|
||||||
|
||
|
Home > Decryption software |
Related keywords: self decryption, Self Decryption, DES encryption decryption, guaranteed decryption |
|
|
1. | ACProtect standard 1.20 (ultraprotect.com) | ||
Special ACProtect Technics: Metamorph Engine- Metamorph decryption routines and several encrypted layers. The code being protected varies every time you protect your application. CodeReplace Engine - ACProtect can replace some of the protected program's code with its own codes without function loss and speed loss. This feature combine the protect code and the program code | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | Advanced Office Password Breaker 1.40 (elcomsoft.com) | ||
for our line of products. Guaranteed decryption of file open protected MS Word and Excel 97/2000 files regardless of password length or complexity because the encryption key is cracked, not the password. AOPB can open your file within a week on high end | |||
Updated: 9, 2005 | Rating: 4144 | Author: Vladimir Katalov | Size: 633 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
3. | Advanced PDF Password Recovery Std 1.50 (elcomsoft.com) | ||
or adding/changing annotations and form fields (in any combination). Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit, copy, print, annotate functions enabled. Can operate in a batch mode. The | |||
Updated: 9, 2005 | Rating: 4339 | Author: Vladimir Katalov | Size: 1206 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
4. | AntiCrack Software Protector Basic 1.09 (anticrack.us) | ||
machine,the code protected can not decrypt. Polymorph - Polymorph decryption routines and several encrypted layers.The code being protected varied every time your protect your application. Embedded cryptor - You can specify the place in your application to embed the inner cryptor.With the embedded | |||
Updated: 9, 2005 | Rating: 535 | Author: Lusi Chen | Size: 1429 kb | Shareware Go to category: Development > Other Similar programs | |||
5. | Auto FTP Premium 4.6 (primasoft.com) | ||
transfer sets for any future date/time. Strong File Encryption / Decryption: encryption allows you easily and quickly to encrypt and decrypt files selected for upload and/or download using the latest industry standard strong encryption. ZIP and UNZIP: Auto FTP Premium enables you to use the most popular ZIP archive file format. Upload and Download Site/Folder, Synchronize: Upload | |||
Updated: 2, 2006 | Rating: 0 | Author: Marek Kosznik | Size: 5100 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
6. | Auto FTP Service 4.6 (primasoft.com) | ||
transfers for any future data and time. Strong File Encryption / Decryption: encryption allows you easily and quickly to encrypt and decrypt files selected for upload and/or download using the latest industry standard strong encryption algorithms (AES known as Rijndael, Twofish, RSA,..). Special Actions: easy to use scripting function allows you to automate the transfer and | |||
Updated: 2, 2006 | Rating: 0 | Author: Marek Kosznik | Size: 5100 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
7. | BestCrypt Corporate 1.12 (jetico.com) | ||
includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic installation/uninstallation and update of BestCrypt on remote client computers, creation of central Administrating Database on the server | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
8. | BlowFish 2000 2.8 (gregorybraun.com) | ||
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | Business PDF Writer 1.02 (bureausoft.com) | ||
PDF compression, PDF split and merge, 128-bit encryption and decryption as well as PDF optimization. More than 60 languages are supported with special characters neatly printed in PDF files. As professional PDF publishing solution, Business PDF Writer offers quality PDF creation, conversion, and management that could be rarely found elsewhere. For more information, visit | |||
Updated: 9, 2005 | Rating: 0 | Author: Pierre Gilles | Size: 5671 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
10. | Chilkat XML Messaging Component 2.0.0 (chilkatsoft.com) | ||
TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
11. | ChilkatZip Self-Extractor 1.0.0 (chilkatsoft.com) | ||
create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little memory. Create self-extracting ZIP files optionally with unbreakable AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 228 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
12. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
13. | CryptaFlix 1.10 (briggsoft.com) | ||
protection using the Advanced Encryption Standard (AES). On-the-fly decryption during playback eliminates the need for temporary files. Create self-playing videos that can be viewed by anyone with the applicable password. CryptaFlix also plays MPG videos. CryptaFlix is a video player for Windows with encryption capabilities for DivX and other AVI format movies. Protect your video | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 948 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
14. | CryptIt 1.301 (SinnerComputing.com) | ||
security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Crypto 2000 4.2 (gregorybraun.com) | ||
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
16. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
After you have specified the conditions of the encryption or decryption operation and instructed the program to perform the operation the conditions are checked and any errors or exceptional conditions (such as the non-existence of the specified input files or lack of space on the output disk) are reported. Read more at http://www.hermetic.ch/crypto/me5aeman/prodinfo.htm | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
17. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
DevSolutionsCrypt library is a powerful and easy to use cryptographic ActiveX and DLL component for Windows developers that allows applications to encrypt/decrypt data or files using the latest industry standard strong encryption algorithms.It can be used to encrypt/decrypt strings,memory buffers,Blobs,Files | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
18. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
It compresses and encrypts selected files and produces a self-decryption archive. The encrypted file can be decrypted simply by double clicking the archive with the given password for symmetric key mechanism and no input is necessary for certificate based decryption.. DevSolutions SecureFile also can be used to create a EncryptionArchive file. The encryption archive can | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
19. | DriveCrypt 3.03a (drivecrypt.com) | ||
to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | EDCrypt 3.1 (softuarium.com) | ||
Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Decryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|