|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
1. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | MSCCrypto for Windows 2.0 (miraplacid.com) | ||
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash) | |||
Updated: 9, 2005 | Rating: 313 | Author: Miraplacid Software Development | Size: 824 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
3. | PrivacyAssistant 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
4. | PrivacyAssistant Professional 1.8 (productsfoundry.com) | ||
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer | |||
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | SecurDataStor 5.01 (encryptx.com) | ||
different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a server-less authentication model. This file encryption software creates an encrypted archive or wrapper around the protected data and stores the permissions in that wrapper. This permission-based rights | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
6. | DriveCrypt 3.03a (drivecrypt.com) | ||
using the best and most proven cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des and Triple Des. DRIVECRYPT requires minimal administration and user training. DRIVECRYPT protects your data with very fast and a true "on the fly" encryption process. Using special so called "Steganographic" functionalities, DRIVECRYPT allows you to hide all your sensitive | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | Bind to EXE library 1.1 (codeoffice.com) | ||
embedded files can also be encrypted to increase their securities. Blowfish algorithm, one of the most secure encryption algorithms in the world, is employed to encrypt the files. In extracting stage, TExtractFromEXE can retrieve information about the collection of files embedded in the executable file, or just extract one or more files from the executable file specified by their | |||
Updated: 9, 2005 | Rating: 0 | Author: Chong-Wei CHEN | Size: 1587 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
8. | Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
9. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
10. | Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
11. | Chilkat Encryption .NET Component 2.2.0 (chilkatsoft.com) | ||
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider | |||
Updated: 9, 2005 | Rating: 42 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
12. | Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
13. | Chilkat Zip ActiveX Compression Component 9.3.0 (chilkatsoft.com) | ||
your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
14. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
15. | !Chilkat Zip ActiveX Control 9.3.0 (zip-compression.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
16. | Chilkat Zip Compression .NET Class 9.3.0 (chilkatsoft.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
17. | Chilkat Zip Compression C++ Library 9.4.0 (chilkatsoft.com) | ||
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access | |||
Updated: 9, 2005 | Rating: 82 | Author: Matt Fausey | Size: 7800 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
18. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
Standard (AES) .It also supports Serpent, Mars, Triple DES,Blowfish algorithms. DevSolutionsCrypt component is designed to guard your client's or application's sensitive information with powerful byte/binary encryption algorithms.You can use it to secure your sensitive information such as passwords and credit card numbers when storing them in a databas DevSolutionsCrypt library | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
19. | MySQL Dump Timer 1.2.4 (mywitch.de) | ||
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL | |||
Updated: 9, 2005 | Rating: 16 | Author: Dirk Richter | Size: 1871 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | EDCrypt 3.1 (softuarium.com) | ||
- encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files Help files and example | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
21. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
22. | CryptaPix 2.24 (briggsoft.com) | ||
Full screen slideshows. Secure 80-bit PC1 (RC4 clone) and 160-bit Blowfish encryption keeps your private image collection away from prying eyes. Encrypted thumbnail and WAV sound support. Conversion, printing and secure wipe features are also available. Graphics viewer/encryption for Windows 95 to XP. Supports GIF, JPG, PNG, PCX, TIF, and BMP images. Full screen slideshows. Secure | |||
Updated: 9, 2005 | Rating: 16 | Author: Kent Briggs | Size: 674 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
23. | ActiveDiary 3.5 (windine.com) | ||
is a password-protected diary application. The program uses RSA and Blowfish encryption to protect your data and files. The interface is similar to Microsoft Outlook and is completely configurable. The program can hold an unlimited number of accounts that each contains unlimited calendar and free form | |||
Updated: 9, 2005 | Rating: 104 | Author: Mike Kallay | Size: 11381 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
24. | AbsoluteTelnet 4.01 (celestialsoftware.net) | ||
find comfortable and familiar, while encryption options such as Blowfish, Twofish, AES, Arcfour, 3DES, Cast128, IDEA, and RC4 give you the maximum security you desire in today's insecure Internet. AbsoluteTelnet was written from the ground up as a 32-bit multithreaded application that performs at a blistering pace in Windows 95, 98, ME, NT, 2000, and XP. Socks proxy gives you the | |||
Updated: 2, 2006 | Rating: 90 | Author: Brian Pence | Size: 1486 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
25. | Acid Drop 1.3 (el-software.com) | ||
using the LZH compression format or protect your text strings with Blowfish encryption. Acid Drop also acts as a clipboard monitor, storing copied text snippets and making those clips accessible via a simple log. Just highlight the text snippet you want to paste into an application, then utilize the usual CTL-V hotkey combination to paste the text. URLs embedded in your text are | |||
Updated: 9, 2005 | Rating: 33 | Author: Aleksey Nikolayevich Remizov | Size: 1255 kb | Shareware Go to category: Home & Hobby > Cataloging Similar programs | |||
26. | Advanced HTMLCoder 3.0 (raysion.com) | ||
for private use only, you can encrypt its code (using powerful Blowfish and GOST encryption algorithms) and set the access password. You can also protect the source code of your pages from unethical competitors by encrypting it and disabling certain functions, including the display of URLs in the status bar, text selection, right mouse button operations, printing and copying | |||
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
27. | Bookmark Buddy 3.5.2 (bookmarkbuddy.net) | ||
(web addresses, notes, log-in details, the lot) with 128-bit Blowfish encryption. Keep track of web sites with Bookmark Buddy's bookmark checker - it works in the background so you won't need to wait while it runs. Create and share any number of collections of bookmarks (for work, home, projects, clients) - up to 50,000 in any bookmark list! Export your bookmarks to a | |||
Updated: 2, 2006 | Rating: 0 | Author: Edward Leigh | Size: 464 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
28. | Email CHAOS 4.52 (safechaos.net) | ||
With E-mail CHAOS you can protect the privacy of your e-mail messages, files and folders by encrypting them so that only the intended recipients can read them. You can also digitally sign messages and files, which ensures their authenticity. When someone sends you e-mail with their digital signature, CHAOS | |||
Updated: 9, 2005 | Rating: 0 | Size: 424 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
29. | hCrypt 3.0 (raysion.com) | ||
in a few simple steps. For strong protection you can use powerful Blowfish (448 bit encryption, password length up to 56 symbols) and GOST (256 bit encryption, password length 32 symbols) encryption algorithms. To protect less sensitive information, you may use simple but extremely fast XOR encryption. You can customize the appearance of the password prompt (fonts, colors, text) | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
30. | IPTunnelManager 1.3 (apbsoft.com) | ||
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic. Thus, the program makes it possible to create a secure connection for any application or service using TCP/IP (HTTP, FTP, SMTP, POP, NNTP, SNPP, Telnet, etc.). It is especially important for those | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Aronovich | Size: 1189 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|