|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
81. | Hot Crypt 1.2 (softcomplete.com) | ||
is one touch text encryption software. Using algorithms Blowfish, DES, Diamond, IDEA, Mars, MISTY1, RC2, RC4, RC5, RC6, RedocIII, Sapphire, Skipjack, Tea. Support compression and Base64 encoding. Working with embedded in text pictures and objects. Can be activated under any edit windows (MS Word, Notepad, Outlook, Eudora, TheBat, etc). HotCrypt is one touch text encryption | |||
Updated: 9, 2005 | Rating: 48 | Size: 848 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
82. | Hybrid 2.2.1 (righteoustech.com) | ||
decrypts files for storage on your computer. It uses the well known Blowfish encryption algorithm with 448-bit encryption. Hybrid offers an easy to use interface with drag and drop support and also integrates into the Windows Explorer right click menu for fast and easy access. You can add single or multiple files and include directories with their subdirectories all with a few mouse | |||
Updated: 3, 2005 | Rating: 0 | Author: Righteous Technologies | Size: 2452 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
83. | iNeeda Password & Tracker 1.0 (msjsoftware.com) | ||
for you. iNeeda Password & Tracker uses the highly acclaimed 'Blowfish' Encryption Algorithm to securely store all your information and guard against others viewing it. Free 10 Day Trial. The highly flexible password generator lets you generate an array of different style passwords. Generate passwords as numeric only, letters only, numbers & letters and in uppercase | |||
Updated: 3, 2005 | Rating: 16 | Author: Mike Jackson | Size: 2673 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
84. | Invisible CHAOS 5.1 (safechaos.net) | ||
Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
86. | iOpus Secure Email Attachments - Encrypted and Self-extracting 1.0 (iopus.com) | ||
it before decrypting the iOpus SEA package. iOpus SEA uses the Blowfish encryption algorithm with a key length of up to 448 bits. Blowfish encryption is so strong that it has never been cracked yet. In fact, most experts agree that it cannot be cracked with current computer technology and | |||
Updated: 9, 2005 | Rating: 0 | Author: iOpus GmbH | Size: 998 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
87. | IPTunnelManager 1.3 (apbsoft.com) | ||
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic. Thus, the program makes it possible to create a secure connection for any application or service using TCP/IP (HTTP, FTP, SMTP, POP, NNTP, SNPP, Telnet, etc.). It is especially important for those | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Aronovich | Size: 1189 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
88. | JvCrypt 1.0 (vandaveer.com) | ||
and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
89. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
90. | Masker 7.0.6 (softpuls.com) | ||
encrypts files using strong encryption algorithms. (CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit, TWOFISH) The encrypted files will then be hidden within a carrierfile. MASKER is able to compress files in order to reduce size of the carrier file. As a carrier file you can use: image files (bmp, gif | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
91. | MSCCrypto for Windows 2.0 (miraplacid.com) | ||
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash) | |||
Updated: 9, 2005 | Rating: 313 | Author: Miraplacid Software Development | Size: 824 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
92. | MyComponents 1.0.7b (mycode.free.fr) | ||
with source for BCB (C++ BUILDER). Version Info, Windows XP Style, BlowFish, CRC Free components with source for BCB (C++ BUILDER). Version Info, Windows XP Style, BlowFish | |||
Updated: 9, 2005 | Rating: 2931 | Author: Stephane BRUN | Size: 121 kb | Freeware Go to category: Development > Components & Libraries Similar programs | |||
93. | MySQL Dump Timer 1.2.4 (mywitch.de) | ||
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL | |||
Updated: 9, 2005 | Rating: 16 | Author: Dirk Richter | Size: 1871 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
94. | MySQL Dump Timer 1.6.0 (richtsoft.com) | ||
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL | |||
Updated: 2, 2006 | Rating: 311 | Author: Dirk Richter | Size: 1871 kb | Shareware Similar programs | |||
95. | NoTrax 1.4 (heidi.ie) | ||
activate at any time during browsing. The Cache is encrypted using Blowfish. NoTrax supports SSL (Secure Socket Layer) and TLS (Transport Layer Security). The root certificates are built-in. NoTrax comes with an automatic shutdown option if idle for a certain amount of time (you decide). NoTrax does | |||
Updated: 9, 2005 | Rating: 0 | Author: Garrett Trant | Size: 2221 kb | Commercial Go to category: Security & Privacy > Other Similar programs | |||
96. | OpenSSL 0.9.7c (download.componentspot.com) | ||
algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
97. | Oxide 2002 1.1 (nitrotech.co.uk) | ||
choose Oxide 2002. Your files are protected with tried and tested blowfish algorithm which has undergone over 8 years of intensive cryptanalysis along with the latest government standard in password authentication. You can be sure no-one will now read your email attachments, personal files or business documents without you knowing. To view information about the encryption used in | |||
Updated: 8, 2004 | Rating: 16 | Size: 44 kb | Demo Go to category: System Utilities > Other Similar programs | |||
98. | P-Encryption Suite 3.6.2.11 (cadabrasoftware.com) | ||
P-Encryption Suite is a powerful encryption program for the windows operating system used to store your private documents into a single encrypted file. There are two different encrypted archives P-Encryption Suite can create, Stealth and Normal. Stealth archives are PES archives disguised as a different file | |||
Updated: 2, 2006 | Rating: 82 | Author: Josh Sanford | Size: 10092 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
99. | PalmTree 3.3 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
100. | PalmTree 3.5 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|