|
||||||
|
||
|
Home > Blowfish software |
Related keywords: blowfish zip, Blowfish DES |
|
|
1. | ABC CHAOS 2.71 (safechaos.com) | ||
ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. | |||
Updated: 3, 2006 | Rating: 42 | Size: 438 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | ABC CHAOS 2.71 (safechaos.net) | ||
ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. | |||
Updated: 3, 2006 | Rating: 0 | Size: 438 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
3. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | CryptoExpert 2006 Professional 6.4.3 (cryptoexpert.com) | ||
CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Masker 7.0.6 (softpuls.com) | ||
encrypts files using strong encryption algorithms. (CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit, TWOFISH) The encrypted files will then be hidden within a carrierfile. MASKER is able to compress files in order to reduce size of the carrier file. As a carrier file you can use: image files (bmp, gif | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Advanced Encryption Package 2006 4.2.9 (secureaction.com) | ||
your private files. Program supports strong encryption algorithms Blowfish with 448 bit key, Rijndael with 256 bit key, CAST with 256 bit key, DES with 128 bit key. AEP2006 supports skins technology and has 10 nice additional skins! Moreover program has full support for ZIP files! I.e. ability to add | |||
Updated: 2, 2006 | Rating: 105 | Author: SecureAction Research, LLC | Size: 2558 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, SAFER, 3-WAY, GOST, SHARK, SQUARE, SKIPJACK, TWOFISH, MARS, SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | Folder Lock 5.3.9 (newsoftwares.net) | ||
AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer. Works on Windows 2003/XP/2000/NT/Me/98 and all kinds of disk types like FAT16, FAT32, NTFS. Folder Lock is the most downloaded file-security program in the market today. Folder Lock lets you lock, hide or encrypt confidential files, folders, pictures, documents or any | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | Secure Password Manager 2.2.1.1 (securekit.com) | ||
Password Manager uses industrial strength 256-bit AES/Rijndael/Blowfish encryption to keep your passwords secure. Secure Password Manager is well designed to let you store and track names, passwords, credit cards, software serial numbers and confidential notes in an encrypted form securely and easily. It can automatically fill login information for you. Features include password | |||
Updated: 2, 2006 | Rating: 0 | Author: securekit kit | Size: 1327 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
11. | Password Manager XP 2.1.322 (cp-lab.com) | ||
information with several encryption algorithms simultaneously (Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish). Importantly, no temporary files are ever created, guaranteeing the encrypted data will never be intercepted. The blocks of information are cleared from the computer memory as soon as they are no longer needed. And if the program is left idle for a set | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
12. | Simplyzip 1.1b63 (paehl.de) | ||
other think. With filecryption: Rijndael/Twofish (256 bit keysize) + Blowfish (448 bit keysize) Simplyzip is a multi archiver.Can open:ZIP,CZIP,ACE,CAB,RAR,TAR,GZIP,LZH,BZ2,SQX, RS, UUE,XXE,BASE64,UCL,ARJ,ZLIB,RPM,DEB,7-ZIP Create: 7z, ZIP,CZIP,Cab,LHA,TAR,TAR GZ TAR BZ2,ACE (optionale DLL), Deepfreezer SQX,UCL,RS,ZIP-SFX/LHA-SFX and | |||
Updated: 2, 2006 | Rating: 1552 | Author: Dirk Paehl | Size: 1772 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
13. | Simplyzip 1.1b63 (free.pages.at) | ||
other think. With filecryption: Rijndael/Twofish (256 bit keysize) + Blowfish (448 bit keysize) Simplyzip is a multi archiver.Can open:ZIP,CZIP,ACE,CAB,RAR,TAR,GZIP,LZH,BZ2,SQX, RS, UUE,XXE,BASE64,UCL,ARJ,ZLIB,RPM,DEB,7-ZIP Create: 7z, ZIP,CZIP,Cab,LHA,TAR,TAR GZ TAR BZ2,ACE (optionale DLL), Deepfreezer SQX,UCL,RS,ZIP-SFX/LHA-SFX and | |||
Updated: 2, 2006 | Rating: 0 | Author: Dirk Paehl | Size: 1772 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
14. | P-Encryption Suite 3.6.2.11 (cadabrasoftware.com) | ||
P-Encryption Suite is a powerful encryption program for the windows operating system used to store your private documents into a single encrypted file. There are two different encrypted archives P-Encryption Suite can create, Stealth and Normal. Stealth archives are PES archives disguised as a different file | |||
Updated: 2, 2006 | Rating: 82 | Author: Josh Sanford | Size: 10092 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | MySQL Dump Timer 1.6.0 (richtsoft.com) | ||
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL | |||
Updated: 2, 2006 | Rating: 311 | Author: Dirk Richter | Size: 1871 kb | Shareware Similar programs | |||
16. | Tray Safe 4.3 (traysafe.com) | ||
of wold's most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
17. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to remote hosts, through | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
18. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive configuration | |||
Updated: 2, 2006 | Rating: 82 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
19. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
Standard (AES) .It also supports Serpent, Mars, Triple DES,Blowfish algorithms. DevSolutionsCrypt component is designed to guard your client's or application's sensitive information with powerful byte/binary encryption algorithms.You can use it to secure your sensitive information such as passwords and credit card numbers when storing them in a databas DevSolutionsCrypt library | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
20. | Tray Safe 4.3 (fgroupsoft.com) | ||
of wold's most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
21. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program!. This strong encryption software ensures that it is | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
22. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet, Intranet, or direct dial-up modems. RBackup has many failsafe features, and conforms to standard backup methodology. RBackup can be used to operate a subscription-based retail Remote Backup Service | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
23. | PrivacyWatcher 1.20 (managebytes.com) | ||
tools for protecting your privacy: - Highly reliable 448-bit Blowfish file encryption algorithm - Secure file deletion to prevent simple recovery with UnErase tools - Startup manager to prevent unwanted programs from loading on Windows startup - Desktop lockout feature for preventing unauthorized access to your PC Without privacy there is no freedom. PrivacyWatcher offers | |||
Updated: 2, 2006 | Rating: 16 | Author: Mikhail Yurasov | Size: 1003 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
24. | PowerKey 2.11.01.22 (elcor.net) | ||
PowerKey is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
DevSolutions SecureFile 3.1 is an easy to use encryption and compression program, which is able to encrypt your personal files and sensitive data quickly, easily and securely. In addition to encryption, SecureFile creates self-decrypting exe - files which anybody with the right password / certificate can | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
26. | CryptoCrat 2005 4.61 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
27. | Axessh Windows SSH Client 3.2 (labf.com) | ||
Axessh is a Windows SSH client. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to Axessh without sacrificing any of existing functionality. Furthermore, Axessh has been developed entirely outside of the USA, and can be sold anywhere in the world (apart from places | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
28. | Advanced Encryption Plug-In Pro for Windows Explorer 4.0.3 (secureaction.com) | ||
encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CAST, RC2, Twofish, Diamond2, Mars, Gost, Tea, Safer and so on (17 algorithms). All algorithms are industrial encryption standards. Shredding (Safe removing files from your system). The shredded files will never be restored even with using Norton Unerase software. Making SFX (Self-extracting archives) | |||
Updated: 2, 2006 | Rating: 25 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
29. | Active Backup Expert Pro 1.92 (backuptool.com) | ||
Other features include selecting files by date, size and attributes, Blowfish backup encryption, creating self-extracting backups, the support for the Command-line and ActiveX automation. The ample documentation is available. The ABE Pro creates the unattended backups by using the Active Task Manager | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Panichkin | Size: 2582 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
30. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to remote hosts, through | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
31. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive configuration | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
32. | IPTunnelManager 1.3 (apbsoft.com) | ||
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic. Thus, the program makes it possible to create a secure connection for any application or service using TCP/IP (HTTP, FTP, SMTP, POP, NNTP, SNPP, Telnet, etc.). It is especially important for those | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Aronovich | Size: 1189 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
33. | Bookmark Buddy 3.5.2 (bookmarkbuddy.net) | ||
(web addresses, notes, log-in details, the lot) with 128-bit Blowfish encryption. Keep track of web sites with Bookmark Buddy's bookmark checker - it works in the background so you won't need to wait while it runs. Create and share any number of collections of bookmarks (for work, home, projects, clients) - up to 50,000 in any bookmark list! Export your bookmarks to a | |||
Updated: 2, 2006 | Rating: 0 | Author: Edward Leigh | Size: 464 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
34. | AbsoluteTelnet 4.01 (celestialsoftware.net) | ||
find comfortable and familiar, while encryption options such as Blowfish, Twofish, AES, Arcfour, 3DES, Cast128, IDEA, and RC4 give you the maximum security you desire in today's insecure Internet. AbsoluteTelnet was written from the ground up as a 32-bit multithreaded application that performs at a blistering pace in Windows 95, 98, ME, NT, 2000, and XP. Socks proxy gives you the | |||
Updated: 2, 2006 | Rating: 90 | Author: Brian Pence | Size: 1486 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
35. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
for most common crypto algorithms, such as AES DES, TripleDES Blowfish Cast RC2 RC4 RC5 for symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
36. | Cryptocx v6 6.1.3 (easybyte.com) | ||
delete) files Encrypt and decrypt strings and files with 448 Bit Blowfish Has the Fastest file encryption/decryption 256 Bit AES encryption/decryption for files and string Easily add Cryptocx v6 to your website or application in minutes Cryptocx is an Open PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx encrypts and | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
37. | AI RoboForm 6.5.3 (roboform.com) | ||
RoboForm is a utility that automatically fills in those ubiquitous Web-based forms. It adds form-filler hot buttons to Internet Explorer 4.x or Netscape 6--all you have to do is click the Fill Forms button. A wizard helps you create an identity that includes your name, address, phone number, e-mail address | |||
Updated: 2, 2006 | Rating: 0 | Author: Vadim Maslov Siber Systems | Size: 2000 kb | Shareware Similar programs | |||
38. | Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) | ||
Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure | |||
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Development > Other Similar programs | |||
39. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
40. | AES Home 4.0 (abensoft.com) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
41. | AES Pro 5.5 (abensoft.com) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
42. | Absolute CHAOS 3.8 (safechaos.com) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 0 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
43. | Home CHAOS 3.5 (safechaos.com) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
44. | StrongDisk Pro 3.0 (strongdisk.com) | ||
Strength Encryption algorithms with up to 448-bit keys: AES, GOST, Blowfish, 3DES, CAST-128, SAFER, IDEA, RC5. - Three-factor authentication using PKCS#11-compatible tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | Private Encryptor 6.2 (tropsoft.com) | ||
and Self Decrypting Executables. Registered version has DES, and Blowfish encryption, stronger encryption available as an add on. Features an extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
46. | Utalk Network Messenger 1.00 (unicorntech.net) | ||
File Transfer, Reminder Service and Logs. Message Encryption with Blowfish Algorithm. Multicasting and Broadcasting Supported. Multiple File Attachments Supported. Attractive Interface and Easy to Use. Reminder Utility Added. Logs of The communication Supported. A Network (LAN) Messenger with File Transfer, Reminder Service and Logs. Message Encryption with Blowfish | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 623 kb | Commercial Go to category: Communications > Chat & Instant Messaging Similar programs | |||
47. | CryptoExpert 2005 PE 6.02 (cryptoexpert.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | CryptoForge 3.2.5 (cryptoforge.com) | ||
client. CryptoForge provides four encryption algorithms: 448-bit Blowfish, 256-bit Rijndael (AES), 168-bit Triple DES, and 256-bit Gost. It also includes powerful compression to strengthen cryptographic security even more. The command line interface allows quick integration into automated processes and scripts, and lets you perform tasks in both interactive and non-interactive server | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
49. | PalmTree 3.5 (clickok.co.uk) | ||
and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full version has enhanced security features and multiple folder locking | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
50. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
Strength Encryption algorithms with up to 448-bit keys: AES, GOST, Blowfish, 3DES, CAST-128, SAFER, IDEA, RC5. - Three-factor authentication using PKCS#11-compatible tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Blowfish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|