Cipher Software

Easy to use Blowfish based file encryption

Cipherlok
 

Softlok International Ltd
 

Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC using Blowfish. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be automatically encrypted at shutdown and decrypted at startup ensuring total security. Secure file deletion is also a feature. Cipherlok can use passwords or our USB Tokens for access.

Software Keywords: decryption based usb tokens decrypt file shred using

 
Cryption tool

Crypther DLL
 

Paehl
 

With this program you can crypt you file secure with:Blowfish, Cast128, Cast256, DES, 3DES, Gost, Ice, Ice2, Thin Ice, IDEA, Mars, Misty1, RC2, RC4, RC5, Twofish, RC6, Rijndael and CBC-MODE. DPCRYPT use the full crypt keysize from the cipher.

Software Keywords: rc2 twofish blowfish rc5 cast128 misty1

 
Password protect HTML, encrypt html web pages

HTML Password Encryption
 

Source Code Protection Ltd.
 

HTML password protection, encrypt HTML files with 448 bit keys. Hide html source code. Image protection - protect web images. Encryption algorithm used is much stronger than the 128 bit cipher used in todays browsers and considered secure enough for online credit card payments. Option to enter the password only once for all protected files. for more information visit http://www.htmlguardian.org.

Software Keywords: encrypt pages asp link javascript html

PassCryptor keeps your passwords safe.

PassCryptor
 

Island Limited
 

PassCryptor keeps your passwords safe with strong encryption using the Twofish Cypher. You don't have to remember all your passwords anymore with this easy to use management tool. Includes one-click link and copy password to clipboard features. Free 30 day trial version. Twofish is a block cipher by Counterpane Labs. It was one of the five Advanced Encryption Standard (AES) finalists.

Software Keywords: decrypt cypher encode save privacy pim

Mobile encryption - USB flash drive software

Challenger-Verschlüsselung
 

Bernhard Fomm
 

Challenger is a encryption software for files, folders and drives. Simple user rights for the installation and for the execution suffice. Through this the program is also flexibly usable on a USB flash drive (also U3). The software is conceived for the local data security and for closed communication circles. A new synchronous stream cipher, a development from Germany, delivers a fast encryption.

Software Keywords: real flash usb drive

File encryption utility for Windows.

SecExFile Home
 

Bytefusion Ltd.
 

SecExFile brings one-click file protection to the desktop. It integrates with Windows Explorer to make securing your personal or corporate data easy. SecEx File can be configured to email the armoured file once encryption is completed. + Strong 128/384 bit SecExMail cipher, incorporating 256 bit Twofish + Encrypt multiple files and folders into a single encrypted archive + Known plain text attack and frequency analysis protection

Software Keywords: secure file armoured file one-click brings encryption

Highly secure cipher tool

DP Multicrypt
 

Paehl
 

With this program you can crypt your files easy and fast secure with:Blowfish, Cast256, IDEA, Mars, RC4, Twofish, RC6, Rijndael with the full keysize from this cipher and the CBC-MODE. DP-MULTICRYPT support DRAG&DROP

Software Keywords: rc2 ice cast128 cast256 thin ice gost

Free program for hiding info in video.

MSU StegoVideo
 

Graphics&Media Lab Video Group
 

Free program for hiding information in video. After info hiding you can compress video with unknown codec (this is main feature) and extract you file from this video later! You can do that even if the video was compressed again by another codec. We smartly change video with understanding how codecs works. You can hide not so big files, but for cipher communication or video secret marking it is enough!

Software Keywords: video steganography information hiding filter watermarking stegovideo

On-line encryption of files and folders.

CryptoSafe
 

T-SOFT Ltd.
 

CryptoSafe offers strong combined symmetric and asymmetric encryption of files and folders. Cipher keys are secure saved on cryptography smart cards or USB tokens. It features simply and easy installation, administration and automatic on-line process - users encrypt and decrypt selected files without any knowledge of the underlying cryptographic process. CryptoSafe enables to use or built Public Key Infrastructure.

Software Keywords: rsa 3des on-line smart aes

Encryption, hashing, file shredding utility.

EDCrypt
 

Softuarium
 

Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files

Software Keywords: cryptography message digest activex data digests

 

Page 1 out of 6    1 2 3 4 5 6


 

Copyright © 2003-2012 TverSoft Software