|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
21. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
22. | CryptaPix 2.24 (briggsoft.com) | ||
Full screen slideshows. Secure 80-bit PC1 (RC4 clone) and 160-bit Blowfish encryption keeps your private image collection away from prying eyes. Encrypted thumbnail and WAV sound support. Conversion, printing and secure wipe features are also available. Graphics viewer/encryption for Windows 95 to XP. Supports GIF, JPG, PNG, PCX, TIF, and BMP images. Full screen slideshows. Secure | |||
Updated: 9, 2005 | Rating: 16 | Author: Kent Briggs | Size: 674 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
23. | ActiveDiary 3.5 (windine.com) | ||
is a password-protected diary application. The program uses RSA and Blowfish encryption to protect your data and files. The interface is similar to Microsoft Outlook and is completely configurable. The program can hold an unlimited number of accounts that each contains unlimited calendar and free form | |||
Updated: 9, 2005 | Rating: 104 | Author: Mike Kallay | Size: 11381 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
24. | AbsoluteTelnet 4.01 (celestialsoftware.net) | ||
find comfortable and familiar, while encryption options such as Blowfish, Twofish, AES, Arcfour, 3DES, Cast128, IDEA, and RC4 give you the maximum security you desire in today's insecure Internet. AbsoluteTelnet was written from the ground up as a 32-bit multithreaded application that performs at a blistering pace in Windows 95, 98, ME, NT, 2000, and XP. Socks proxy gives you the | |||
Updated: 2, 2006 | Rating: 90 | Author: Brian Pence | Size: 1486 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
25. | Acid Drop 1.3 (el-software.com) | ||
using the LZH compression format or protect your text strings with Blowfish encryption. Acid Drop also acts as a clipboard monitor, storing copied text snippets and making those clips accessible via a simple log. Just highlight the text snippet you want to paste into an application, then utilize the usual CTL-V hotkey combination to paste the text. URLs embedded in your text are | |||
Updated: 9, 2005 | Rating: 33 | Author: Aleksey Nikolayevich Remizov | Size: 1255 kb | Shareware Go to category: Home & Hobby > Cataloging Similar programs | |||
26. | Advanced HTMLCoder 3.0 (raysion.com) | ||
for private use only, you can encrypt its code (using powerful Blowfish and GOST encryption algorithms) and set the access password. You can also protect the source code of your pages from unethical competitors by encrypting it and disabling certain functions, including the display of URLs in the status bar, text selection, right mouse button operations, printing and copying | |||
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
27. | Bookmark Buddy 3.5.2 (bookmarkbuddy.net) | ||
(web addresses, notes, log-in details, the lot) with 128-bit Blowfish encryption. Keep track of web sites with Bookmark Buddy's bookmark checker - it works in the background so you won't need to wait while it runs. Create and share any number of collections of bookmarks (for work, home, projects, clients) - up to 50,000 in any bookmark list! Export your bookmarks to a | |||
Updated: 2, 2006 | Rating: 0 | Author: Edward Leigh | Size: 464 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
28. | Email CHAOS 4.52 (safechaos.net) | ||
With E-mail CHAOS you can protect the privacy of your e-mail messages, files and folders by encrypting them so that only the intended recipients can read them. You can also digitally sign messages and files, which ensures their authenticity. When someone sends you e-mail with their digital signature, CHAOS | |||
Updated: 9, 2005 | Rating: 0 | Size: 424 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
29. | hCrypt 3.0 (raysion.com) | ||
in a few simple steps. For strong protection you can use powerful Blowfish (448 bit encryption, password length up to 56 symbols) and GOST (256 bit encryption, password length 32 symbols) encryption algorithms. To protect less sensitive information, you may use simple but extremely fast XOR encryption. You can customize the appearance of the password prompt (fonts, colors, text) | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
30. | IPTunnelManager 1.3 (apbsoft.com) | ||
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic. Thus, the program makes it possible to create a secure connection for any application or service using TCP/IP (HTTP, FTP, SMTP, POP, NNTP, SNPP, Telnet, etc.). It is especially important for those | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Aronovich | Size: 1189 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
31. | ISequre for Windows 1.4 (isecure.tripod.com) | ||
will protect your chat session encoding all messages with the Blowfish encryption algorithm. ISequre works transparently and does not add any new interface elements except its icon on the systray. You can use different keys for each of your chat partners simultaneously. ISequre is a security software application that enables you and your friends or co-workers to exchange encrypted | |||
Updated: 9, 2005 | Rating: 0 | Size: 152 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
32. | Secure Network Chat 2.6.43 (secureaction.com) | ||
All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, Ltd | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
33. | Secure Network Messenger 1.5.5 (networkmessengers.com) | ||
Secure Network Messenger (SNM) - is a real time network communication program able to send and receive messages and files from one computer to another without using dedicated servers. All communication is highly secure! All traffic between copies of SNM is encrypted by strong encryption algorithms. The | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 598 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
34. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive configuration | |||
Updated: 2, 2006 | Rating: 82 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
35. | SecureCRT 4.1.2 (promaxum.com) | ||
both SSH1 and SSH2 protocols. SSH2 support provides AES, 3DES, RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
36. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to remote hosts, through | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
37. | X-COM 2.75 (mypersonalsoftware.com) | ||
a minimun of privacy: every communications is encrypted using the Blowfish encryption algorithm. You will be able to send messages / files and chat with anyone on your lan and internet. Features: - encrypted communications (Blowfish / 56 bit): - encrypted instant messenger - encrypted public chat - encrypted file transfer Peer2Peer Secure Instant Messenger | |||
Updated: 9, 2005 | Rating: 446 | Size: 2185 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
38. | Absolute CHAOS 3.8 (safechaos.net) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 16 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | Active Backup Expert Pro 1.92 (backuptool.com) | ||
Other features include selecting files by date, size and attributes, Blowfish backup encryption, creating self-extracting backups, the support for the Command-line and ActiveX automation. The ample documentation is available. The ABE Pro creates the unattended backups by using the Active Task Manager | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Panichkin | Size: 2582 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
40. | CryptoCrat 2005 4.61 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|