secure algorithms free software


Search results for tag «secure algorithms»:

NoteVault 2.0 NoteVault 2.0
… ommon and secure encryption algorithms : CryptAPI, Blowfish, DES and RC4 ( plus hash algorithms ) Limitations 15 days trial This download is marked as adware because it displays advertisement banners or other type of commercials while running.… 

ZiNE Secure Archiving Lite 1.0 ZiNE Secure Archiving Lite 1.0
…  Manager & Advance Unique Key Generator Drag and Drop interface, and easy to use! Limitations 1. Access only to 1/3 featured encryption algorithms 2 Unable to Add or Delete files in existing archive, except when creating new archive.… 

CaesarBackup LE 1.13 CaesarBackup LE 1.13
… n is a professional and easy to use file backup utility featuring fast and secure processing algorithms. Create a backup session within a few minutes. Once prepared, you can start and update your backup just by two mouse clicks: Select and start.… 

CryptoSuite 1.100 CryptoSuite 1.100
… ndows operating systems. Here are some key features of "a": Extremely secure encryption algorithms used, RSA, RIJNDAEL and TWOFISH. Encrypt files and folders into secure archives. Make Self Extracting Archives so you can easily send them to f… 

Secure Network Messenger 1.5.5 Secure Network Messenger 1.5.5
… ned to work with medium and large local area networks, but it is also convenient for small local networks consisting of two and up to several dozen computers. With SNM, your employees will be able to communicate without leaving working places.… 

P-Encrypt Secure Drive 1.2.2.3 P-Encrypt Secure Drive 1.2.2.3
… arameters Secure File Deletion: To assure that recovery programs can not restore the data that you have deleted. No backdoors: Once your data has been encrypted. There is no way of restoring the data with out the proper password. Skinable inter… 

TachyonWipe 1.0 TachyonWipe 1.0
…  the files, given enough time with specialized expensive tools. You can download a fully-functional free trial version now with which you can start creating your own brand of a File Shredder! A sample application is included in the package.… 

HsCipherSDK Encryption Library 2.2 HsCipherSDK Encryption Library 2.2
… lgorithms Digitally sign disk files using one of selected hashing algorithms Limitations Every time evaluation version of HsCipherSDK library is loaded it displays a reminder message (nag screen), which requires a user to click Okay to conti… 

PSYBEncrypter 2.7 PSYBEncrypter 2.7
…  be reloaded and viewed at a later time. You may run a full screen slideshow of your encrypted pictures and video clips Limitations after 50 runtimes the encrypt button will be disabled, you will still be able to view and use all other functions… 

JumBlo 1.3 JumBlo 1.3
… tion process. First the data is broken into random length blocks and the bytes shuffled randomly. Then the Blowfish algorithm is applied. This algorithm is well described in the encryption literature and is commonly regarded as being one of the most secure algorithms around. No successful attack has… 


Related: