|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
121. | PrivacyWatcher 1.11 (managebytes.com) | ||
your privacy: - Highly reliable encryption of files using 448-bit Blowfish algorithm - Secure files deletion to prevent their recovering with UnErase tools - Startup manager to prevent unwanted programs from loading on Windows startup - Desktop lockout feature for preventing the unauthorized | |||
Updated: 3, 2005 | Rating: 0 | Author: Mikhail Yurasov | Size: 995 kb | Shareware Similar programs | |||
122. | Ardorsoft Privacy Guard 2.0 (ardorsoft.com) | ||
file encryption tool: **Top security, 448-bits blowfish encryption algorithm, password is hashed before encryption, Impracticable brute-force attack. **No back doors, none password info stored. There is absolutely no way of recovering your information without the correct password. **Built-in file and directory shredder with multi-rounds shredding function, ensure complete | |||
Updated: 3, 2005 | Rating: 42 | Author: Zhenhua Xu | Size: 1294 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
123. | Crypton 1.0 (uic.nnov.ru) | ||
suite, which provides strong security for you files. Crypton uses Blowfish algorithm for encryption and decryption, also allows file compression and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
124. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. Of course, if you are really concerned about privacy of your data | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
125. | Hybrid 2.2.1 (righteoustech.com) | ||
decrypts files for storage on your computer. It uses the well known Blowfish encryption algorithm with 448-bit encryption. Hybrid offers an easy to use interface with drag and drop support and also integrates into the Windows Explorer right click menu for fast and easy access. You can add single or multiple files and include directories with their subdirectories all with a few mouse | |||
Updated: 3, 2005 | Rating: 0 | Author: Righteous Technologies | Size: 2452 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
126. | iNeeda Password & Tracker 1.0 (msjsoftware.com) | ||
for you. iNeeda Password & Tracker uses the highly acclaimed 'Blowfish' Encryption Algorithm to securely store all your information and guard against others viewing it. Free 10 Day Trial. The highly flexible password generator lets you generate an array of different style passwords. Generate passwords as numeric only, letters only, numbers & letters and in uppercase | |||
Updated: 3, 2005 | Rating: 16 | Author: Mike Jackson | Size: 2673 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
127. | SPac 1.6.0.28 (qsc.co.uk) | ||
to US export restrictions. Files are encrypted using the very strong BlowFish (448-bit key) algorithm, and high compression keeps the filesize down. SPac is an easy to use, secure, and powerful application for file encryption and sharing. SPac combines both compression and encryption into the one product and utilizes a user-friendly interface to make manipulating your secure archives | |||
Updated: 3, 2005 | Rating: 21 | Author: Ewan McNab | Size: 1552 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
128. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original document has not been maliciously or | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
129. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
130. | PrivacyAssistant 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
131. | PrivacyAssistant Professional 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
132. | Oxide 2002 1.1 (nitrotech.co.uk) | ||
choose Oxide 2002. Your files are protected with tried and tested blowfish algorithm which has undergone over 8 years of intensive cryptanalysis along with the latest government standard in password authentication. You can be sure no-one will now read your email attachments, personal files or business documents without you knowing. To view information about the encryption used in | |||
Updated: 8, 2004 | Rating: 16 | Size: 44 kb | Demo Go to category: System Utilities > Other Similar programs | |||
133. | Advanced HTMLCoder 3.0 (raysion.com) | ||
for private use only, you can encrypt its code (using powerful Blowfish and GOST encryption algorithms) and set the access password. You can also protect the source code of your pages from unethical competitors by encrypting it and disabling certain functions, including the display of URLs in the status bar, text selection, right mouse button operations, printing and copying | |||
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
134. | hCrypt 3.0 (raysion.com) | ||
in a few simple steps. For strong protection you can use powerful Blowfish (448 bit encryption, password length up to 56 symbols) and GOST (256 bit encryption, password length 32 symbols) encryption algorithms. To protect less sensitive information, you may use simple but extremely fast XOR encryption. You can customize the appearance of the password prompt (fonts, colors, text) | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
135. | Hiding CHAOS 5.6 (safechaos.net) | ||
Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
136. | SecurDataStor 5.01 (encryptx.com) | ||
different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a server-less authentication model. This file encryption software creates an encrypted archive or wrapper around the protected data and stores the permissions in that wrapper. This permission-based rights | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
137. | encryptX SecurDataStor Premium 6.0 (encryptx.com) | ||
Microsoft® Windows® operating systems. It uses powerful 448-bit blowfish encryption and a server-less authentication model. This file encryption software creates an encrypted archive or wrapper around the protected data and stores the permissions in that wrapper. The permission-based rights management feature enables the originator of the information to specify access control rules | |||
Updated: 8, 2004 | Rating: 107 | Author: David Duncan | Size: 490000 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|