standard cryptographic free software
Search results for tag «standard cryptographic»:
Cool File Encryption 2.4
… ographic algorithm--AES.
Support the 128,192,256-digit code in AES mode.…
DevSolutions Crypt 1.0.1
… designed to guard your client's or application's sensitive information with powerful byte/binary encryption algorithms.
You can use it to secure your sensitive information such as passwords and credit card numbers when storing them in a database.…
CheckSummer 0.2
… ographic checksums of arbitrary files. It supports MD5, SHA-1, and SHA-256 digest algorithms.
CheckSummer's interface is not clogged up with useless graphics or unnecessary buttons and is very easy to use.
Requirements
Java Runtime Environment…
HsCipherSDK Encryption Library 2.2
… lgorithms
Digitally sign disk files using one of selected hashing algorithms
Limitations
Every time evaluation version of HsCipherSDK library is loaded it displays a reminder message (nag screen), which requires a user to click Okay to conti…
WinZit! 1.3.10
… ecuring your data in three different layers: WinZit!® Application level, Archive level and Data level. WinZit!® supports files and archives up to multi-therabyte in size, the number of archived files is, for all practical purposes, unlimited.…
FastSum Standard Edition 1.6
… command line syntax
Modern Graphical User Interface
Handy step-by-step Wizards
Shell integration
Global shortcut keys
Priority of support
Limitations
30 day trial
What's New…
Omziff 3.0.9
… Rijndael, and Twofish.
Omziff will also generate random passwords, splits files and does simple file shredding according to DOD Standards. It is freeware, comes in a standalone executable file with no dependencies and is completely USB compatible!…
P-Guard 1.03
… , who is owner of encrypted file may decrypt this file.
Shell integration allows to use P-Guard with maximum comfort: You can start P-Guard from right-mouse context menu or you can easily integrate the P-Guard in your favorite file manager.…
Secure Disk 2.22
… and proven Blowfish cryptographic algorithm will make your encrypted disk unconquerable
Very fast encryption. You may even not notice the time it used.
Easy to use. Both the creation of a new container and the mount process are very simple.
Su…
abylon LOGON 15.90.1
… n'
Several smartcards for a user possible
Creating of account during the abylon LOGON or in the simulation mode possible
Simulation of the abylon LOGON procedure
Log file…
Related: