|
||||||
|
||
|
Home > Decryption software |
Related keywords: self decryption, Self Decryption, DES encryption decryption, guaranteed decryption |
|
|
1. | 4UOnly 1.2.7 (dillobits.com) | ||
good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password generator is included to further enhance your security. Convenient automatic launching of login web pages is also provided to reduce you login time. In this era of heightened concern for security, we recommend that you use a unique | |||
Updated: 2, 2006 | Rating: 36 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
2. | 4UOnly 1.2.7 (dillobits.com) | ||
good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password generator is included to further enhance your security. Convenient automatic launching of login web pages is also provided to reduce you login time. In this era of heightened concern for security, we recommend that you use a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
3. | 4UOnly 1.2.7 (dillobits.com) | ||
good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password generator is included to further enhance your security. Convenient automatic launching of login web pages is also provided to reduce you login time. In this era of heightened concern for security, we recommend that you use a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
4. | ABCCrypto 2.0 (websupergoo.com) | ||
ABCCrypto is an ATL COM component for encrypting and decrypting data. It's incredibly simple to use and works with virtually any format you'll ever come across. You can encrypt or decrypt variants, BLOB data or files. ABCCrypto uses the standard Windows Cryptography API to ensure consistent | |||
Updated: 9, 2005 | Rating: 0 | Author: WSG Developers | Size: 2000 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
5. | ACProtect standard 1.20 (ultraprotect.com) | ||
Special ACProtect Technics: Metamorph Engine- Metamorph decryption routines and several encrypted layers. The code being protected varies every time you protect your application. CodeReplace Engine - ACProtect can replace some of the protected program's code with its own codes without function loss and speed loss. This feature combine the protect code and the program code | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | Advanced Office Password Breaker 1.40 (elcomsoft.com) | ||
for our line of products. Guaranteed decryption of file open protected MS Word and Excel 97/2000 files regardless of password length or complexity because the encryption key is cracked, not the password. AOPB can open your file within a week on high end | |||
Updated: 9, 2005 | Rating: 4144 | Author: Vladimir Katalov | Size: 633 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
7. | Advanced PDF Password Recovery Std 1.50 (elcomsoft.com) | ||
or adding/changing annotations and form fields (in any combination). Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit, copy, print, annotate functions enabled. Can operate in a batch mode. The | |||
Updated: 9, 2005 | Rating: 4339 | Author: Vladimir Katalov | Size: 1206 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
8. | AntiCrack Software Protector Basic 1.09 (anticrack.us) | ||
machine,the code protected can not decrypt. Polymorph - Polymorph decryption routines and several encrypted layers.The code being protected varied every time your protect your application. Embedded cryptor - You can specify the place in your application to embed the inner cryptor.With the embedded | |||
Updated: 9, 2005 | Rating: 535 | Author: Lusi Chen | Size: 1429 kb | Shareware Go to category: Development > Other Similar programs | |||
9. | Auto FTP Premium 4.6 (primasoft.com) | ||
transfer sets for any future date/time. Strong File Encryption / Decryption: encryption allows you easily and quickly to encrypt and decrypt files selected for upload and/or download using the latest industry standard strong encryption. ZIP and UNZIP: Auto FTP Premium enables you to use the most popular ZIP archive file format. Upload and Download Site/Folder, Synchronize: Upload | |||
Updated: 2, 2006 | Rating: 0 | Author: Marek Kosznik | Size: 5100 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
10. | Auto FTP Service 4.6 (primasoft.com) | ||
transfers for any future data and time. Strong File Encryption / Decryption: encryption allows you easily and quickly to encrypt and decrypt files selected for upload and/or download using the latest industry standard strong encryption algorithms (AES known as Rijndael, Twofish, RSA,..). Special Actions: easy to use scripting function allows you to automate the transfer and | |||
Updated: 2, 2006 | Rating: 0 | Author: Marek Kosznik | Size: 5100 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
11. | BestCrypt Corporate 1.12 (jetico.com) | ||
includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic installation/uninstallation and update of BestCrypt on remote client computers, creation of central Administrating Database on the server | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
12. | bitRipper 1.20 (omgsoft.com) | ||
performed after the copying process is completed Third-party CSS Decryption and CPPM authorization modules make bitRipper able to copy protected DVDs. bitRipper does not require gigabytes of space to copy all DVD content to the hard drive before converting to AVI or MPEG. It converts video | |||
Updated: 9, 2005 | Rating: 165 | Author: Mike Tishetsky | Size: 2094 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
13. | bitRipper 1.30 (bitripper.com) | ||
only selected tracks (both video and audio) Third-party CSS Decryption and CPPM authorization modules make bitRipper able to copy protected DVDs. bitRipper does not require gigabytes of space to copy all DVD content to the hard drive before converting to AVI or MPEG. It converts video on-the-fly, copying data and writing it to AVI or MPEG file at the same time. bitRipper is a | |||
Updated: 9, 2005 | Rating: 165 | Author: Mike Tishetsky | Size: 1726 kb | Freeware Similar programs | |||
14. | BlowFish 2000 2.8 (gregorybraun.com) | ||
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Business PDF Writer 1.02 (bureausoft.com) | ||
PDF compression, PDF split and merge, 128-bit encryption and decryption as well as PDF optimization. More than 60 languages are supported with special characters neatly printed in PDF files. As professional PDF publishing solution, Business PDF Writer offers quality PDF creation, conversion, and management that could be rarely found elsewhere. For more information, visit | |||
Updated: 9, 2005 | Rating: 0 | Author: Pierre Gilles | Size: 5671 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
16. | Chameleon 2.0 (members.optushome.com.au) | ||
Chameleon is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
17. | Chilkat Create Self-Extracting EXE from Zip 8.1.0 (zip-compression.com) | ||
create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little memory. Create self-extracting ZIP files optionally with unbreakable AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
18. | Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) | ||
Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure | |||
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Development > Other Similar programs | |||
19. | Chilkat XML Messaging 1.0.6 (chilkatsoft.com) | ||
TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Web Development > XML/CSS Tools Similar programs | |||
20. | Chilkat XML Messaging Component 2.0.0 (chilkatsoft.com) | ||
TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
21. | Chilkat Zip Self-Extractor 8.1.0 (zip-compression.com) | ||
create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little memory. Create self-extracting ZIP files optionally with unbreakable AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: Development > Other Similar programs | |||
22. | ChilkatZip Self-Extractor 1.0.0 (chilkatsoft.com) | ||
create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little memory. Create self-extracting ZIP files optionally with unbreakable AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 228 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
23. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | CryptaFlix 1.10 (briggsoft.com) | ||
protection using the Advanced Encryption Standard (AES). On-the-fly decryption during playback eliminates the need for temporary files. Create self-playing videos that can be viewed by anyone with the applicable password. CryptaFlix also plays MPG videos. CryptaFlix is a video player for Windows with encryption capabilities for DivX and other AVI format movies. Protect your video | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 948 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
25. | CryptIt 1.301 (SinnerComputing.com) | ||
security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | cryptlib 3.0 (download.componentspot.com) | ||
The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
27. | Crypto 2000 4.2 (gregorybraun.com) | ||
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
28. | Cryptocx v5 5.1.6 (easybyte.com) | ||
with 128Bit Blowfish encryption. · Has the Fastest file encryption/decryption · 256 Bit AES encryption/decryption for files and string · Easily add Cryptocx v5 to your website or application in minutes. Cryptocx is a PGP and AES compatible encryption component designed for use in any modern | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
29. | Cryptocx v6 6.1.3 (easybyte.com) | ||
and files with 448 Bit Blowfish Has the Fastest file encryption/decryption 256 Bit AES encryption/decryption for files and string Easily add Cryptocx v6 to your website or application in minutes Cryptocx is an Open PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
30. | Crypton 1.0 (uic.nnov.ru) | ||
for you files. Crypton uses Blowfish algorithm for encryption and decryption, also allows file compression and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
31. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
After you have specified the conditions of the encryption or decryption operation and instructed the program to perform the operation the conditions are checked and any errors or exceptional conditions (such as the non-existence of the specified input files or lack of space on the output disk) are reported. Read more at http://www.hermetic.ch/crypto/me5aeman/prodinfo.htm | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
32. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
DevSolutionsCrypt library is a powerful and easy to use cryptographic ActiveX and DLL component for Windows developers that allows applications to encrypt/decrypt data or files using the latest industry standard strong encryption algorithms.It can be used to encrypt/decrypt strings,memory buffers,Blobs,Files | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
33. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
It compresses and encrypts selected files and produces a self-decryption archive. The encrypted file can be decrypted simply by double clicking the archive with the given password for symmetric key mechanism and no input is necessary for certificate based decryption.. DevSolutions SecureFile also can be used to create a EncryptionArchive file. The encryption archive can | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
34. | DLOCK2 2.01 (eBible.org) | ||
is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2, except recompiled | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
35. | DriveCrypt 3.03a (drivecrypt.com) | ||
to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | EDCrypt 3.1 (softuarium.com) | ||
Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
37. | Encryption Toolkit 2003 Trial Edition 1.0 (nickellie.com) | ||
a Win32 context menu extension that makes file encryption and decryption from Windows Explorer a snap. The Nickellie Encryption Toolkit includes everything you need to add data encryption and file encryption capabilities to your software applications. This includes all necessary runtime and debug DLLs; complete technical manual in Windows Help format; sample projects in Visual | |||
Updated: 9, 2005 | Rating: 0 | Author: Daniel Maddox | Size: 1062 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
38. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | EzCrypt+ 2.01 (kmgi.com) | ||
Windows Explorer • Fast and simple with one-click encryption and decryption • Self-decrypting archives enable you to share encrypted data securely with people who don't have the program. To decrypt the archive the recipient just double-clicks on the archive file and enters the password. • Powerful and flexible: Encrypt single files, folders and entire directory trees • | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
40. | FileEncryptor 1.0.6.0 (arxsoft.com) | ||
FileEncrypter is a small freeware utility that is capable of encrypting any file on any media storage with the officially recognized encryption algorithm - AES (Rijndael). The key length of the algorithm may vary from 128 to 256 bit to ensure the maximum protection of encrypted information. The use of | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Wetherell | Size: 388 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
41. | GreatCrypt 2.0 (miraxus.com) | ||
Detailed help system Fully compatible with Windows FREE decryption software FREE upgrade to all new versions The powerful file encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
42. | I-Cipher AP 2.2.2 (ambitware.com) | ||
to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form. I-Cipher is ideal for | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
43. | Intech Pop3 1.0 (intech2.com) | ||
ActiveX control that includes text-to-speech and automatic decryption capabilities. The installation package comes complete with SDK documentation and application samples for VB, Scripting, and C. ITPop3 is a full-featured ActiveX control that includes text-to-speech and automatic decryption capabilities. The installation package comes complete with SDK documentation and | |||
Updated: 3, 2005 | Rating: 0 | Author: Kevin Crawford | Size: 325 kb | Demo Go to category: Development > Other Similar programs | |||
44. | JvCrypt 1.0 (vandaveer.com) | ||
JvCrypt is a powerful encryption and compression utility that allows you to create encrypted files and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
45. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
Lucigenic Crypt is a COM component that enables software developers to provide advanced cryptographic services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
46. | Max Net Shield 4.2 (maxnetshield.com) | ||
feature to transform any file into an encrypted format. Easy decryption capability. Extend the functionality of MNS to locate and erase history files left behind by other applications such as Adobe Acrobat, JASC PaintShop Pro, RealOne Player, Adobe Photoshop, Macromedia Flash Player, Eudora, and many more. Stealth Function allows you to hide the MNS program on the hard drive | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxion Software | Size: 6480 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
47. | Multi-ZIP-licity 2.0 (softuarium.com) | ||
Multi-ZIP-licity is a program for people working with multiple ZIP files. Its primary function is to extract files from multiple archives and create multiple archives. Program also includes extra tools designed to encrypt and decrypt files, list contents of a folder as text, change attributes of multiple | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 787 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
48. | Orbital's SQL Decryptor 2.2 (decryptor.orbitaltechnologies.org) | ||
directly on the SQL Server. Uses Unicode technology during the decryption process which allows for International use. Simple point-and-click decryption. Does not require any T-SQL scripting knowledge. Reduces time and money spent restoring lost source code to encrypted SQL objects. Never pay another developer to recreate and debug all of your lost SQL source code | |||
Updated: 9, 2005 | Rating: 0 | Author: Orbital Technologies | Size: 684 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
49. | PDF Password Remover 2.5 (verypdf.com) | ||
into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat (including 5.x | |||
Updated: 2, 2006 | Rating: 6506 | Author: verypdf verypdf | Size: 521 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
50. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
PlexCrypt protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, ElGamal, IDEA, IES, RC4, RC6, RSA, Serpent, etc | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
|
Home > Decryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|