rich cryptographic free software


Search results for tag «rich cryptographic»:

SecurePro 1.2.1.1 SecurePro 1.2.1.1
…  to specify forbidden directories and files to prevent accidental encryption. Advanced logs that keep a specific records of all actions performed by SecurePro. ยท… 

CheckSummer 0.2 CheckSummer 0.2
… ographic checksums of arbitrary files. It supports MD5, SHA-1, and SHA-256 digest algorithms. CheckSummer's interface is not clogged up with useless graphics or unnecessary buttons and is very easy to use. Requirements Java Runtime Environment… 

Omziff 3.0.9 Omziff 3.0.9
… Rijndael, and Twofish. Omziff will also generate random passwords, splits files and does simple file shredding according to DOD Standards. It is freeware, comes in a standalone executable file with no dependencies and is completely USB compatible!… 

P-Guard 1.03 P-Guard 1.03
… , who is owner of encrypted file may decrypt this file. Shell integration allows to use P-Guard with maximum comfort: You can start P-Guard from right-mouse context menu or you can easily integrate the P-Guard in your favorite file manager.… 

Secure Disk 2.22 Secure Disk 2.22
…  and proven Blowfish cryptographic algorithm will make your encrypted disk unconquerable Very fast encryption. You may even not notice the time it used. Easy to use. Both the creation of a new container and the mount process are very simple. Su… 

SQLcrypt 1.5 SQLcrypt 1.5
… ied passphrase. Sidestep the difficult cryptographic problems of secure key generation and management. SQLcrypt is implemented in portable C code. It is immediately available for the Windows platform. Ask us about BSD, Linux, OS X and Solaris.… 

Rich Chorus RC-i 1.0 Rich Chorus RC-i 1.0
…  thin instruments (guitars / keyboards / "little" vocals / etc.) with thickness and subtle depth. This is achieved through a flange-like manipulation of the source wave, overlapped and slightly time-lagged, thus providing width, rather than distance.… 

Crypto Tools 1.01 Crypto Tools 1.01
… mended, and can then be compressed with any non lossy algorithm). Crypto Tools usually doesn't need any kind of installation, simply copy the executables where you desire, but for special issues and for more informations see the documentation.… 

Entropia Password Manager & Generator 1.3 Entropia Password Manager & Generator 1.3
… Entropia is an application which actually does two things: (a) Stores passwords using modern secure cryptographic methods and (b) Generates passwords using random or pseudo random options. Limitations 30 days full featured shareware.… 

Hiron 2.9.5.11 Hiron 2.9.5.11
… novative encryption technology. A higher-order elliptic curve is used for asymmetric (public key) encryption. The program was designed and implemented by a professional theoretical physicist who also is an experienced cryptography programmer.… 


Related: