|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
1. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | MSCCrypto for Windows 2.0 (miraplacid.com) | ||
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash) | |||
Updated: 9, 2005 | Rating: 313 | Author: Miraplacid Software Development | Size: 824 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
3. | PrivacyAssistant 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
4. | PrivacyAssistant Professional 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | SecurDataStor 5.01 (encryptx.com) | ||
different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a server-less authentication model. This file encryption software creates an encrypted archive or wrapper around the protected data and stores the permissions in that wrapper. This permission-based rights | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
6. | DriveCrypt 3.03a (drivecrypt.com) | ||
using the best and most proven cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des and Triple Des. DRIVECRYPT requires minimal administration and user training. DRIVECRYPT protects your data with very fast and a true "on the fly" encryption process. Using special so called "Steganographic" functionalities, DRIVECRYPT allows you to hide all your sensitive | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
key support (12 algorithms and 4 modes): Rijndael (AES) 128 and 256, Blowfish, Twofish 128 and 256, DES single, double and tripple, Square. TCPSManager component for compression and encryption settings, list of opened stream, memory leaks prevention. Native VCL, does not require any DLLs. 7 Demos | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
8. | axsStrongBox 2.1 (morello.co.uk) | ||
public domain algorithms - choose between Rijndael (AES), Twofish, Blowfish, DES and Triple DES (private key) or RSA (public key). ECB and CBC modes are available, with various standard padding options, for compatibility with other systems. Encrypting a file or a block of memory takes just a single method call. File encryption provides a convenient way of securing sensitive data | |||
Updated: 9, 2005 | Rating: 116 | Author: Tom Duncan | Size: 473 kb | Demo Go to category: Development > Active X Similar programs | |||
9. | Bind to EXE library 1.1 (codeoffice.com) | ||
embedded files can also be encrypted to increase their securities. Blowfish algorithm, one of the most secure encryption algorithms in the world, is employed to encrypt the files. In extracting stage, TExtractFromEXE can retrieve information about the collection of files embedded in the executable file, or just extract one or more files from the executable file specified by their | |||
Updated: 9, 2005 | Rating: 0 | Author: Chong-Wei CHEN | Size: 1587 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) | ||
Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure | |||
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Development > Other Similar programs | |||
11. | Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
12. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
13. | Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
14. | Chilkat Encryption .NET Component 2.2.0 (chilkatsoft.com) | ||
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider | |||
Updated: 9, 2005 | Rating: 42 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
15. | Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
16. | Chilkat XML Messaging 1.0.6 (chilkatsoft.com) | ||
and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive binary or text messages using CkData. The CkData component is handy for loading/saving data to files, accessing as binary, strings (with or | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Web Development > XML/CSS Tools Similar programs | |||
17. | Chilkat Zip ActiveX Compression Component 9.3.0 (chilkatsoft.com) | ||
your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
18. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
19. | !Chilkat Zip ActiveX Control 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
20. | Chilkat Zip Compression .NET Class 9.3.0 (chilkatsoft.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|