|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
101. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
102. | !Chilkat Zip ActiveX Control 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
103. | Chilkat Zip Compression .NET Class 9.3.0 (chilkatsoft.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
104. | Chilkat Zip Compression C++ Library 9.4.0 (chilkatsoft.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 82 | Author: Matt Fausey | Size: 7800 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
105. | DriveCrypt 3.03a (drivecrypt.com) | ||
using the best and most proven cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des and Triple Des. DRIVECRYPT requires minimal administration and user training. DRIVECRYPT protects your data with very fast and a true "on the fly" encryption process. Using special so called "Steganographic" functionalities, DRIVECRYPT allows you to hide all your sensitive | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
106. | MSCCrypto for Windows 2.0 (miraplacid.com) | ||
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash) | |||
Updated: 9, 2005 | Rating: 313 | Author: Miraplacid Software Development | Size: 824 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
107. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
108. | Secura Archiver 1.6 (cmfperception.com) | ||
encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The integrated Key Manager stores security keys with your descriptions which allows you to quickly and conveniently choose the right | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 1509 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
109. | Crypton 1.0 (uic.nnov.ru) | ||
suite, which provides strong security for you files. Crypton uses Blowfish algorithm for encryption and decryption, also allows file compression and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
110. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. Of course, if you are really concerned about privacy of your data | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
111. | iNeeda Password & Tracker 1.0 (msjsoftware.com) | ||
for you. iNeeda Password & Tracker uses the highly acclaimed 'Blowfish' Encryption Algorithm to securely store all your information and guard against others viewing it. Free 10 Day Trial. The highly flexible password generator lets you generate an array of different style passwords. Generate passwords as numeric only, letters only, numbers & letters and in uppercase | |||
Updated: 3, 2005 | Rating: 16 | Author: Mike Jackson | Size: 2673 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
112. | SafeDisk 2.10 (guardcomplete.com) | ||
and use virtual ciphered disks. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK, RSC. Stealth. Built-in protection against keyboard spies. Mode "under enforcement". Locking of access to workstation at Windows loading/idle. Low level wipe. SafeDisk is 128bit on-the-fly disk encription. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK | |||
Updated: 3, 2005 | Rating: 42 | Author: Andre Belokon | Size: 820 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
113. | SPac 1.6.0.28 (qsc.co.uk) | ||
to US export restrictions. Files are encrypted using the very strong BlowFish (448-bit key) algorithm, and high compression keeps the filesize down. SPac is an easy to use, secure, and powerful application for file encryption and sharing. SPac combines both compression and encryption into the one product and utilizes a user-friendly interface to make manipulating your secure archives | |||
Updated: 3, 2005 | Rating: 21 | Author: Ewan McNab | Size: 1552 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
114. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original document has not been maliciously or | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
115. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
116. | PrivacyAssistant 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
117. | PrivacyAssistant Professional 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
118. | Oxide 2002 1.1 (nitrotech.co.uk) | ||
choose Oxide 2002. Your files are protected with tried and tested blowfish algorithm which has undergone over 8 years of intensive cryptanalysis along with the latest government standard in password authentication. You can be sure no-one will now read your email attachments, personal files or business documents without you knowing. To view information about the encryption used in | |||
Updated: 8, 2004 | Rating: 16 | Size: 44 kb | Demo Go to category: System Utilities > Other Similar programs | |||
119. | Advanced HTMLCoder 3.0 (raysion.com) | ||
for private use only, you can encrypt its code (using powerful Blowfish and GOST encryption algorithms) and set the access password. You can also protect the source code of your pages from unethical competitors by encrypting it and disabling certain functions, including the display of URLs in the status bar, text selection, right mouse button operations, printing and copying | |||
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
120. | hCrypt 3.0 (raysion.com) | ||
in a few simple steps. For strong protection you can use powerful Blowfish (448 bit encryption, password length up to 56 symbols) and GOST (256 bit encryption, password length 32 symbols) encryption algorithms. To protect less sensitive information, you may use simple but extremely fast XOR encryption. You can customize the appearance of the password prompt (fonts, colors, text) | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|