ciphertext encrypted free software


Search results for tag «ciphertext encrypted»:

File Conservator 1.65 File Conservator 1.65
… ta. -Support File Format: Document Files *.doc,*.rtf,*.wri,*.txt, Executable Files *.exe,*.ocx,*.dll, Video Files *.avi,*.mpg,*.mov,*.dat, *.wav,*.mod,*.voc,*.ogg,*.cda,*.aif, Archive Files *.zip,*.rar,*.lzh,*.lha,*.arj -and MUCH More!… 

Vigenère Cipher 2.0.2.3 Vigenère Cipher 2.0.2.3
… t (.vpc) file, as appropriate. There is no file size limit in Vigenère Cipher although your operating system and memory configuration may impose such limits. Menu options include functions similar to the toolbar, along with various help options.… 

Caesar Shift Cipher 2.0.1.2 Caesar Shift Cipher 2.0.1.2
… .csc) file, as appropriate. There is no file size limit in Caesar Shift Cipher although your operating system and memory configuration may impose such limits. Menu options include functions similar to the toolbar, along with various help options.… 

StealthDisk 2004.1.909 StealthDisk 2004.1.909
… ations The evaluation version of StealthDisk has a password limitation of only 2 characters. This is highly insecure and very easy to guess. It is meant for testing and evaluation purposes only. Otherwise, everything else is fully functional.… 

Substitution Cipher 2.0.1.2 Substitution Cipher 2.0.1.2
… .stc) file, as appropriate. There is no file size limit in Substitution Cipher although your operating system and memory configuration may impose such limits. Menu options include functions similar to the toolbar, along with various help options.… 

Transposition Cipher 2.0.1.2 Transposition Cipher 2.0.1.2
… tpc) file, as appropriate. There is no file size limit in Transposition Cipher although your operating system and memory configuration may impose such limits. Menu options include functions similar to the toolbar, along with various help options.… 

CryptoForge 5.5.0 CryptoForge 5.5.0
… n is accomplished by writing a pattern of all ones, zeros, and a stream of pseudo- random data, iterating the number of times specified by the user. The name of the file is overwritten as well. The length of the file is then truncated to zero.… 

encrypted::Mail 2.0 encrypted::Mail 2.0
… encrypted::Mail will allow users to send encrypted emails to anyone with ease, regardless of the users or recipients existing mail client. encrypted::Mail uses symmetric encryption and allows senders to add a pass phrase for additional security.… 

Paragon Encrypted Disk 3.02 Paragon Encrypted Disk 3.02
… side on a hard drive, on a network drive, on removable media such as CD/DVD, a USB flash memory drive etc. Once an encrypted disk image is created it can be mounted as a virtual drive anytime and anywhere later. The disk image can be mounted only… 

Encrypted Magic Folders 06.09.1 Encrypted Magic Folders 06.09.1
… s. EMF is so fast and transparent you'll soon forget you're using encrypted files. Laptop users find Encrypted Magic Folders invaluable for protecting any business or personal data they wouldn't want a thief to have should their laptop be stolen.… 


Related: