Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for crypto CryptoExpert Express 2.1 in SecureAction Research, LLC CryptoExpert Express is easy to use on the fly encryption software with user friendly interface. Uses strong AES encryption to protect important files and has ability to create large encrypted volumes up to 10GbPrivate InfoKeeper 2.8 in Ablazesoft Private InfoKeeper is extremely powerful and highly secure innovative password management tool. It allows you to store just about any confidential information in most convenient way. Our software consists of unique software engineering solutions: Unexcelled web browser integration (you don't need even to click), Spyware counteraction system, Advanced master password handling, Powerfull password generator, AES 256bits encryption and lots more.PassCryptor 1 in Keskydee PassCryptor keeps your passwords safe with strong encryption using the Twofish Cypher. You don't have to remember all your passwords anymore with this easy to use management tool. Includes one-click link and copy password to clipboard features. Free 30 day trial version. Twofish is a block cipher by Counterpane Labs. It was one of the five Advanced Encryption Standard (AES) finalists.Amelix FCL 1.0 in Amelix.com Keep your private files from unauthorized use. Amelix FCL (File Cryptor Lite) allows for the easy encryption and decryption of all your personal files. Encrypt and decrypt files of any type. Amelix FCL does not change a size and date of encoded files. If the user enters wrong key, the encrypted file will be decoded but it's content will be invalid.Advanced Crypto Drive 1.0 in RedJSoft With Advanced Crypto Drive you can keep your confidential data - documents, letters, photos, videos, programs and any other files and folders strongly protected on virtual encrypted disks. Such disk has no differences from any other physical hard disk drive but it supports transparent on-the-fly encryption to keep secret data strongly secured.Cryptocx v6 6.2.9 in Easybyte Software Corporation Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v6 builds upon the previous releases of Cryptocx to add further powerful features in a very easy to use bundle. The versatility of Cryptocx, combined with the fastest file encryption available anywhere. Full Open PGP component dll with the ability to create Self Decrypting Archives SDA, Cryptocx an essential component for data security. You can also Securely Shred files.ionCube PHP Encoder 6.5 in ionCube The Encoder encrypts optimised compiled code to deliver top security and run-time performance for protected scripts. It ensures that your source code can never be revealed because even before encoding, scripts are translated into obscure binary data that only a special execution engine can understand, and never restored to any kind of source.Polar Crypto Component 2.5 in Polar Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto is an ActiveX and DLL component featuring the latest encryption technology and including full source code written in MS Visual C++.PDF Password Cracker 3.0 in CrackPDF.com Inc PDF Password Cracker can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions.Advanced Encryption Package 2006 4.4.11 in SecureAction Research, LLC AEP2006's most noteworthy feature may be its flexibility and military grade encryption: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run witthout needing AEP2006. The program includes a file shredder that wipes the contents of your original files. Complete support for .zip archives. Skinnable interface (+12 skins)! Complete Command Line Interface support.WinCrypto 1.3 in AtvSoftware The Application helps to encrypt and decrypt sensitive information. Well known RC4 encryption algorithm is used by WinCrypto application. The WinCrypto is optimized well and works extremely fast. The application is compatible with Win98SE / Me / NT / Win2000 / XP / Win2003.CryptoExpert 2006 Professional 6.5.0 in SecureAction Research, LLC The system mounts a volume file to create a "virtual drive" that appears to applications like any other physical drive. User needs to enter a password to mount this container file as drive and can unmount it instantly by pressing special hot key. This PRO version additionally allows you to mount the container file that is stored on another computer over a local network. Encrypted drive can also be shared between local network users.ShyFile - File and Email Security 6.26 in Dr. Bootz GmbH ShyFile encodes your text (txt- and HTML-files) and packs it into a file that is to be attached to an outgoing e-mail or uploaded to a Web site. The recipient thereof does not need to have ShyFile installed to be able to decode since any Internet browser will open it and prompt the user to enter the matching key phrase. ShyFile also encrypts binary files. Any file can be used the key. Offers a symmetric depth of encryption of up to 6,144 bits.HS Crypto C Source Library 1.0 in Hillstone Software HS Crypto is a software library in C (supplied with full source code) which offers a programmer an API to several data encryption / decryption algorithms. Implemented methods include the use of 2 either pre-defined or dynamically generated translation tables, an XOR-based stream cipher method with random dynamic key, plus the library includes RFC1321 MD5 Message Digest AlgorithmLLCryptoLib 1.3 in LittleLite Software LLCryptoLib offers encryption classes and hashing functions for text and binary files plus full shredding capabilities. Free for non commercial uses. Hashing algorithms: MD2, MD4, MD5, SHA1, SHA256, SHA384, TIGER, RIPEMD160, CRC32 Symmetric Encryption algorithms: ROT13, Playfair, PseudoDES, DES, Triple DES, Rijndael (AES), ARC4, Blowfish
|