|
||||||
|
||
|
Home > Cipher software |
Related keywords: stream cipher, secure email encrypted e mail encryption crypto online privacy rsa twofish block cipher stream ciphe |
|
|
31. | EDCrypt 3.1 (softuarium.com) | ||
functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
32. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. Of course, if you are really concerned about | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
33. | FirmTools PanoramaComposer 2.0 (firmtools.com) | ||
preview that makes creating panoramas just as easy as playing Lego’s. Since the software uses a proprietary algorithm for stitching images, the overlap between images may be anywhere between two and fifty percents, with no stitches or other distortion visible. There is also a built-in image enhancing mechanism that get rids of glitches that may be present in the original images | |||
Updated: 9, 2005 | Rating: 19 | Author: Joe Kelner | Size: 1693 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | Fisheye Player 2.01 (imaysoft.com) | ||
Fisheye Player create 360 degree Panorama,Use single shot Fish eye image. With Web/Windows Published generates Java Applet and Executable File. No Stitching needed. System Character : (1) Multiple Panoramic image supported : Fisheye,Cylindrical,spherical,PAL35/PAL53,Panoramic Mirror. (2) One Shot Version 2.01 add Video Function, Create Panoramic AVI File | |||
Updated: 9, 2005 | Rating: 74 | Author: Cognac Hsih | Size: 10116 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
35. | Hiding CHAOS 5.6 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | Home CHAOS 3.5 (safechaos.com) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | I-Cipher AP 2.2.2 (ambitware.com) | ||
with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | Invisible CHAOS 5.1 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | Japanolle 1.3 (yavsoft.com) | ||
crosswords are ciphered pictures. You have a playing field with rows and columns, each of them is described by some number. The number says how many colored cells there are in each row/column. Their order corresponds to the order of colored areas. The purpose of the game is to fill the cells in the correct order. There are tons of different pictures to provide you with everlasting | |||
Updated: 3, 2005 | Rating: 0 | Author: John Drifter | Size: 964 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
|
Home > Cipher software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|