|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
61. | ISequre for Windows 1.4 (isecure.tripod.com) | ||
will protect your chat session encoding all messages with the Blowfish encryption algorithm. ISequre works transparently and does not add any new interface elements except its icon on the systray. You can use different keys for each of your chat partners simultaneously. ISequre is a security software application that enables you and your friends or co-workers to exchange encrypted | |||
Updated: 9, 2005 | Rating: 0 | Size: 152 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
62. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
63. | Masker 7.0.6 (softpuls.com) | ||
encrypts files using strong encryption algorithms. (CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit, TWOFISH) The encrypted files will then be hidden within a carrierfile. MASKER is able to compress files in order to reduce size of the carrier file. As a carrier file you can use: image files (bmp, gif | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
64. | MSCCrypto for Windows 2.0 (miraplacid.com) | ||
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash) | |||
Updated: 9, 2005 | Rating: 313 | Author: Miraplacid Software Development | Size: 824 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
65. | MySQL Dump Timer 1.2.4 (mywitch.de) | ||
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL | |||
Updated: 9, 2005 | Rating: 16 | Author: Dirk Richter | Size: 1871 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
66. | MySQL Dump Timer 1.6.0 (richtsoft.com) | ||
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL | |||
Updated: 2, 2006 | Rating: 311 | Author: Dirk Richter | Size: 1871 kb | Shareware Similar programs | |||
67. | PalmTree 3.3 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | PalmTree 3.5 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
69. | Passphrase Keeper 2.60 (passphrasekeeper.com) | ||
passwords, PINs, combinations, credit card numbers - using powerful Blowfish encryption. A single password - the only one you'll need to remember - unlocks it all! Passphrase Keeper fills in login forms automatically or with drag and drop, generates passwords, opens websites, prints or exports data to HTML and text, and more. Includes support for multiple databases, database backup | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Johnson | Size: 1643 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
70. | Password Manager XP 2.1.322 (cp-lab.com) | ||
information with several encryption algorithms simultaneously (Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish). Importantly, no temporary files are ever created, guaranteeing the encrypted data will never be intercepted. The blocks of information are cleared from the computer memory as soon as they are no longer needed. And if the program is left idle for a set | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
71. | PowerKey 2.0 (gals1.chat.ru) | ||
of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process. After it the encryption is done and you receive a | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
72. | PowerKey 2.11.01.22 (elcor.net) | ||
PowerKey is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
73. | PrivacyAssistant 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
74. | PrivacyAssistant Professional 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | SafeDisk 2.10 (guardcomplete.com) | ||
and use virtual ciphered disks. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK, RSC. Stealth. Built-in protection against keyboard spies. Mode "under enforcement". Locking of access to workstation at Windows loading/idle. Low level wipe. SafeDisk is 128bit on-the-fly disk encription. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK | |||
Updated: 3, 2005 | Rating: 42 | Author: Andre Belokon | Size: 820 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
76. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
SafeHouse provides transparent on-the-fly encryption for your notebook or desktop personal computer. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. All encryption is | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
77. | Secura Archiver 1.6 (cmfperception.com) | ||
encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The integrated Key Manager stores security keys with your descriptions which allows you to quickly and conveniently choose the right | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 1509 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
78. | Secura Backup Professional 2.13 (cmfperception.com) | ||
paths, FTP sites, CD/DVDs, and even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | SecurDataStor 5.01 (encryptx.com) | ||
different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a server-less authentication model. This file encryption software creates an encrypted archive or wrapper around the protected data and stores the permissions in that wrapper. This permission-based rights | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
80. | Secure Network Chat 2.6.43 (secureaction.com) | ||
All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, Ltd | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
81. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
82. | Secure Network Messenger 1.5.5 (networkmessengers.com) | ||
Secure Network Messenger (SNM) - is a real time network communication program able to send and receive messages and files from one computer to another without using dedicated servers. All communication is highly secure! All traffic between copies of SNM is encrypted by strong encryption algorithms. The | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 598 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
83. | Secure Password Manager 2.2.1.1 (securekit.com) | ||
Password Manager uses industrial strength 256-bit AES/Rijndael/Blowfish encryption to keep your passwords secure. Secure Password Manager is well designed to let you store and track names, passwords, credit cards, software serial numbers and confidential notes in an encrypted form securely and easily. It can automatically fill login information for you. Features include password | |||
Updated: 2, 2006 | Rating: 0 | Author: securekit kit | Size: 1327 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
84. | SecureCRT 4.1.2 (promaxum.com) | ||
both SSH1 and SSH2 protocols. SSH2 support provides AES, 3DES, RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
85. | SecureFile 2.0 (securefile.tripod.com) | ||
the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ private key ) for the process of encryption and decryption.It supports secure file deleting and backup of encrypted files It compresses and encrypts selected files and produces a | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
86. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program!. This strong encryption software ensures that it is | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
87. | SPac 1.6.0.28 (qsc.co.uk) | ||
to US export restrictions. Files are encrypted using the very strong BlowFish (448-bit key) algorithm, and high compression keeps the filesize down. SPac is an easy to use, secure, and powerful application for file encryption and sharing. SPac combines both compression and encryption into the one product and utilizes a user-friendly interface to make manipulating your secure archives | |||
Updated: 3, 2005 | Rating: 21 | Author: Ewan McNab | Size: 1552 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
88. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to remote hosts, through | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
89. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to remote hosts, through | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
90. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
Strength Encryption algorithms with up to 448-bit keys: AES, GOST, Blowfish, 3DES, CAST-128, SAFER, IDEA, RC5. - Three-factor authentication using PKCS#11-compatible tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|