Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for 'crypto gram words puzzle'

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Name

AlphaPeeler ProfessionalVer.: 1.0b

categ.: >

...s educational tool at the faculty of Computer Engineering, SSUET. Students can easily lear...SUET. Students can easily learn frequency analysis and ciphers like Monoalphabetic substitution, Caesar and Transposition. AlphaPeeler Professional ...ic substitution, Caesar and Transposition. AlphaPeeler Professional 1.0b (powered by crypto++ 4.1) also includes DES, Gzip/Gunzip, MD5, SHA-1, SHA-256, RIPEMD-16, RSA key generation, RSA crypto, RSA signature & validation, an...pto, RSA signature & validation, and generation of secret share files. AlphaPeeler 1.0 was developed at Department of Computer Engineering, Sir Syed University of Engineering & Technology - Karachi (Pakistan). You can contact AlphaPeeler development group (alphapeeler@bigfoot.com) , for you software development, security and ecommerce requirements. Copyright ...

Download size: 1546 kBytes

BigSpeed Secure Socket LibraryVer.: 2.0

categ.: >

... simplifies and accelerates the development of proprietary communication solutions over th...ommunication solutions over the Internet. It implements a flexible message-oriented protocol on top of a single TCP connection. The transfered data ...ted protocol on top of a single TCP connection. The transfered data are scrambled using on-the-fly 128-bit AES encryption with random session keys, without need of SSL certificates. The security is provided in two different m...rity is provided in two different modes: symmetric encryption with shared secret key and asymmetric encryption with 1024-bit public/private keys. Transport level authentication is available with optional digital fingerprints or secret keys. Building a virtual private application network is just a matter of setting the same crypto key on two or more sites. BigSpeed Secure Socket Library can be used both on clie...

Download size: 785 kBytes

cryptlibVer.: 3.0

categ.: >

No icon available

...experienced programmers to add strong encryption and authentication services to their prog...ication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level deta... more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption .... Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: AES (Rijndael) Blowfish DES, 3DES RC2, RC4, RC5 The following hash algorithms are available in the library: MD2, MD4, MD5 RIPEMD-160 SHA It offers services such as: S/MIME SSL/TLS ssh It features various hashed message authentication code algorithms: HMAC-MD5, ...

Download size: 1347 kBytes

Crypto Anywhere - OpenPGP EditionVer.: 2.0

categ.: >

...pt and encrypt messages to friends using PGP, OpenPGP, SecExMail and many more. Crypto Any...Mail and many more. Crypto Anywhere allows you to make a travel floppy which can be used in internet cafe`s or at work. You don`t even need to insta... be used in internet cafe`s or at work. You don`t even need to install the software - just run it from the floppy disk or USB thumb drive. Encrypted messages can be sent to friends who don`t even have Crypto Anywhere. Registe... even have Crypto Anywhere. Registered users can use Crypto Anywhere for commercial purposes. Crypto Anywhere implements trusted, industry standard, strong encryption algorithms based on RSA public key encryption, the Twofish block cipher, ISAAC random number generator and OpenPGP....

Download size: 2987 kBytes

Crypto-gram words puzzleVer.: 2.1

categ.: >

...pto-gram selects a sentence from the list. Then it crypts it, and presents it for solving...., and presents it for solving. This crypto gram game challenge the mind. The object of it is to solve the puzzles by selecting letters and placing t...ect of it is to solve the puzzles by selecting letters and placing them onto the crypto grams map. You can add your own words or sentence into the list. Also you can print the puzzle and present it for your friend or send fla...sent it for your friend or send flash program by e-mail. This program is absolutely free. Fun for all ages and skill levels....

Download size: 15 kBytes

HamachiVer.: 1.0.2.5

categ.: >

...ork (VPN) freeware application capable of establishing direct links between computers that...t links between computers that are behind NAT firewalls without requiring reconfiguration (in most cases); in other words, it establishes a connecti...iguration (in most cases); in other words, it establishes a connection over the Internet that very closely emulates the connection that would exist if the computers were connected over a local area network. Currently availabl...al area network. Currently available as a production version for Microsoft Windows, and as beta - for Mac OS X and Linux. Consisting of the server cluster managed by the vendor of the system and the client software, which is installed on end-user computers. Client software adds a virtual network interface to a computer, and it is used for intercepting outbound as well as injecting inbound VPN traffic. Outboun...

Download size: 986 kBytes

Keeping Your Secrets Secret: SDSVer.: 1.2

categ.: >

...zip manager and For-Your-Eyes-Only content viewer. The unique e-mail security caters for t...e e-mail security caters for the privacy of all web mail and POP3 users. SDS uses RSA 8192-bits public key cryptography and AES 256-bits. All symmet...s RSA 8192-bits public key cryptography and AES 256-bits. All symmetric encryption uses random numbers as keys and our own Seecrets Signature-Free technology. The powerful password manager is the world`s first with the streng...s the world`s first with the strength (entropy) of a randomly generated 256-bit AES key. It is also resistant to all key loggers and eavesdroppers. Benefits: * It is FREE for personal use. * It is easy to use, no more difficult than driving a car. Most crypto or e-security software are normally hard to use. The ease-of-use is our number one design objective without sacrificing security and robustness. * Using no...

Download size: 2986 kBytes

myuTokenVer.: 1.3.1.4

categ.: >

... Smart Card. Smart Card API is MS-CAPI and PKCS#11. This Software have 2 CSP (Crypto Serv...ftware have 2 CSP (Crypto Servise Provider). One is BaseCSP (Microsoft Base Smart Card Crypto Provider). Another is Original CSP. Two CSP is availa...t Card Crypto Provider). Another is Original CSP. Two CSP is available at same time. You may use SiMyuCard instead of usb flash drive. SiMyuCard is Freeware and Smart Card Software Simulator....r....

Download size: 28543 kBytes

Password InventorVer.: 1.0.0.0

categ.: >

...random number generator. Password can be generated with single-click button, but it`s poss...le-click button, but it`s possible to flexibly adjust the generation method. The program can be easily used by system administrators and programmers... program can be easily used by system administrators and programmers, but also by home users who are worried about their PC`s security. Main features: - Simple single-click password generation. - Pattern-based password genera...on. - Pattern-based password generation. - Generation of pronounceable passwords that are easy to remember. - Ability to generate a list of passwords. - Program uses a cryptographically strong number generator from Microsoft Crypto API. - No installation required. - User-friendly interface....

Download size: 687 kBytes

R-Crypto Disk SecurityVer.: 1.5

categ.: >

...tion and personal data on a desktop, notebook, or a removable data storage device against ...e data storage device against unauthorized access. R-Crypto creates virtual disks (virtual data storage devices) encrypted on-the-fly. Such virtual ...s (virtual data storage devices) encrypted on-the-fly. Such virtual disk is an ordinary file stored on any data storage device whether it?s a hard drive, USB-disk, CD, DVD, or a network resource. An access to any information ...urce. An access to any information on the virtual encrypted disk is impossible unless user provides a correct password. All files stored on the disks are encrypted and decrypted in a real time using the cryptographic infrastructure of the Microsoft Windows operating system that includes various installable cryptographic service providers already pre-installed in Windows OS. For example Microsoft provides the mo...

Download size: 2979 kBytes

 Sponsored Links:
Google
 
Web www.FreewareBox.com