt component is designed to guard your client's or application's sensitive information with powerful byte/binary encryption algorithms.You can use it to secure your sensitive information such as passwords and credit card numbers when storing them in a databas DevSolutionsCrypt library | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
14. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program!. This strong encryption software ensures that it is | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet, Intranet, or direct dial-up modems. RBackup has many failsafe features, and conforms to standard backup methodology. RBackup can be used to operate a subscription-based retail Remote Backup Service | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
16. | PowerKey 2.11.01.22 (elcor.net) | ||
PowerKey is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
17. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
DevSolutions SecureFile 3.1 is an easy to use encryption and compression program, which is able to encrypt your personal files and sensitive data quickly, easily and securely. In addition to encryption, SecureFile creates self-decrypting exe - files which anybody with the right password / certificate can | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
18. | CryptoCrat 2005 4.61 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
19. | Axessh Windows SSH Client 3.2 (labf.com) | ||
Axessh is a Windows SSH client. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to Axessh without sacrificing any of existing functionality. Furthermore, Axessh has been developed entirely outside of the USA, and can be sold anywhere in the world (apart from places | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
20. | Advanced Encryption Plug-In Pro for Windows Explorer 4.0.3 (secureaction.com) | ||
encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CAST, RC2, Twofish, Diamond2, Mars, Gost, Tea, Safer and so on (17 algorithms). All algorithms are industrial encryption standards. Shredding (Safe removing files from your system). The shredded files will never be restored even with using Norton Unerase software. Making SFX (Self-extracting archives) | |||
Updated: 2, 2006 | Rating: 25 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
21. | Active Backup Expert Pro 1.92 (backuptool.com) | ||
Other features include selecting files by date, size and attributes, Blowfish backup encryption, creating self-extracting backups, the support for the Command-line and ActiveX automation. The ample documentation is available. The ABE Pro creates the unattended backups by using the Active Task Manager | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Panichkin | Size: 2582 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
22. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to remote hosts, through | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
23. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive configuration | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
24. | IPTunnelManager 1.3 (apbsoft.com) | ||
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic. Thus, the program makes it possible to create a secure connection for any application or service using TCP/IP (HTTP, FTP, SMTP, POP, NNTP, SNPP, Telnet, etc.). It is especially important for those | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Aronovich | Size: 1189 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | Bookmark Buddy 3.5.2 (bookmarkbuddy.net) | ||
(web addresses, notes, log-in details, the lot) with 128-bit Blowfish encryption. Keep track of web sites with Bookmark Buddy's bookmark checker - it works in the background so you won't need to wait while it runs. Create and share any number of collections of bookmarks (for work, home, projects, clients) - up to 50,000 in any bookmark list! Export your bookmarks to a | |||
Updated: 2, 2006 | Rating: 0 | Author: Edward Leigh | Size: 464 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
26. | AbsoluteTelnet 4.01 (celestialsoftware.net) | ||
find comfortable and familiar, while encryption options such as Blowfish, Twofish, AES, Arcfour, 3DES, Cast128, IDEA, and RC4 give you the maximum security you desire in today's insecure Internet. AbsoluteTelnet was written from the ground up as a 32-bit multithreaded application that performs at a blistering pace in Windows 95, 98, ME, NT, 2000, and XP. Socks proxy gives you the | |||
Updated: 2, 2006 | Rating: 90 | Author: Brian Pence | Size: 1486 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
27. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
for most common crypto algorithms, such as AES DES, TripleDES Blowfish Cast RC2 RC4 RC5 for symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
28. | Cryptocx v6 6.1.3 (easybyte.com) | ||
delete) files Encrypt and decrypt strings and files with 448 Bit Blowfish Has the Fastest file encryption/decryption 256 Bit AES encryption/decryption for files and string Easily add Cryptocx v6 to your website or application in minutes Cryptocx is an Open PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx encrypts and | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
29. | Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) | ||
Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure | |||
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Development > Other Similar programs | |||
30. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
31. | AES Home 4.0 (abensoft.com) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
32. | AES Pro 5.5 (abensoft.com) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
33. | Absolute CHAOS 3.8 (safechaos.com) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 0 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
34. | Home CHAOS 3.5 (safechaos.com) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
35. | StrongDisk Pro 3.0 (strongdisk.com) | ||
Strength Encryption algorithms with up to 448-bit keys: AES, GOST, Blowfish, 3DES, CAST-128, SAFER, IDEA, RC5. - Three-factor authentication using PKCS#11-compatible tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | Private Encryptor 6.2 (tropsoft.com) | ||
and Self Decrypting Executables. Registered version has DES, and Blowfish encryption, stronger encryption available as an add on. Features an extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | Utalk Network Messenger 1.00 (unicorntech.net) | ||
File Transfer, Reminder Service and Logs. Message Encryption with Blowfish Algorithm. Multicasting and Broadcasting Supported. Multiple File Attachments Supported. Attractive Interface and Easy to Use. Reminder Utility Added. Logs of The communication Supported. A Network (LAN) Messenger with File Transfer, Reminder Service and Logs. Message Encryption with Blowfish | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 623 kb | Commercial Go to category: Communications > Chat & Instant Messaging Similar programs | |||
38. | PalmTree 3.5 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
Strength Encryption algorithms with up to 448-bit keys: AES, GOST, Blowfish, 3DES, CAST-128, SAFER, IDEA, RC5. - Three-factor authentication using PKCS#11-compatible tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | CryptoCrat 2005 4.60 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 9, 2005 | Rating: 39 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
41. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
42. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
43. | WinZip Compatible Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
44. | Xizzo 1.2 (xizzo.com) | ||
"protection" for most users. Xizzo protects all data with enhanced Blowfish (448-bit) encryption, and both the application and all data files can be saved to removable media for further security. Xizzo's password management features includes one-click data entry, a user-friendly interface, an auto-logout feature for added security if you leave your computer, a customizable password | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Tessov | Size: 758 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
45. | Chilkat XML Messaging Component 2.0.0 (chilkatsoft.com) | ||
and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive binary or text messages using CkData. The CkData component is handy for loading/saving data to files, accessing as binary, strings (with or | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
46. | iOpus Secure Email Attachments - Encrypted and Self-extracting 1.0 (iopus.com) | ||
it before decrypting the iOpus SEA package. iOpus SEA uses the Blowfish encryption algorithm with a key length of up to 448 bits. Blowfish encryption is so strong that it has never been cracked yet. In fact, most experts agree that it cannot be cracked with current computer technology and | |||
Updated: 9, 2005 | Rating: 0 | Author: iOpus GmbH | Size: 998 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
47. | virtualCrypt 3.02 (netindiasolutions.com) | ||
drives is in encrypted format using strong 448 bit encryption with blowfish algorithm. Moreover these virtual drives are created in innocent sound files using steganographic technique. virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
48. | Private Encryptor 6.2 (tropsoft.com) | ||
and Self Decrypting Executables. Registered version has DES, and Blowfish encryption, stronger encryption available as an add on. Features an extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
49. | USA Shield 2.15 (usa.safeworld.info) | ||
USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
50. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
SafeHouse provides transparent on-the-fly encryption for your notebook or desktop personal computer. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. All encryption is | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
51. | Secura Backup Professional 2.13 (cmfperception.com) | ||
paths, FTP sites, CD/DVDs, and even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
52. | SecureFile 2.0 (securefile.tripod.com) | ||
the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ private key ) for the process of encryption and decryption.It supports secure file deleting and backup of encrypted files It compresses and encrypts selected files and produces a | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
53. | PalmTree 3.3 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
54. | Passphrase Keeper 2.60 (passphrasekeeper.com) | ||
passwords, PINs, combinations, credit card numbers - using powerful Blowfish encryption. A single password - the only one you'll need to remember - unlocks it all! Passphrase Keeper fills in login forms automatically or with drag and drop, generates passwords, opens websites, prints or exports data to HTML and text, and more. Includes support for multiple databases, database backup | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Johnson | Size: 1643 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
55. | PowerKey 2.0 (gals1.chat.ru) | ||
of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process. After it the encryption is done and you receive a | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
56. | Hot Crypt 1.2 (softcomplete.com) | ||
is one touch text encryption software. Using algorithms Blowfish, DES, Diamond, IDEA, Mars, MISTY1, RC2, RC4, RC5, RC6, RedocIII, Sapphire, Skipjack, Tea. Support compression and Base64 encoding. Working with embedded in text pictures and objects. Can be activated under any edit windows (MS Word, Notepad, Outlook, Eudora, TheBat, etc). HotCrypt is one touch text encryption | |||
Updated: 9, 2005 | Rating: 48 | Size: 848 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
57. | Invisible CHAOS 5.1 (safechaos.net) | ||
Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
58. | EldoS KeyLord 4.0 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
59. | EXEsafe 2 (members.aol.com) | ||
such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will process all the information, and decide whether access should be allowed. If not, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | CryptEnCrypt 1.10 (inetprom.com) | ||
CryptEnCrypt is a powerful software application designed for electronic data protection. The files on your hard disk have no protection from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
61. | Data Stash 1.5 (skyjuicesoftware.com) | ||
fully functional. Password protection is also provided, using Blowfish encryption. This is useful if you wish to keep out certain files from prying eyes, under the guise of a normal file. For example you can hide sensitive document files into a bitmap file, and retrieve them later. Opening the bitmap file would only show the image of the bitmap, and not the files that are stored | |||
Updated: 9, 2005 | Rating: 0 | Author: Chooi Guan Lim | Size: 384 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
62. | DigiSecret 2.0 (tamos.com) | ||
by the best mathematicians in the world: CAST (128-bit key), Blowfish (448-bit key), Twofish (256-bit key), and Rijndael (also known as AES, 256-bit key). The program provides the option to choose the interface language: English, German, French, Spanish, or Russian. An application for strong file encryption, compression, and file sharing (peer to peer). It utilizes time-proven | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
63. | BestCrypt 7.20.2 (jetico.com) | ||
encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish, GOST, DES. Time-out and Hot Key options. The wiping utility is included allowing you to wipe files, free space, swap file and file slacks that nobody can restore your files later. This version includes support for Windows XP, swap file encryption, and a "hidden" container feature. BestCrypt is | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
64. | BlowFish 2000 2.8 (gregorybraun.com) | ||
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
65. | Chameleon 2.0 (members.optushome.com.au) | ||
files by compressing (WinZip v1.0), encrypting (Double 128 bit Blowfish encryption fast algorithm (ASM)) on the fly, scrambling them and then attaching them to the host files of your choice. This Chameleon file then looks and behaves like a normal file, and can be stored, used, upload/download or emailed without attracting attention. There is also additional security for your | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
66. | CHAOS Chameleon 3.8 (safechaos.net) | ||
CHAOS Chameleon allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. CHAOS Chameleon has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. CHAOS Chameleon has | |||
Updated: 9, 2005 | Rating: 0 | Size: 374 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
67. | CHAOS For Security 2.9 (safechaos.net) | ||
Encrypt and compress individual files and folders. Drag and Drop support. CHAOS for security of your secrets. Encrypt and compress individual files and folders. | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | CHAOS Public Key 4.23 (safechaos.net) | ||
CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send off data on email. The program is compact, efficient and user friendly. CHAOS supports Windows drag-and-drop | |||
Updated: 9, 2005 | Rating: 0 | Size: 410 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
69. | CHAOS' Doors 3.7 (safechaos.net) | ||
Comprehensive privacy tools including file/folder encryption, e-mail encryption, file/folder shredder. The program is compact, efficient and user friendly. Required cryptographic procedures are enforced in the new graphical user interface Drag and Drop support. CHAOS' doors is opened in a world of safety | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
70. | Cipherlok 2.1 (softlok.com) | ||
highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be automatically encrypted at shutdown and decrypted at startup ensuring security when, for example, travelling with a notebook computer. A secure file | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
71. | Absolute CHAOS 3.8 (safechaos.net) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 16 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
72. | Advanced Encryption Plug-In for Windows Explorer 4.0.2 (secureaction.com) | ||
encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CASTt. All algorithms are industrial encryption standards. Shredding (Safely removing files from your system). The shredded files will never be restored even with using Norton Unerase software. Making SFX (Self-extracting archives) from your files. It allows you to send encrypted .exe files to your | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
73. | AES Home 4.0 (aes.safeworld.info) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
74. | AES Pro 5.5 (aes.safeworld.info) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 16 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
75. | Aha Password and Info Manager 7.03.01 (fronture.com) | ||
You can store ID, passwords, and all the information securely in your computer or our network server and access it from anywhere on the glove. Instead of typing or inconvenient copy-and-paste, you can just press hot key (Ctrl+1 for ID, Ctrl+2 for Password, Ctrl+3 through Ctrl+9 for your other data) or | |||
Updated: 9, 2005 | Rating: 0 | Author: Edward Kang | Size: 281 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
76. | X-COM 2.75 (mypersonalsoftware.com) | ||
a minimun of privacy: every communications is encrypted using the Blowfish encryption algorithm. You will be able to send messages / files and chat with anyone on your lan and internet. Features: - encrypted communications (Blowfish / 56 bit): - encrypted instant messenger - encrypted public chat - encrypted file transfer Peer2Peer Secure Instant Messenger | |||
Updated: 9, 2005 | Rating: 446 | Size: 2185 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
77. | Secure Network Chat 2.6.43 (secureaction.com) | ||
All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, Ltd | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
78. | Secure Network Messenger 1.5.5 (networkmessengers.com) | ||
Secure Network Messenger (SNM) - is a real time network communication program able to send and receive messages and files from one computer to another without using dedicated servers. All communication is highly secure! All traffic between copies of SNM is encrypted by strong encryption algorithms. The | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 598 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
79. | SecureCRT 4.1.2 (promaxum.com) | ||
both SSH1 and SSH2 protocols. SSH2 support provides AES, 3DES, RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
80. | NoTrax 1.4 (heidi.ie) | ||
activate at any time during browsing. The Cache is encrypted using Blowfish. NoTrax supports SSL (Secure Socket Layer) and TLS (Transport Layer Security). The root certificates are built-in. NoTrax comes with an automatic shutdown option if idle for a certain amount of time (you decide). NoTrax does | |||
Updated: 9, 2005 | Rating: 0 | Author: Garrett Trant | Size: 2221 kb | Commercial Go to category: Security & Privacy > Other Similar programs | |||
81. | ISequre for Windows 1.4 (isecure.tripod.com) | ||
will protect your chat session encoding all messages with the Blowfish encryption algorithm. ISequre works transparently and does not add any new interface elements except its icon on the systray. You can use different keys for each of your chat partners simultaneously. ISequre is a security software application that enables you and your friends or co-workers to exchange encrypted | |||
Updated: 9, 2005 | Rating: 0 | Size: 152 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
82. | Email CHAOS 4.52 (safechaos.net) | ||
With E-mail CHAOS you can protect the privacy of your e-mail messages, files and folders by encrypting them so that only the intended recipients can read them. You can also digitally sign messages and files, which ensures their authenticity. When someone sends you e-mail with their digital signature, CHAOS | |||
Updated: 9, 2005 | Rating: 0 | Size: 424 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
83. | Acid Drop 1.3 (el-software.com) | ||
using the LZH compression format or protect your text strings with Blowfish encryption. Acid Drop also acts as a clipboard monitor, storing copied text snippets and making those clips accessible via a simple log. Just highlight the text snippet you want to paste into an application, then utilize the usual CTL-V hotkey combination to paste the text. URLs embedded in your text are | |||
Updated: 9, 2005 | Rating: 33 | Author: Aleksey Nikolayevich Remizov | Size: 1255 kb | Shareware Go to category: Home & Hobby > Cataloging Similar programs | |||
84. | ActiveDiary 3.5 (windine.com) | ||
is a password-protected diary application. The program uses RSA and Blowfish encryption to protect your data and files. The interface is similar to Microsoft Outlook and is completely configurable. The program can hold an unlimited number of accounts that each contains unlimited calendar and free form | |||
Updated: 9, 2005 | Rating: 104 | Author: Mike Kallay | Size: 11381 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
85. | CryptaPix 2.24 (briggsoft.com) | ||
Full screen slideshows. Secure 80-bit PC1 (RC4 clone) and 160-bit Blowfish encryption keeps your private image collection away from prying eyes. Encrypted thumbnail and WAV sound support. Conversion, printing and secure wipe features are also available. Graphics viewer/encryption for Windows 95 to XP. Supports GIF, JPG, PNG, PCX, TIF, and BMP images. Full screen slideshows. Secure | |||
Updated: 9, 2005 | Rating: 16 | Author: Kent Briggs | Size: 674 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
86. | MyComponents 1.0.7b (mycode.free.fr) | ||
with source for BCB (C++ BUILDER). Version Info, Windows XP Style, BlowFish, CRC Free components with source for BCB (C++ BUILDER). Version Info, Windows XP Style, BlowFish | |||
Updated: 9, 2005 | Rating: 2931 | Author: Stephane BRUN | Size: 121 kb | Freeware Go to category: Development > Components & Libraries Similar programs | |||
87. | OpenSSL 0.9.7c (download.componentspot.com) | ||
algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
88. | MySQL Dump Timer 1.2.4 (mywitch.de) | ||
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL | |||
Updated: 9, 2005 | Rating: 16 | Author: Dirk Richter | Size: 1871 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
89. | EDCrypt 3.1 (softuarium.com) | ||
- encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files Help files and example | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
90. | cryptlib 3.0 (download.componentspot.com) | ||
cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
91. | Cryptocx v5 5.1.6 (easybyte.com) | ||
functionality. · Encrypt and decrypt strings and files with 128Bit Blowfish encryption. · Has the Fastest file encryption/decryption · 256 Bit AES encryption/decryption for files and string · Easily add Cryptocx v5 to your website or application in minutes. Cryptocx is a PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
92. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
key support (12 algorithms and 4 modes): Rijndael (AES) 128 and 256, Blowfish, Twofish 128 and 256, DES single, double and tripple, Square. TCPSManager component for compression and encryption settings, list of opened stream, memory leaks prevention. Native VCL, does not require any DLLs. 7 Demos | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
93. | axsStrongBox 2.1 (morello.co.uk) | ||
public domain algorithms - choose between Rijndael (AES), Twofish, Blowfish, DES and Triple DES (private key) or RSA (public key). ECB and CBC modes are available, with various standard padding options, for compatibility with other systems. Encrypting a file or a block of memory takes just a single method call. File encryption provides a convenient way of securing sensitive data | |||
Updated: 9, 2005 | Rating: 116 | Author: Tom Duncan | Size: 473 kb | Demo Go to category: Development > Active X Similar programs | |||
94. | Bind to EXE library 1.1 (codeoffice.com) | ||
embedded files can also be encrypted to increase their securities. Blowfish algorithm, one of the most secure encryption algorithms in the world, is employed to encrypt the files. In extracting stage, TExtractFromEXE can retrieve information about the collection of files embedded in the executable file, or just extract one or more files from the executable file specified by their | |||
Updated: 9, 2005 | Rating: 0 | Author: Chong-Wei CHEN | Size: 1587 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
96. | Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
97. | Chilkat Encryption .NET Component 2.2.0 (chilkatsoft.com) | ||
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider | |||
Updated: 9, 2005 | Rating: 42 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
98. | Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
99. | Chilkat XML Messaging 1.0.6 (chilkatsoft.com) | ||
and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive binary or text messages using CkData. The CkData component is handy for loading/saving data to files, accessing as binary, strings (with or | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Web Development > XML/CSS Tools Similar programs | |||
100. | Chilkat Zip ActiveX Compression Component 9.3.0 (chilkatsoft.com) | ||
your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|