|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
81. | iOpus Secure Email Attachments - Encrypted and Self-extracting 1.0 (iopus.com) | ||
it before decrypting the iOpus SEA package. iOpus SEA uses the Blowfish encryption algorithm with a key length of up to 448 bits. Blowfish encryption is so strong that it has never been cracked yet. In fact, most experts agree that it cannot be cracked with current computer technology and | |||
Updated: 9, 2005 | Rating: 0 | Author: iOpus GmbH | Size: 998 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
82. | IPTunnelManager 1.3 (apbsoft.com) | ||
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic. Thus, the program makes it possible to create a secure connection for any application or service using TCP/IP (HTTP, FTP, SMTP, POP, NNTP, SNPP, Telnet, etc.). It is especially important for those | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Aronovich | Size: 1189 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
83. | ISequre for Windows 1.4 (isecure.tripod.com) | ||
will protect your chat session encoding all messages with the Blowfish encryption algorithm. ISequre works transparently and does not add any new interface elements except its icon on the systray. You can use different keys for each of your chat partners simultaneously. ISequre is a security software application that enables you and your friends or co-workers to exchange encrypted | |||
Updated: 9, 2005 | Rating: 0 | Size: 152 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
84. | JvCrypt 1.0 (vandaveer.com) | ||
and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
85. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
86. | Masker 7.0.6 (softpuls.com) | ||
encrypts files using strong encryption algorithms. (CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit, TWOFISH) The encrypted files will then be hidden within a carrierfile. MASKER is able to compress files in order to reduce size of the carrier file. As a carrier file you can use: image files (bmp, gif | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
87. | MSCCrypto for Windows 2.0 (miraplacid.com) | ||
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash) | |||
Updated: 9, 2005 | Rating: 313 | Author: Miraplacid Software Development | Size: 824 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
88. | MyComponents 1.0.7b (mycode.free.fr) | ||
with source for BCB (C++ BUILDER). Version Info, Windows XP Style, BlowFish, CRC Free components with source for BCB (C++ BUILDER). Version Info, Windows XP Style, BlowFish | |||
Updated: 9, 2005 | Rating: 2931 | Author: Stephane BRUN | Size: 121 kb | Freeware Go to category: Development > Components & Libraries Similar programs | |||
89. | MySQL Dump Timer 1.2.4 (mywitch.de) | ||
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL | |||
Updated: 9, 2005 | Rating: 16 | Author: Dirk Richter | Size: 1871 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
90. | MySQL Dump Timer 1.6.0 (richtsoft.com) | ||
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL | |||
Updated: 2, 2006 | Rating: 311 | Author: Dirk Richter | Size: 1871 kb | Shareware Similar programs | |||
91. | NoTrax 1.4 (heidi.ie) | ||
activate at any time during browsing. The Cache is encrypted using Blowfish. NoTrax supports SSL (Secure Socket Layer) and TLS (Transport Layer Security). The root certificates are built-in. NoTrax comes with an automatic shutdown option if idle for a certain amount of time (you decide). NoTrax does | |||
Updated: 9, 2005 | Rating: 0 | Author: Garrett Trant | Size: 2221 kb | Commercial Go to category: Security & Privacy > Other Similar programs | |||
92. | OpenSSL 0.9.7c (download.componentspot.com) | ||
algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
93. | Oxide 2002 1.1 (nitrotech.co.uk) | ||
choose Oxide 2002. Your files are protected with tried and tested blowfish algorithm which has undergone over 8 years of intensive cryptanalysis along with the latest government standard in password authentication. You can be sure no-one will now read your email attachments, personal files or business documents without you knowing. To view information about the encryption used in | |||
Updated: 8, 2004 | Rating: 16 | Size: 44 kb | Demo Go to category: System Utilities > Other Similar programs | |||
94. | P-Encryption Suite 3.6.2.11 (cadabrasoftware.com) | ||
P-Encryption Suite is a powerful encryption program for the windows operating system used to store your private documents into a single encrypted file. There are two different encrypted archives P-Encryption Suite can create, Stealth and Normal. Stealth archives are PES archives disguised as a different file | |||
Updated: 2, 2006 | Rating: 82 | Author: Josh Sanford | Size: 10092 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
95. | PalmTree 3.3 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
96. | PalmTree 3.5 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | Passphrase Keeper 2.60 (passphrasekeeper.com) | ||
passwords, PINs, combinations, credit card numbers - using powerful Blowfish encryption. A single password - the only one you'll need to remember - unlocks it all! Passphrase Keeper fills in login forms automatically or with drag and drop, generates passwords, opens websites, prints or exports data to HTML and text, and more. Includes support for multiple databases, database backup | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Johnson | Size: 1643 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
98. | Password Manager XP 2.1.322 (cp-lab.com) | ||
information with several encryption algorithms simultaneously (Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish). Importantly, no temporary files are ever created, guaranteeing the encrypted data will never be intercepted. The blocks of information are cleared from the computer memory as soon as they are no longer needed. And if the program is left idle for a set | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
99. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original document has not been maliciously or | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
100. | PowerKey 2.0 (gals1.chat.ru) | ||
of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process. After it the encryption is done and you receive a | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|