QuickCrypt Library 2.50
Fast, highly optimized implementation of symmetric (private-key) encryption algorithms: DES, Triple DES (3DES), DESX, BLOWFISH, RIJNDAEL (AES-Advanced Encryption Standard), GOST. Supports 5 modes of operation. Allows to encrypt/decrypt files, memory blocks, strings, streaming data. Supports 2 interfaces: API and C++. Has no external dependencies such as MFC DLL, COM/DCOM or other component. The help file has examples in Visual Basic(VB),C,C++.
encrypt, encryption, encrypting, encrypted, algorithm, file, string, data, block, memory,
DeepCoder is a program to encrypt, decrypt and/or digitally sign e-mails and files using secret keys (passwords) or public keys. It can be used with any e-mail program or wordprocessor program. No plug-ins are required. Very easy to use and very straightforward! DeepCoder works with any POP3 e-mail client (like Outlook, Outlook Express, Eudora, Pegasus, ...) or a browser for webmail (Yahoo! mail, Hotmail, ...) to encrypt and decrypt e-mails.
encrypt, decrypt, encryption, decryption, public key encryption, secret key encryption, aes, rijndael, rsa, digital signature,
Black is an easy to use encryption program. It encrypts and decrypts folders using a key. Filenames of encrypted files are scrambled. Black also allow you to create an emergency plan for when you need to make sure all your secret files are encrypted while others are rather shredded.
encryption, decryption, shred, shredding, hide, protect,
Strong File Encryption Decryption 1.0
PrimaSoft Strong File Encryption and Decryption utility is a Windows software that allows you easily and quickly to encrypt and decrypt selected files or folders on your computer using the latest industry standard strong encryption algorithms: - AES (US Advanced Encryption Standard, secret-key encryption also known as Rijndael), Twofish (secret-key encryption), RSA (public-key encryption).
encryption software, encryption, decryption, security, file, folder, strong encryption, aes, rijndael, twofish,
Image processing library (ocx) featuring over 150 methods for image manipulation and enhancement, special effects, encryption, convolution and special filters, layer blending, advanced selection routines, perspective and orientation adjustment, color replacement, antialiasing, tinting, colorizing, masking, contrast and saturation gradients, and many more. PixTwix can read and write many popular image formats and includes full clipboard support.
image, processing, selection, irregular, non-contiguous, region, magic wand, undo, rotation, color channel,
The Cryptime program is intended for information encryption. You can set the password and TimerLock and encrypt any files. The TimerLock is supposed to set the time when it will be possible to decrypt the file encrypted. Apart from the time set the files encrypted cannot be decrypted, even if the password is known.
encryption, decryption, zip, time, file, security,
Top Secret Text 1
Top Secret Text is an Intuitively Easy-To-Use High performance Encrypter-Decrypter of text files. Very useful to maintain personal and corporate security and privacy. Uses 4 user-defined key numbers.TS-Text is based on unpublished Encryption Algorithms, which makes encrypted texts impossible to decrypt by conventional (published, known) algorithms. Encryption softwares based on published (known) algorithms, generate vulnerable encryptions.
text files, encryption, decryption, security, privacy,
Utilant Encryption Library 1.1
Don?t spend over $100 on an encryption utility. Use this COM-accessible full-featured encryption library from: ASP, VB 6, VC++, Visual FoxPro, C#, VB.NET, and any other language that supports COM or .NET. Supported encryption types include: DES, 3DES, RC2, Rijndael (AES), RSA and DSA. Free to try with a 10 second delay, $50 to buy.
utilant, asp, vb, vb 6, visual foxpro, vc++, vb.net, .net, des, aes,
Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files
encryption, decryption, hashing, message digest, shredding, security, cryptography, cipher,
PlexCrypt Compression-Encryption 3.1
PlexCrypt is a graphical based software that allows set of files or folders to compress using Zip format. PlexCrypt supports both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. In addition, it encrypts and decrypts set of files or set of folders using AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. PlexCrypt can create self-decrypting files. In addition, it allows users to create and manage digital certificates for encryption.
compression, encryption, decryption, public key infrastructure, synchronous, self decryption, digital certificate, aes, blowfish, cast,
Distributed Password Recovery 1.0.19
From now on, using distributed computing for password recovery is a snap. Simply install the agent module on all available local or remote PCs. The program utilizes CPU idle time, which is otherwise wasted. The more computers you connect, the faster you'll recover passwords from encrypted office documents (MS Word and MS Excel files). Easily installed, easily managed and incomparably efficient.
distributed, attack, password, recovery, decrypt, decryption, network, microsoft office,
I-Cipher AP 2.2.2
Extremely fast and reliable image file encryptor/decryptor with build-in activity log recording every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It proves to be an invaluable tool for image protection against unauthorized use or theft.
image encryption, encryption, security, data encryption, decryption, encryption tools, cipher, ambitware, privacy,
JvCrypt is a powerful encryption and compression utility that allows you to encrypt your sensitive files with ease. With JvCrypt you can store your passwords in a secure password database and even require a password when starting. JvCrypt can even be ran from the command line or from a batch file.
encryption, decryption, encrypt email, decrypt email, encrypt text, encrypt messages, encrypt, decrypt, security, secure files,
-96Crypt is a file/FOLDER EnCryption/DeCryption program using highly trusted block ciphers in CTR & CBC mode + MAC, together with several collision-resistant HMAC-HASH algorithms. -File's Steganographic feature supporting 11 different picture/sound format. -Powerful file shredder DoD 5220.22-M compliant. -CRC16 / CRC32 Checker-Modifier of any file or any hand-typed string. -HASH / MAC Checker of any file or any hand-typed string.
96crypt, encryption, decryption, shredder, steganography, crc, hmac-hash,
PenProtect is the most comprehensive and secure solution to protect the files within your USB Flash Drive, Flash Memory or Pen Drive. Files are encrypted and protected using your Password and a special technique (AES algorithm 256 bit key). PenProtect requires no installation. It is a single file located in the home folder of your Flash Drive. Ability to encrypt or decrypt only required files. No size limit of encrypted files.
flash drive, flash memory, usb flash drive, pen drive, encryption, password, usb drive, protect, protection, data,
Browse Pages: 1