security algorithm free software


Search results for tag «security algorithm»:

Cipherlok 2.1 Cipherlok 2.1
… when, for example, travelling with a notebook computer. A secure file delete function ensures that deleted files cannot be retrieved. Cipherlok works either with traditional passwords or for extra security can use our USB Cipherlok Tokens.… 

Genetic Algorithm Viewer 1.0 Genetic Algorithm Viewer 1.0
… arge part of mathematical development during the XVIIIth century dealt with that topic (remember those always repeated problems where you had to obtain the derivative of a function to find its extremes). Purely analytical methods widely proved the… 

GI PassGen Security Suite 1.6 GI PassGen Security Suite 1.6
… in using a familiar web style interface, then generate up to 9999 passwords/usernames that conform to US State Department algorithm and view/manage your username/password/comments file and insert, delete, sort records or save/close your file.… 

Computer Security 1.5 Computer Security 1.5
… lcomed quests". Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with a random number of layers of data.… 

DataGuard 2.0 DataGuard 2.0
… DataGuard protects your applications or clients' sensitive information with a security control that has a powerful byte/binary encryption algorithm. Encrypt any type of file as well as strings with one line of code. Key codes can be… 

CipherNote 1.0 CipherNote 1.0
… ormation in a secure way without incurring the overhead of most secure systems. It allows you to informally jot down ideas, keep some private names and numbers handy or just to store any private information without worry. The Blowfish algorithm p… 

Secure Disk 2.22 Secure Disk 2.22
…  and proven Blowfish cryptographic algorithm will make your encrypted disk unconquerable Very fast encryption. You may even not notice the time it used. Easy to use. Both the creation of a new container and the mount process are very simple. Su… 

ShadowSecurityScanner 7.55 ShadowSecurityScanner 7.55
… ithm based on a patented “intellectual core”. SSS performs the system scan at such a speed and with such a precision so as to be able to compete with the professional IT security services and hackers, attempting to break into your network.… 

Advanced File Security 3.0 Advanced File Security 3.0
… Info] Key-Extension for higher security Load saved encryptions Complete context menu support Optional background mode Optional shutdown function Also usable without Installation Simple and easy usage Detailed Help & Support… 

MrG File Encryption 2.0 MrG File Encryption 2.0
… n program, you can take your secret to antwhere with no worry. The perfact ability got Mr.G File Encryption high value in the customer group.Mr.G File Encryption was used broadly under personal and commercial. Limitations 15 days trial… 


Related: