algorithms that free software
Search results for tag «algorithms that»:
Omziff 3.0.9
… Rijndael, and Twofish.
Omziff will also generate random passwords, splits files and does simple file shredding according to DOD Standards. It is freeware, comes in a standalone executable file with no dependencies and is completely USB compatible!…
DC AppProtector 1.0
…
AppProtecor has 3 levels of encryption algorithms, with about 50 million collection ,each encryption algorithms of this 50 million collection has huge variety of activation key you can generate.
AppProtecor may be used with any developing langu…
ABI- CODER 3.6.1.4
… ption algorithm
- 256 bit AES encryption algorithm
Warning ABI- CODER 3.6.1 is not compatible with versions 2.2, 3.0 or 3.01 ABI- CODER 3.6.1 3DES algorithm is also not backwards compatible with any previous versions except version 3.5.9…
HsCipherSDK Encryption Library 2.2
… lgorithms
Digitally sign disk files using one of selected hashing algorithms
Limitations
Every time evaluation version of HsCipherSDK library is loaded it displays a reminder message (nag screen), which requires a user to click Okay to conti…
DC App Protector 3.3
…
Define your multi level encryption algorithms.
Define your Free Trail days limit
Define your customized message appears on protection dialog box
Define your URL where customers can purchase your product.
Limitations
Expires in 30 days.…
SALVADOR 2.7.2
… d, signed and, at the desire, the compressed base. That, the malefactor cannot not only get access to contents of base but also how to modify it, that misinforming the owner of base.
The interface, for years of use in the several large organizatio…
CRC Calculator 1.1
… you the possibility to create and use own CRC algorithm
Platforms:
Widnows.Forms
ASP.NET
Requirements
.NET Framework
Limitations
14 days trial…
JurikSoft Compression Library 1.1.0
… thods, which allow Compress array of bytes using lossless compression algorithms.
Current version of compression library include following compression algorithms: LZSS, Adaptive and Non-Adaptive Prefix Codes and Run Length Encoding algorithm.…
USA Shield 2.15
… shredder - Matches and exceeds DOD specifications (U.S. Department of Defense).
No back doors or escrow keys - There is absolutely no way of recovering your information without the correct password, so be careful not to forget your password.…
cryptlib 3.0
… ble.
The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure.
Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the foll…
Related: