Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for '3des'

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Points

SWX OnlinebackupVer.: 1.3.2

categ.: >

...ckup targets. Available for it are local disks, FTP servers, local network and data servic... local network and data services in the "cloud" (WebDAV). Already integrated Cloud`s are: Dropbox, CloudMe, Strato HiDrive, 1 & 1 SmartDrive, T-Onl...oud`s are: Dropbox, CloudMe, Strato HiDrive, 1 & 1 SmartDrive, T-Online Media Center, GMX.de, Web.de, MyDrive.ch, 4shared.com, BOX.com yandex.com, smestorage.com... Integrated version control: If desired, you always have sev...ol: If desired, you always have several backups on hand. How much you want to keep multiple versions of your file is limited only by the available memory backup. You can enable them individually for each backup destination versioning. To save e.g. automatically get the latest versions in the cloud and keep different (older) versions on an attached USB hard drive. Be alerted after completing a backup by email or...

Download size: 158 kBytes

Security ToolkitVer.: 0.6

categ.: >

...tum Digital Security. The Security Toolkit allows you to create encrypted virtual drives, ...ate encrypted virtual drives, encrypt your hard drives, USB (flash) drives and CD/DVD?s. Also included is a secure file shredder, Internet & Applica...D/DVD?s. Also included is a secure file shredder, Internet & Application History shredder, encrypted password manager, random password creator, spyware remover and more. Includes powerful AES (US Government Standard) encrypti...S (US Government Standard) encryption, 3DES, Serpent, Blowfish and Twofish algorithms as well as US DoD, Guttmann, ACSI/33 and other secure deletion methods. You can even create your own deletion algorithms and spyware removal routines with the fully scriptable deletion engine. Freeware for non-profit use....

Download size: 5444 kBytes

FileBarricader 2004Ver.: 1.4.0.0

categ.: >

...ay and age the protection of one`s personal and sensitive files and information is one of ...les and information is one of the most important and often one of the most neglected aspects of using computers. Computers are used for just about e...cted aspects of using computers. Computers are used for just about everything today: online shopping, running businesses, surfing the net, communicating with friends and family and colleagues and so on and so forth. Imagine ...s and so on and so forth. Imagine someone getting hold of your tax documents for the last couple of years. Or that comprehensive portfolio report you received from your broker. Or maybe all the salary information you keep for all your employees. Or that once in a lifetime business idea you came up with. You get the idea, don`t you? Needless to say, the damage you could suffer from something like this is almost...

Download size: 1688 kBytes

cryptlibVer.: 3.0

categ.: >

No icon available

...experienced programmers to add strong encryption and authentication services to their prog...ication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level deta... more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption .... Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: AES (Rijndael) Blowfish DES, 3DES RC2, RC4, RC5 The following hash algorithms are available in the library: MD2, MD4, MD5 RIPEMD-160 SHA It offers services such as: S/MIME SSL/TLS ssh It features various hashed message authentication code algorithms: HMAC-MD5, ...

Download size: 1347 kBytes

Trustix Enterprise FirewallVer.: 4.6

categ.: >

... assets and business transactions by ensuring fast, secure connections with the Internet a...onnections with the Internet and networks. It enables fast, controlled connectivity, providing strong protection against unwanted intrusion without ...ity, providing strong protection against unwanted intrusion without slowing the flow of approved traffic. Supports businesses with highly sophisticated networks and also those just requiring basic email, Web browsing. An esse... basic email, Web browsing. An essential security component for today`s ebusiness environment. Some Features: * Visualise DMZs - drag and drop security policy deployment * Integrate branch offices with 3DES encrypted VPN tunnels * Accelerate internet access times with proxy caching server * Authenticate remote workers with PKI X.509 certificates * Ensure high availability with fault tolerant...

Download size: 438774 kBytes

Elcro EncrypterVer.: 1

categ.: >

...data. It uses an advanced 3DES encryption algorihm with combinations of base64 encoding. I...inations of base64 encoding. It`s use is not limited to certain data types. It can encrypt any type of file and decrypt it afterwards. One encrypted...an encrypt any type of file and decrypt it afterwards. One encrypted archive can contain multiple files and you can edit it as you wish.......

Download size: 830 kBytes

WISeCryptVer.: 1.3.44

categ.: >

...d protection. Users can securely protect, encrypt, decrypt and wipe files and folders on t...nd wipe files and folders on their PC or other storage devices. Users can safely transmit confidential data over the Internet knowing that only the ... transmit confidential data over the Internet knowing that only the desired recipient can read it. Users can obtain a free publicly trusted X.509 CertifyID secure email digital certificate from WISeKey, to create digital sign...rom WISeKey, to create digital signatures and S/MIME messages using their favourite email programs. Features include: integration with Windows shell; high security using trusted X.509 digital certificates; securing files and folders; wiping files and folders. It supports AES (Rijndael), 3DES, RSA, RC4 and other asymmetric and symmetric cryptographic algorithms....

Download size: 8789 kBytes

Trustix Enterprise FirewallVer.: 4.8.1

categ.: >

...ise Networks and the only WYSIWYG (What You See Is What You Get) firewall in the world. A ...Get) firewall in the world. A fully-featured packet-filtering router, Trustix Enterprise Firewall has advanced capabilities including the intuitive ...terprise Firewall has advanced capabilities including the intuitive Xsentry graphical user interface (GUI) for visualizing and editing the firewall policy and behaviour. This unique GUI enables you to manage traffic for all y...les you to manage traffic for all your zones (up to 24) as well as port forwarding, network address translation (NAT) and virtual private network (VPN) configurations. Trustix? Enterprise Firewall uses the IPsec protocol to encrypt data transmitted over the `net- extending the security of your network to all arms of your business. Communications between your office and home users are protected using 168-bit 3DES...

Download size: 294 kBytes

WinSesameVer.: 10.1

categ.: >

...t a file or a folder with a password. Make files or folders confidential. Prohibit the ope...confidential. Prohibit the opening of a file or a folder. Protect data on external hard drive, usb, cdrom, network. Create virtual safes. Make a pow...al hard drive, usb, cdrom, network. Create virtual safes. Make a powerful parental control. Transfer confidential data by email. Protect files and folders with a numeric signature file. Clean discs against the recovery of res...n discs against the recovery of residual data. Automatically close all the protected folders and files opened. Maximum efficiency with 6 encryption algorithms available: 3 special algorithms with limitless key length: WNS910, WNS915 and WNS1020 (the most powerful algorithm available today) 3 standard public algorithms : DES, TripleDES (3DES) and AES (designed for the United States Government.) Easy to use thank...

Download size: 57 kBytes

WebNMS SNMP API Android EditionVer.: 1.0

categ.: >

...uild SNMP-based network management applications for android powered devices. It can be use...powered devices. It can be used for monitoring and tracking network elements that are reliable and scalable.The lightweight Java SNMP library provid...t are reliable and scalable.The lightweight Java SNMP library provides off-the-shelf components for trap and table handling along with basic SNMP operations, such as SNMP GET, SNMP GETNEXT, SNMP GETBULK, and SNMP SET. These c...SNMP GETBULK, and SNMP SET. These components enable simple development of SNMPv1, SNMPv2c, and SNMPv3 management applications for android devices. The SNMP management application (manager) built using the Java-based SNMP API can receive SNMP traps, which can be processed based on predefined criteria for effective SNMP management. Key Features of WebNMS SNMP API Android Edition are, Complete support for SNMPv1,...

Download size: 2011 kBytes

 Sponsored Links:
Google
 
Web www.FreewareBox.com