|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
61. | USA Shield 2.15 (usa.safeworld.info) | ||
USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
62. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
SafeHouse provides transparent on-the-fly encryption for your notebook or desktop personal computer. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. All encryption is | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
63. | Secura Backup Professional 2.13 (cmfperception.com) | ||
paths, FTP sites, CD/DVDs, and even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
64. | Secure Disk 1.1 (wekasoft.com) | ||
SecureDisk is a program which can create encrypted virtual disks on Windows operation systems to protect your files or data from been accessed by others. Using the powerful and proven cryptographic algorithm it can provide the best security. After installing SecureDisk, you can choose to create a virtual disk | |||
Updated: 9, 2005 | Rating: 0 | Author: weka zhang | Size: 1682 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
65. | SecureFile 2.0 (securefile.tripod.com) | ||
the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ private key ) for the process of encryption and decryption.It supports secure file deleting and backup of encrypted files It compresses and encrypts selected files and produces a | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
66. | PalmTree 3.3 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
67. | Passphrase Keeper 2.60 (passphrasekeeper.com) | ||
passwords, PINs, combinations, credit card numbers - using powerful Blowfish encryption. A single password - the only one you'll need to remember - unlocks it all! Passphrase Keeper fills in login forms automatically or with drag and drop, generates passwords, opens websites, prints or exports data to HTML and text, and more. Includes support for multiple databases, database backup | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Johnson | Size: 1643 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | PowerKey 2.0 (gals1.chat.ru) | ||
of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process. After it the encryption is done and you receive a | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
69. | Hot Crypt 1.2 (softcomplete.com) | ||
is one touch text encryption software. Using algorithms Blowfish, DES, Diamond, IDEA, Mars, MISTY1, RC2, RC4, RC5, RC6, RedocIII, Sapphire, Skipjack, Tea. Support compression and Base64 encoding. Working with embedded in text pictures and objects. Can be activated under any edit windows (MS Word, Notepad, Outlook, Eudora, TheBat, etc). HotCrypt is one touch text encryption | |||
Updated: 9, 2005 | Rating: 48 | Size: 848 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
70. | Invisible CHAOS 5.1 (safechaos.net) | ||
Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
71. | JvCrypt 1.0 (vandaveer.com) | ||
and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
72. | EldoS KeyLord 4.0 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
73. | EXEsafe 2 (members.aol.com) | ||
such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will process all the information, and decide whether access should be allowed. If not, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
74. | CryptEnCrypt 1.10 (inetprom.com) | ||
CryptEnCrypt is a powerful software application designed for electronic data protection. The files on your hard disk have no protection from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
76. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
77. | CryptoForge 3.2.5 (cryptoforge.com) | ||
client. CryptoForge provides four encryption algorithms: 448-bit Blowfish, 256-bit Rijndael (AES), 168-bit Triple DES, and 256-bit Gost. It also includes powerful compression to strengthen cryptographic security even more. The command line interface allows quick integration into automated processes and scripts, and lets you perform tasks in both interactive and non-interactive server | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
78. | Data Stash 1.5 (skyjuicesoftware.com) | ||
fully functional. Password protection is also provided, using Blowfish encryption. This is useful if you wish to keep out certain files from prying eyes, under the guise of a normal file. For example you can hide sensitive document files into a bitmap file, and retrieve them later. Opening the bitmap file would only show the image of the bitmap, and not the files that are stored | |||
Updated: 9, 2005 | Rating: 0 | Author: Chooi Guan Lim | Size: 384 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
79. | DigiSecret 2.0 (tamos.com) | ||
by the best mathematicians in the world: CAST (128-bit key), Blowfish (448-bit key), Twofish (256-bit key), and Rijndael (also known as AES, 256-bit key). The program provides the option to choose the interface language: English, German, French, Spanish, or Russian. An application for strong file encryption, compression, and file sharing (peer to peer). It utilizes time-proven | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
80. | BestCrypt 7.20.2 (jetico.com) | ||
encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish, GOST, DES. Time-out and Hot Key options. The wiping utility is included allowing you to wipe files, free space, swap file and file slacks that nobody can restore your files later. This version includes support for Windows XP, swap file encryption, and a "hidden" container feature. BestCrypt is | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
81. | BlowFish 2000 2.8 (gregorybraun.com) | ||
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
82. | Chameleon 2.0 (members.optushome.com.au) | ||
files by compressing (WinZip v1.0), encrypting (Double 128 bit Blowfish encryption fast algorithm (ASM)) on the fly, scrambling them and then attaching them to the host files of your choice. This Chameleon file then looks and behaves like a normal file, and can be stored, used, upload/download or emailed without attracting attention. There is also additional security for your | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
83. | CHAOS Chameleon 3.8 (safechaos.net) | ||
CHAOS Chameleon allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. CHAOS Chameleon has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. CHAOS Chameleon has | |||
Updated: 9, 2005 | Rating: 0 | Size: 374 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
84. | CHAOS For Security 2.9 (safechaos.net) | ||
Encrypt and compress individual files and folders. Drag and Drop support. CHAOS for security of your secrets. Encrypt and compress individual files and folders. | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | CHAOS Public Key 4.23 (safechaos.net) | ||
CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send off data on email. The program is compact, efficient and user friendly. CHAOS supports Windows drag-and-drop | |||
Updated: 9, 2005 | Rating: 0 | Size: 410 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | CHAOS' Doors 3.7 (safechaos.net) | ||
Comprehensive privacy tools including file/folder encryption, e-mail encryption, file/folder shredder. The program is compact, efficient and user friendly. Required cryptographic procedures are enforced in the new graphical user interface Drag and Drop support. CHAOS' doors is opened in a world of safety | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
87. | Cipherlok 2.1 (softlok.com) | ||
highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be automatically encrypted at shutdown and decrypted at startup ensuring security when, for example, travelling with a notebook computer. A secure file | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
88. | Absolute CHAOS 3.8 (safechaos.net) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 16 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
89. | Advanced Encryption Plug-In for Windows Explorer 4.0.2 (secureaction.com) | ||
encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CASTt. All algorithms are industrial encryption standards. Shredding (Safely removing files from your system). The shredded files will never be restored even with using Norton Unerase software. Making SFX (Self-extracting archives) from your files. It allows you to send encrypted .exe files to your | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
90. | Advanced File Protector 2.2 (666soft.com) | ||
Use Advanced File Protector to protect all your private files using the strongest encryption algorithms available, create self extracting/decrypting archives, and much more. Besides using the common passwords, Advanced File Protector can also create physical keys that will be used to encrypt/decrypt your | |||
Updated: 9, 2005 | Rating: 0 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|