HotRun 2.6
The program HotRun is useful for quick launch of the programs and opening of the documents. The program greatly accelerates office work, h…
Pocket Aargon Palm 1.02
Pocket Aargon is a handheld adaptation of the PC Laser puzzle game Aargon Deluxe. In this game the player must bend, turn, or modify…
 
   
   
     
Example:  Norton Antivirus
 
• New       • TOP       • Most popular       • All soft       • Advertising       • Add program       • Support       • Link to us       • About       • Board      
audio & multimedia  business  communications  desktop  development  education  games & entertainment  graphics apps  home & hobby  network & internet  security & privacy  servers  system utilities  web development  A B C D E F G I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9

Home > Blowfish software

Related keywords: blowfish zip, Blowfish DES

Home
Software
New soft
TOP-10
Best 1000
All Soft
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Number of references on page:10 | 20 | 30 | 50 | 100
Language: Any | English | German | French | Italian | Japanese | Portuguese | Spanish
License: Any | Freeware | Shareware | Demo | Adware | Commercial | Data Only
Installation: Any | Install and Uninstall | Install Only | No Install Support | Uninstall Only
Operational system: Any | Windows 95 | 98 | ME | NT | 2000 | XP | CE | Unix | Palm | Mac


Search result:
programs found: 145.

1.Home CHAOS 3.5 (safechaos.net) free  Home CHAOS download
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information.
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware
Go to category: Security & Privacy > Encryption Tools
Similar programs
2.MSCCrypto for Windows 2.0 (miraplacid.com) free  MSCCrypto for Windows download
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash)…
Updated: 9, 2005 | Rating: 313 | Author: Miraplacid Software Development | Size: 824 kb | Shareware
Go to category: Web Development > ASP & PHP
Similar programs
3.PrivacyAssistant 1.8 (productsfoundry.com) free  PrivacyAssistant download
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer…
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware
Go to category: System Utilities > Other
Similar programs
4.PrivacyAssistant Professional 1.8 (productsfoundry.com) free  PrivacyAssistant Professional download
Stop friends colleagues, spouses and digital thieves from snooping around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer…
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware
Go to category: System Utilities > Other
Similar programs
5.SecurDataStor 5.01 (encryptx.com) free  SecurDataStor download
different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a server-less authentication model. This file encryption software creates an encrypted archive or wrapper around the protected data and stores the permissions in that wrapper. This permission-based rights…
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware
Go to category: Security & Privacy > Other
Similar programs
6.DriveCrypt 3.03a (drivecrypt.com) free  DriveCrypt download
using the best and most proven cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des and Triple Des. DRIVECRYPT requires minimal administration and user training. DRIVECRYPT protects your data with very fast and a true "on the fly" encryption process. Using special so called "Steganographic" functionalities, DRIVECRYPT allows you to hide all your sensitive…
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware
Go to category: System Utilities > Other
Similar programs
7.AidAim CryptoPressStream 1.00 (aidaim.com) free  AidAim CryptoPressStream download
key support (12 algorithms and 4 modes): Rijndael (AES) 128 and 256, Blowfish, Twofish 128 and 256, DES single, double and tripple, Square. TCPSManager component for compression and encryption settings, list of opened stream, memory leaks prevention. Native VCL, does not require any DLLs. 7 Demos…
Updated: 9, 2005 | Rating: 0 | Author: AidAim Software | Size: 1062 kb | Commercial
Go to category: Development > Delphi
Similar programs
8.axsStrongBox 2.1 (morello.co.uk) free  axsStrongBox download
public domain algorithms - choose between Rijndael (AES), Twofish, Blowfish, DES and Triple DES (private key) or RSA (public key). ECB and CBC modes are available, with various standard padding options, for compatibility with other systems. Encrypting a file or a block of memory takes just a single method call. File encryption provides a convenient way of securing sensitive data…
Updated: 9, 2005 | Rating: 116 | Author: Tom Duncan | Size: 473 kb | Demo
Go to category: Development > Active X
Similar programs
9.Bind to EXE library 1.1 (codeoffice.com) free  Bind to EXE library download
embedded files can also be encrypted to increase their securities. Blowfish algorithm, one of the most secure encryption algorithms in the world, is employed to encrypt the files. In extracting stage, TExtractFromEXE can retrieve information about the collection of files embedded in the executable file, or just extract one or more files from the executable file specified by their…
Updated: 9, 2005 | Rating: 0 | Author: Chong-Wei CHEN | Size: 1587 kb | Shareware
Go to category: System Utilities > Other
Similar programs
10.Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) free  Chilkat Digital Certificates Component download
Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure…
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware
Go to category: Development > Other
Similar programs
11.Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) free  Chilkat Compression ActiveX Control download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
12.Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) free  Chilkat AES & RSA Encryption Component download
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Other
Similar programs
13.Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) free  Chilkat Data Compression ActiveX download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
14.Chilkat Encryption .NET Component 2.2.0 (chilkatsoft.com) free  Chilkat Encryption .NET Component download
well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for the use of any Cryptographic Service Provider…
Updated: 9, 2005 | Rating: 42 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
15.Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) free  Chilkat File Compression ActiveX download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
16.Chilkat XML Messaging 1.0.6 (chilkatsoft.com) free  Chilkat XML Messaging download
and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive binary or text messages using CkData. The CkData component is handy for loading/saving data to files, accessing as binary, strings (with or…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Freeware
Go to category: Web Development > XML/CSS Tools
Similar programs
17.Chilkat Zip ActiveX Compression Component 9.3.0 (chilkatsoft.com) free  Chilkat Zip ActiveX Compression Component download
your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Other
Similar programs
18.Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) free  Chilkat Zip ActiveX - Affordable Zip ActiveX download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
19.!Chilkat Zip ActiveX Control 9.3.0 (zip-compression.com) free  !Chilkat Zip ActiveX Control download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: Development > Active X
Similar programs
20.Chilkat Zip Compression .NET Class 9.3.0 (chilkatsoft.com) free  Chilkat Zip Compression .NET Class download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware
Go to category: System Utilities > Other
Similar programs
21.Chilkat Zip Compression C++ Library 9.4.0 (chilkatsoft.com) free  Chilkat Zip Compression C++ Library download
Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create Self-Extracting EXEs Works with the Chilkat Zip 2 Secure EXE utility to access…
Updated: 9, 2005 | Rating: 82 | Author: Matt Fausey | Size: 7800 kb | Shareware
Go to category: Development > Components & Libraries
Similar programs
22.cryptlib 3.0 (download.componentspot.com) free  cryptlib download
cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various…
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware
Go to category: Development > Active X
Similar programs
23.Cryptocx v5 5.1.6 (easybyte.com) free  Cryptocx v5 download
functionality. · Encrypt and decrypt strings and files with 128Bit Blowfish encryption. · Has the Fastest file encryption/decryption · 256 Bit AES encryption/decryption for files and string · Easily add Cryptocx v5 to your website or application in minutes. Cryptocx is a PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx…
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo
Go to category: Development > Active X
Similar programs
24.Cryptocx v6 6.1.3 (easybyte.com) free  Cryptocx v6 download
delete) files Encrypt and decrypt strings and files with 448 Bit Blowfish Has the Fastest file encryption/decryption 256 Bit AES encryption/decryption for files and string Easily add Cryptocx v6 to your website or application in minutes Cryptocx is an Open PGP and AES compatible encryption component designed for use in any modern development environment. Cryptocx encrypts and…
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo
Go to category: System Utilities > Other
Similar programs
25.DevSolutions Crypt 1.0.1 (devsolutions.net) free  DevSolutions Crypt download
Standard (AES) .It also supports Serpent, Mars, Triple DES,Blowfish algorithms. DevSolutionsCrypt component is designed to guard your client's or application's sensitive information with powerful byte/binary encryption algorithms.You can use it to secure your sensitive information such as passwords and credit card numbers when storing them in a databas DevSolutionsCrypt library…
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware
Go to category: Development > Active X
Similar programs
26.MySQL Dump Timer 1.2.4 (mywitch.de) free  MySQL Dump Timer download
size. * The data can be transferred compressed (gzip) and encryped (blowfish or SSL) between client and server. If you backup MySQL databases (MySQL dump) the dumpfiles are stored compressed (gz-file). MySQL Backup / MySQL Dump and MySQL Restore scheduler (Windows based) for MySQL databases. The MySQL…
Updated: 9, 2005 | Rating: 16 | Author: Dirk Richter | Size: 1871 kb | Shareware
Go to category: System Utilities > Other
Similar programs
27.EDCrypt 3.1 (softuarium.com) free  EDCrypt download
- encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files Help files and example…
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware
Go to category: Development > Other
Similar programs
28.Lucigenic Crypt 4.4 (lucigenic.com) free  Lucigenic Crypt download
services in applications and scripts. Crypt implements the Blowfish and AES (Rijndael) encryption algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for…
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware
Go to category: Development > Other
Similar programs
29.MSCCrypto for Linux 2.0 (miraplacid.com) free  MSCCrypto for Linux download
- AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash)…
Updated: 9, 2005 | Rating: 0 | Author: Miraplacid Software Development | Size: 225 kb | Shareware
Go to category: Web Development > ASP & PHP
Similar programs
30.OpenSSL 0.9.7c (download.componentspot.com) free  OpenSSL download
algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital…
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware
Go to category: Development > C / C++ / C-sharp
Similar programs
31.CryptaPix 2.24 (briggsoft.com) free  CryptaPix download
Full screen slideshows. Secure 80-bit PC1 (RC4 clone) and 160-bit Blowfish encryption keeps your private image collection away from prying eyes. Encrypted thumbnail and WAV sound support. Conversion, printing and secure wipe features are also available. Graphics viewer/encryption for Windows 95 to XP. Supports GIF, JPG, PNG, PCX, TIF, and BMP images. Full screen slideshows. Secure…
Updated: 9, 2005 | Rating: 16 | Author: Kent Briggs | Size: 674 kb | Shareware
Go to category: Graphic Apps > Viewers
Similar programs
32.ActiveDiary 3.5 (windine.com) free  ActiveDiary download
is a password-protected diary application. The program uses RSA and Blowfish encryption to protect your data and files. The interface is similar to Microsoft Outlook and is completely configurable. The program can hold an unlimited number of accounts that each contains unlimited calendar and free form…
Updated: 9, 2005 | Rating: 104 | Author: Mike Kallay | Size: 11381 kb | Shareware
Go to category: Home & Hobby > Personal Finance
Similar programs
33.AbsoluteTelnet 4.01 (celestialsoftware.net) free  AbsoluteTelnet download
find comfortable and familiar, while encryption options such as Blowfish, Twofish, AES, Arcfour, 3DES, Cast128, IDEA, and RC4 give you the maximum security you desire in today's insecure Internet. AbsoluteTelnet was written from the ground up as a 32-bit multithreaded application that performs at a blistering pace in Windows 95, 98, ME, NT, 2000, and XP. Socks proxy gives you the…
Updated: 2, 2006 | Rating: 90 | Author: Brian Pence | Size: 1486 kb | Shareware
Go to category: Network & Internet > Terminal & Telnet Clients
Similar programs
34.Acid Drop 1.3 (el-software.com) free  Acid Drop download
using the LZH compression format or protect your text strings with Blowfish encryption. Acid Drop also acts as a clipboard monitor, storing copied text snippets and making those clips accessible via a simple log. Just highlight the text snippet you want to paste into an application, then utilize the usual CTL-V hotkey combination to paste the text. URLs embedded in your text are…
Updated: 9, 2005 | Rating: 33 | Author: Aleksey Nikolayevich Remizov | Size: 1255 kb | Shareware
Go to category: Home & Hobby > Cataloging
Similar programs
35.Advanced HTMLCoder 3.0 (raysion.com) free  Advanced HTMLCoder download
for private use only, you can encrypt its code (using powerful Blowfish and GOST encryption algorithms) and set the access password. You can also protect the source code of your pages from unethical competitors by encrypting it and disabling certain functions, including the display of URLs in the status bar, text selection, right mouse button operations, printing and copying…
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware
Go to category: System Utilities > Other
Similar programs
36.Bookmark Buddy 3.5.2 (bookmarkbuddy.net) free  Bookmark Buddy download
(web addresses, notes, log-in details, the lot) with 128-bit Blowfish encryption. Keep track of web sites with Bookmark Buddy's bookmark checker - it works in the background so you won't need to wait while it runs. Create and share any number of collections of bookmarks (for work, home, projects, clients) - up to 50,000 in any bookmark list! Export your bookmarks to a…
Updated: 2, 2006 | Rating: 0 | Author: Edward Leigh | Size: 464 kb | Shareware
Go to category: Network & Internet > Browser Tools
Similar programs
37.Email CHAOS 4.52 (safechaos.net) free  Email CHAOS download
With E-mail CHAOS you can protect the privacy of your e-mail messages, files and folders by encrypting them so that only the intended recipients can read them. You can also digitally sign messages and files, which ensures their authenticity. When someone sends you e-mail with their digital signature, CHAOS…
Updated: 9, 2005 | Rating: 0 | Size: 424 kb | Shareware
Go to category: Communications > Other E-Mail Tools
Similar programs
38.hCrypt 3.0 (raysion.com) free  hCrypt download
in a few simple steps. For strong protection you can use powerful Blowfish (448 bit encryption, password length up to 56 symbols) and GOST (256 bit encryption, password length 32 symbols) encryption algorithms. To protect less sensitive information, you may use simple but extremely fast XOR encryption. You can customize the appearance of the password prompt (fonts, colors, text)…
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware
Go to category: System Utilities > Other
Similar programs
39.IPTunnelManager 1.3 (apbsoft.com) free  IPTunnelManager download
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic. Thus, the program makes it possible to create a secure connection for any application or service using TCP/IP (HTTP, FTP, SMTP, POP, NNTP, SNPP, Telnet, etc.). It is especially important for those…
Updated: 2, 2006 | Rating: 0 | Author: Pavel Aronovich | Size: 1189 kb | Shareware
Go to category: Security & Privacy > Encryption Tools
Similar programs
40.ISequre for Windows 1.4 (isecure.tripod.com) free  ISequre for Windows download
will protect your chat session encoding all messages with the Blowfish encryption algorithm. ISequre works transparently and does not add any new interface elements except its icon on the systray. You can use different keys for each of your chat partners simultaneously. ISequre is a security software application that enables you and your friends or co-workers to exchange encrypted…
Updated: 9, 2005 | Rating: 0 | Size: 152 kb | Shareware
Go to category: System Utilities > Other
Similar programs
41.NoTrax 1.4 (heidi.ie) free  NoTrax download
activate at any time during browsing. The Cache is encrypted using Blowfish. NoTrax supports SSL (Secure Socket Layer) and TLS (Transport Layer Security). The root certificates are built-in. NoTrax comes with an automatic shutdown option if idle for a certain amount of time (you decide). NoTrax does…
Updated: 9, 2005 | Rating: 0 | Author: Garrett Trant | Size: 2221 kb | Commercial
Go to category: Security & Privacy > Other
Similar programs
42.Secure Network Chat 2.6.43 (secureaction.com) free  Secure Network Chat download
All the client-server data communications protocol is encrypted with Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business…
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, Ltd | Size: 3340 kb | Shareware
Go to category: Communications > Chat & Instant Messaging
Similar programs
43.Secure Network Messenger 1.5.5 (networkmessengers.com) free  Secure Network Messenger download
Secure Network Messenger (SNM) - is a real time network communication program able to send and receive messages and files from one computer to another without using dedicated servers. All communication is highly secure! All traffic between copies of SNM is encrypted by strong encryption algorithms. The…
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 598 kb | Shareware
Go to category: Communications > Chat & Instant Messaging
Similar programs
44.X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) free  X-SecurePro Secure X-Server for Windows download
X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive configuration…
Updated: 2, 2006 | Rating: 82 | Author: Submit Submit | Size: 18077 kb | Shareware
Go to category: Network & Internet > Other
Similar programs
45.SecureCRT 4.1.2 (promaxum.com) free  SecureCRT download
both SSH1 and SSH2 protocols. SSH2 support provides AES, 3DES, RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and…
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware
Go to category: Network & Internet > Terminal & Telnet Clients
Similar programs
46.SSH client for windows SSHPro 2.9 (Labtam-inc.com) free  SSH client for windows SSHPro download
Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to remote hosts, through…
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware
Go to category: Network & Internet > Other
Similar programs
47.X-COM 2.75 (mypersonalsoftware.com) free  X-COM download
a minimun of privacy: every communications is encrypted using the Blowfish encryption algorithm. You will be able to send messages / files and chat with anyone on your lan and internet. Features: - encrypted communications (Blowfish / 56 bit): - encrypted instant messenger - encrypted public chat - encrypted file transfer Peer2Peer Secure Instant Messenger…
Updated: 9, 2005 | Rating: 446 | Size: 2185 kb | Shareware
Go to category: Network & Internet > Other
Similar programs
48.Oxide 2002 1.1 (nitrotech.co.uk) free  Oxide 2002 download
choose Oxide 2002. Your files are protected with tried and tested blowfish algorithm which has undergone over 8 years of intensive cryptanalysis along with the latest government standard in password authentication. You can be sure no-one will now read your email attachments, personal files or business documents without you knowing. To view information about the encryption used in…
Updated: 8, 2004 | Rating: 16 | Size: 44 kb | Demo
Go to category: System Utilities > Other
Similar programs
49.ABC CHAOS 2.71 (safechaos.com) free  ABC CHAOS download
ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured.
Updated: 3, 2006 | Rating: 42 | Size: 438 kb | Freeware
Go to category: Security & Privacy > Encryption Tools
Similar programs
50.Absolute CHAOS 3.8 (safechaos.net) free  Absolute CHAOS download
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive…
Updated: 9, 2005 | Rating: 16 | Size: 580 kb | Shareware
Go to category: Security & Privacy > Encryption Tools
Similar programs

Sort programs by: relevance | date | alphabet | popularity
Result Page: | 1 | 2 | 3 | Next »


301 Moved Permanently

301 Moved Permanently


nginx

Home > Blowfish software

Warkanoid 3: Story-book 3.4.1
Explore the Fairyland in this exciting block-breaking game!
Xceed SmartUI 2.0
Xceed SmartUI provides VB6 developers with a framework of visual controls for building rich user interfaces. Includes Menus, ToolBars…
Oracle of the Runes 4.0
Based on the art of rune stone casting using the symbols of an ancient Norse alphabet, Oracle of the Runes can be seen as just a bit of…

Copyright © 2004 - 2010 allworldsoft.com Contact Page