Fassberg Driving Records 1.4.28
Fassberg driving records search. Get information straight from Department of Motor Vehicle databases in Fassberg. Our instant driving…
AutoPlay Media Studio 5.0.2.0
This award-winning visual multimedia authoring tool makes it easy to create interactive software, even if you're an absolute beginner! It's…
 
   
   
     
Example:  Norton Antivirus
 
• New       • TOP       • Most popular       • All soft       • Advertising       • Add program       • Support       • Link to us       • About       • Board      
audio & multimedia  business  communications  desktop  development  education  games & entertainment  graphics apps  home & hobby  network & internet  security & privacy  servers  system utilities  web development  A B C D E F G I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9

Home > Blowfish software

Related keywords: blowfish zip, Blowfish DES

Home
Software
New soft
TOP-10
Best 1000
All Soft
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Number of references on page:10 | 20 | 30 | 50 | 100
Language: Any | English | German | French | Italian | Japanese | Portuguese | Spanish
License: Any | Freeware | Shareware | Demo | Adware | Commercial | Data Only
Installation: Any | Install and Uninstall | Install Only | No Install Support | Uninstall Only
Operational system: Any | Windows 95 | 98 | ME | NT | 2000 | XP | CE | Unix | Palm | Mac


Search result:
programs found: 145.

1.Home CHAOS 3.5 (safechaos.net) free  Home CHAOS download
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information.
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware
Go to category: Security & Privacy > Encryption Tools
Similar programs
2.MSCCrypto for Windows 2.0 (miraplacid.com) free  MSCCrypto for Windows download
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash)…
Updated: 9, 2005 | Rating: 313 | Author: Miraplacid Software Development | Size: 824 kb | Shareware
Go to category: Web Development > ASP & PHP
Similar programs
3.PrivacyAssistant 1.8 (productsfoundry.com) free  PrivacyAssistant download
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer…
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware
Go to category: System Utilities > Other
Similar programs
4.PrivacyAssistant Professional 1.8 (productsfoundry.com) free  PrivacyAssistant Professional download
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer…
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware
Go to category: System Utilities > Other
Similar programs
5.SecurDataStor 5.01 (encryptx.com) free  SecurDataStor download
different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a server-less authentication model. This file encryption software creates an encrypted archive or wrapper around the protected data and stores the permissions in that wrapper. This permission-based rights…
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware
Go to category: Security & Privacy > Other
Similar programs
6.DriveCrypt 3.03a (drivecrypt.com) free  DriveCrypt download
using the best and most proven cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des and Triple Des. DRIVECRYPT requires minimal administration and user training. DRIVECRYPT protects your data with very fast and a true "on the fly" encryption process. Using special so called "Steganographic" functionalities, DRIVECRYPT allows you to hide all your sensitive…
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware
Go to category: System Utilities > Other
Similar programs
7.AidAim CryptoPressStream 1.00 (aidaim.com) free  AidAim CryptoPressStream download
key support (12 algorithms and 4 modes): Rijndael (AES) 128 and 256, Blowfish, Twofish 128 and 256, DES single, double and tripple, Square. TCPSManager component for compression and encryption settings, list of opened stream, memory leaks prevention. Native VCL, does not require any DLLs. 7 Demos…
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial
Go to category: Development > Delphi
Similar programs
8.axsStrongBox 2.1 (morello.co.uk) free  axsStrongBox download
public domain algorithms - choose between Rijndael (AES), Twofish, Blowfish, DES and Triple DES (private key) or RSA (public key). ECB and CBC modes are available, with various standard padding options, for compatibility with other systems. Encrypting a file or a block of memory takes just a single method call. File encryption provides a convenient way of securing sensitive data…
Updated: 9, 2005 | Rating: 116 | Author: Tom Duncan | Size: 473 kb | Demo
Go to category: Development > Active X
Similar programs
9.Bind to EXE library 1.1 (codeoffice.com) free  Bind to EXE library download
embedded files can also be encrypted to increase their securities. Blowfish algorithm, one of the most secure encryption algorithms in the world, is employed to encrypt the files. In extracting stage, TExtractFromEXE can retrieve information about the collection of files embedded in the executable file, or just extract one or more files from the executable file specified by their…
Updated: 9, 2005 | Rating: 0 | Author: Chong-Wei CHEN | Size: 1587 kb | Shareware
Go to category: System Utilities > Other
Similar programs
10.Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) free  Chilkat Digital Certificates Component download
Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure…
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware
Go to category: Development > Other
Similar programs
11.Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) free  Chilkat Compression ActiveX Control download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
12.Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) free  Chilkat AES & RSA Encryption Component download
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Other
Similar programs
13.Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) free  Chilkat Data Compression ActiveX download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
14.Chilkat Encryption .NET Component 2.2.0 (chilkatsoft.com) free  Chilkat Encryption .NET Component download
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider…
Updated: 9, 2005 | Rating: 42 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
15.Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) free  Chilkat File Compression ActiveX download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
16.Chilkat XML Messaging 1.0.6 (chilkatsoft.com) free  Chilkat XML Messaging download
and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive binary or text messages using CkData. The CkData component is handy for loading/saving data to files, accessing as binary, strings (with or…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Freeware
Go to category: Web Development > XML/CSS Tools
Similar programs
17.Chilkat Zip ActiveX Compression Component 9.3.0 (chilkatsoft.com) free  Chilkat Zip ActiveX Compression Component download
your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Other
Similar programs
18.Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) free  Chilkat Zip ActiveX - Affordable Zip ActiveX download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
19.!Chilkat Zip ActiveX Control 9.3.0 (zip-compression.com) free  !Chilkat Zip ActiveX Control download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
20.Chilkat Zip Compression .NET Class 9.3.0 (chilkatsoft.com) free  Chilkat Zip Compression .NET Class download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: System Utilities > Other
Similar programs
21.Chilkat Zip Compression C++ Library 9.4.0 (chilkatsoft.com) free  Chilkat Zip Compression C++ Library download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 82 | Author: Matt Fausey | Size: 7800 kb | Shareware
Go to category: Development > Components & Libraries
Similar programs
22.cryptlib 3.0 (download.componentspot.com) free  cryptlib download
cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various…
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware
Go to category: Development > Active X
Similar programs
23.Cryptocx v5 5.1.6 (easybyte.com) free  Cryptocx v5 download
functionality. · Encrypt and decrypt strings and files with 128Bit Blowfish encryption. · Has the Fastest file encryption/decryption · 256 Bit AES encryption/decryption for files and string · Easily add Cryptocx v5 to your website or application in minutes. Cryptocx is a PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx…
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo
Go to category: Development > Active X
Similar programs
24.Cryptocx v6 6.1.3 (easybyte.com) free  Cryptocx v6 download
delete) files Encrypt and decrypt strings and files with 448 Bit Blowfish Has the Fastest file encryption/decryption 256 Bit AES encryption/decryption for files and string Easily add Cryptocx v6 to your website or application in minutes Cryptocx is an Open PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx encrypts and…
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo
Go to category: System Utilities > Other
Similar programs
25.DevSolutions Crypt 1.0.1 (devsolutions.net) free  DevSolutions Crypt download
Standard (AES) .It also supports Serpent, Mars, Triple DES,Blowfish algorithms. DevSolutionsCrypt component is designed to guard your client's or application's sensitive information with powerful byte/binary encryption algorithms.You can use it to secure your sensitive information such as passwords and credit card numbers when storing them in a databas DevSolutionsCrypt library…
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware
Go to category: Development > Active X
Similar programs
26.MySQL Dump Timer 1.2.4 (mywitch.de) free  MySQL Dump Timer download
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL…
Updated: 9, 2005 | Rating: 16 | Author: Dirk Richter | Size: 1871 kb | Shareware
Go to category: System Utilities > Other
Similar programs
27.EDCrypt 3.1 (softuarium.com) free  EDCrypt download
- encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files Help files and example…
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware
Go to category: Development > Other
Similar programs
28.Lucigenic Crypt 4.4 (lucigenic.com) free  Lucigenic Crypt download
services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for…
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware
Go to category: Development > Other
Similar programs
29.MSCCrypto for Linux 2.0 (miraplacid.com) free  MSCCrypto for Linux download
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash)…
Updated: 9, 2005 | Rating: 0 | Author: Miraplacid Software Development | Size: 225 kb | Shareware
Go to category: Web Development > ASP & PHP
Similar programs
30.OpenSSL 0.9.7c (download.componentspot.com) free  OpenSSL download
algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital…
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware
Go to category: Development > C / C++ / C-sharp
Similar programs

Sort programs by: relevance | date | alphabet | popularity
Result Page: | 1 | 2 | 3 | 4 | 5 | Next »


301 Moved Permanently

301 Moved Permanently


nginx

Home > Blowfish software

Acute Softwares Timer 4.2
Acute Softwares Timer has three main timing modes: Manual Mode (Acts as a standard stopwatch); Timer Mode (count for a fixed amount of…
NSNICAddress 1.0
An ActiveX control that will validate a MAC address. Nice configurable GUI.
Grand Master Chess 2.0
Grand Master Chess – a highly detailed 3D art piece, keeping you busy playing chess and marvelling at the graphics and sound effects…

Copyright © 2004 - 2010 allworldsoft.com Contact Page