|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
1. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | MSCCrypto for Windows 2.0 (miraplacid.com) | ||
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash) | |||
Updated: 9, 2005 | Rating: 313 | Author: Miraplacid Software Development | Size: 824 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
3. | PrivacyAssistant 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
4. | PrivacyAssistant Professional 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | SecurDataStor 5.01 (encryptx.com) | ||
different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a server-less authentication model. This file encryption software creates an encrypted archive or wrapper around the protected data and stores the permissions in that wrapper. This permission-based rights | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
6. | DriveCrypt 3.03a (drivecrypt.com) | ||
using the best and most proven cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des and Triple Des. DRIVECRYPT requires minimal administration and user training. DRIVECRYPT protects your data with very fast and a true "on the fly" encryption process. Using special so called "Steganographic" functionalities, DRIVECRYPT allows you to hide all your sensitive | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | AidAim CryptoPressStream 1.00 (aidaim.com) | ||
key support (12 algorithms and 4 modes): Rijndael (AES) 128 and 256, Blowfish, Twofish 128 and 256, DES single, double and tripple, Square. TCPSManager component for compression and encryption settings, list of opened stream, memory leaks prevention. Native VCL, does not require any DLLs. 7 Demos | |||
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial Go to category: Development > Delphi Similar programs | |||
8. | axsStrongBox 2.1 (morello.co.uk) | ||
public domain algorithms - choose between Rijndael (AES), Twofish, Blowfish, DES and Triple DES (private key) or RSA (public key). ECB and CBC modes are available, with various standard padding options, for compatibility with other systems. Encrypting a file or a block of memory takes just a single method call. File encryption provides a convenient way of securing sensitive data | |||
Updated: 9, 2005 | Rating: 116 | Author: Tom Duncan | Size: 473 kb | Demo Go to category: Development > Active X Similar programs | |||
9. | Bind to EXE library 1.1 (codeoffice.com) | ||
embedded files can also be encrypted to increase their securities. Blowfish algorithm, one of the most secure encryption algorithms in the world, is employed to encrypt the files. In extracting stage, TExtractFromEXE can retrieve information about the collection of files embedded in the executable file, or just extract one or more files from the executable file specified by their | |||
Updated: 9, 2005 | Rating: 0 | Author: Chong-Wei CHEN | Size: 1587 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) | ||
Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure | |||
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Development > Other Similar programs | |||
11. | Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
12. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
13. | Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
14. | Chilkat Encryption .NET Component 2.2.0 (chilkatsoft.com) | ||
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider | |||
Updated: 9, 2005 | Rating: 42 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
15. | Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
16. | Chilkat XML Messaging 1.0.6 (chilkatsoft.com) | ||
and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive binary or text messages using CkData. The CkData component is handy for loading/saving data to files, accessing as binary, strings (with or | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Web Development > XML/CSS Tools Similar programs | |||
17. | Chilkat Zip ActiveX Compression Component 9.3.0 (chilkatsoft.com) | ||
your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
18. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
19. | !Chilkat Zip ActiveX Control 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
20. | Chilkat Zip Compression .NET Class 9.3.0 (chilkatsoft.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
21. | Chilkat Zip Compression C++ Library 9.4.0 (chilkatsoft.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 82 | Author: Matt Fausey | Size: 7800 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
22. | cryptlib 3.0 (download.componentspot.com) | ||
cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
23. | Cryptocx v5 5.1.6 (easybyte.com) | ||
functionality. · Encrypt and decrypt strings and files with 128Bit Blowfish encryption. · Has the Fastest file encryption/decryption · 256 Bit AES encryption/decryption for files and string · Easily add Cryptocx v5 to your website or application in minutes. Cryptocx is a PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
24. | Cryptocx v6 6.1.3 (easybyte.com) | ||
delete) files Encrypt and decrypt strings and files with 448 Bit Blowfish Has the Fastest file encryption/decryption 256 Bit AES encryption/decryption for files and string Easily add Cryptocx v6 to your website or application in minutes Cryptocx is an Open PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx encrypts and | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
25. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
Standard (AES) .It also supports Serpent, Mars, Triple DES,Blowfish algorithms. DevSolutionsCrypt component is designed to guard your client's or application's sensitive information with powerful byte/binary encryption algorithms.You can use it to secure your sensitive information such as passwords and credit card numbers when storing them in a databas DevSolutionsCrypt library | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
26. | EDCrypt 3.1 (softuarium.com) | ||
- encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files Help files and example | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
27. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
28. | OpenSSL 0.9.7c (download.componentspot.com) | ||
algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
29. | CryptaPix 2.24 (briggsoft.com) | ||
Full screen slideshows. Secure 80-bit PC1 (RC4 clone) and 160-bit Blowfish encryption keeps your private image collection away from prying eyes. Encrypted thumbnail and WAV sound support. Conversion, printing and secure wipe features are also available. Graphics viewer/encryption for Windows 95 to XP. Supports GIF, JPG, PNG, PCX, TIF, and BMP images. Full screen slideshows. Secure | |||
Updated: 9, 2005 | Rating: 16 | Author: Kent Briggs | Size: 674 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
30. | ActiveDiary 3.5 (windine.com) | ||
is a password-protected diary application. The program uses RSA and Blowfish encryption to protect your data and files. The interface is similar to Microsoft Outlook and is completely configurable. The program can hold an unlimited number of accounts that each contains unlimited calendar and free form | |||
Updated: 9, 2005 | Rating: 104 | Author: Mike Kallay | Size: 11381 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|