Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for 'blowfish'Pages : 1 2 3

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Points

Net Guard 2010Ver.: 3.5

categ.: >

...es your privacy and shields your computer and true IP address from a variety of Internet t...s from a variety of Internet threats. Once the program installed and registered, it will be up and running in instantly whilst still remaining easy ... it will be up and running in instantly whilst still remaining easy enough for anyone to use! * Prevent Identity Theft - Net Guard protects you from criminals who are out to steal your identity. Net Guard 2010 masks your IP ...tity. Net Guard 2010 masks your IP address and keeps you invisible on the Internet. An IP address can convey a lot of information about you, even who you are and where you live. * Encrypt Your Connection - Net Guard allows you to browse over a fully encrypted connection. Your surfing is completely invisible no matter where you go on the Web. Every page you visit, every search you make, even every instant messag...

Download size: 4937 kBytes

ArchiCrypt Live MobileVer.: 5.10

categ.: >

...encrypted in ArchiCrypt Live volumes. The viewer can open a single volume at a time. If yo...single volume at a time. If you want to create new volumes or use advanced features like changing access to existing volumes or using the PKI featur...res like changing access to existing volumes or using the PKI feature to transfer volumes please purchase ArchiCrypt Live. ArchiCrypt Live Mobile is ideal to transfer ArchiCrypt Live volumes to users who don?t have an ArchiCr... to users who don?t have an ArchiCrypt Live license or to transfer volumes between several computers. ArchiCrypt Live offers real-time encryption and protection for sensitive private or business data. ArchiCrypt Live lets you encrypt any file type on your PC, USB stick etc. Only you are able to access your encrypted data. Your files can be encrypted using either Blowfish or the AES 256 bit algorithm. ArchiCrypt ...

Download size: 3700 kBytes

BCArchiveVer.: 1.06

categ.: >

...folders to an encrypted archive (i.e. single file). You may store all you confidential fil...store all you confidential files in such archive accessing it whenever you need it. All your files are encrypted, i.e. protected from unauthorized a...it. All your files are encrypted, i.e. protected from unauthorized access. You may create self-extracted program containing encrypted archive and e-mail it to your friend. He/she will receive this archive and can read your fi...e this archive and can read your files, either via knowing correct password or via using public/secret key technology. All already generated public and secret keys used in other programs can be also used in BCArchive to create encrypted archive and e-mail it to desired recipient. BCArchive uses strong symmetric encryption algorithms such as Blowfish, IDEA, Triple-DES, CAST5; secure hash algorithms: SHA-1, MD5, R...

Download size: 2837 kBytes

Encrypt FilesVer.: 1.5

categ.: >

...t your confidential data. It is fast desktop application that supports 13 advanced encrypt...t supports 13 advanced encryption algorithms including Blowfish, Cast, Ice, Mars RC 2,6 and 4, Rijn Dael, Tripple Des. Encrypt Files shreds files af... RC 2,6 and 4, Rijn Dael, Tripple Des. Encrypt Files shreds files after encryption and makes them hidden in Windows. Encrypt Files has powerfull file shredder integrated so you can permanently remove unwanted files from your ...ly remove unwanted files from your system. With Encrypt Files you can encrypt and password protect both files and folders....

Download size: 1039 kBytes

Acubix PicoBackup for Outlook ExpressVer.: 2.1

categ.: >

...mails backup utility packed with many powerful features.Various methods of backup like ful...ous methods of backup like full backup, incremental backup and multi-generation backup are supported, giving you full control on how to backup. Fea...backup are supported, giving you full control on how to backup. Features: Flexible integrated scheduler, CD/DVD burning and spanning, 256-bit AES/Blowfish encryption, backup to remote FTP server, standard ZIP compression, em...erver, standard ZIP compression, email notification, detailed logging and more. Many different types of media are supported, including flash/thumb drives, Zip/Jazz drive, floppy drive....

Download size: 3453 kBytes

Security ToolkitVer.: 0.6

categ.: >

...tum Digital Security. The Security Toolkit allows you to create encrypted virtual drives, ...ate encrypted virtual drives, encrypt your hard drives, USB (flash) drives and CD/DVD?s. Also included is a secure file shredder, Internet & Applica...D/DVD?s. Also included is a secure file shredder, Internet & Application History shredder, encrypted password manager, random password creator, spyware remover and more. Includes powerful AES (US Government Standard) encrypti...S (US Government Standard) encryption, 3DES, Serpent, Blowfish and Twofish algorithms as well as US DoD, Guttmann, ACSI/33 and other secure deletion methods. You can even create your own deletion algorithms and spyware removal routines with the fully scriptable deletion engine. Freeware for non-profit use....

Download size: 5444 kBytes

Encryption SoftwareVer.: 4.1.0

categ.: >

...encryption software, you can encrypt and password-protect your files, folders, hard drives...ur files, folders, hard drives, flash drives and USB drives. This Windows encryption software scrambles your data with strong Blowfish and AES crypt...tion software scrambles your data with strong Blowfish and AES cryptography and stores it in virtual vaults, so no one can access it without knowing your encryption password. Vista Compatible....e....

Download size: 1639 kBytes

rjhExtensionsVer.: 1.3

categ.: >

...ctions to the context menu of Windows Explorer. The utility consists of the extensions and...consists of the extensions and an organizer that allows you to control the placement of the extensions. Path to clipboard:Copies the path of the se...ment of the extensions. Path to clipboard:Copies the path of the selected folder or file to the clipboard. Shred File(s): Overwrites and then deletes the selected file or files. Rename Files: The Rename Files extension ... Files: The Rename Files extension allows you to quickly and easily rename multiple files in multiple folders. Encrypt File: The Encrypt/Decrypt extension allows you to easily encrypt and then decrypt any file using a modified version of the powerful Blowfish encryption algorithm. Duplicate File(s): Creates a copy of the selected file or files in the same directory. The duplicate files will maintain the p...

Download size: 657 kBytes

LLCryptoLibVer.: 1.1

categ.: >

...ography software tools for the .NET platform on Windows(TM) systems. It offers both text a...systems. It offers both text and stream encryption classes and hashing functions for text and binary files, plus full shredding capabilities. It is... for text and binary files, plus full shredding capabilities. It is free for students and academic purposes. Enterprise or commercial licenses must be purchased (see enclosed licensing options). It is engineered to be easy ...ons). It is engineered to be easy to use and standard compliant, fully compatible with ASP.NET Web Applications and Visual C#, Visual Basic .NET, Managed C++ .NET Applications. LLCryptoLib can be linked to managed (.NET) and unmanaged (COM) projects. Hashing algorithms: * MD2 * MD4 * MD5 * SHA1 * SHA256 * SHA384 * TIGER * RIPEMD160 * CRC32 Symmetric Encryption algorithms:...

Download size: 1505 kBytes

cryptlibVer.: 3.0

categ.: >

No icon available

...experienced programmers to add strong encryption and authentication services to their prog...ication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level deta... more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption .... Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: AES (Rijndael) Blowfish DES, 3DES RC2, RC4, RC5 The following hash algorithms are available in the library: MD2, MD4, MD5 RIPEMD-160 SHA It offers services such as: S/MIME SSL/TLS ssh It features various hashed message authentication code algorithms: HMAC-MD5, ...

Download size: 1347 kBytes

Find others 'blowfish' freeware Pages : 1 2 3
 Sponsored Links:
Google
 
Web www.FreewareBox.com