Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for 'cryptographic'Pages : 1 2

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Points

EDXORVer.: 1.64

categ.: >

...essor that far surpasses the capabilities of other Notepad-like applications. It offers in...ike applications. It offers innovative clipboard handling, cryptographic options and logic text conversions, great for education, fun, or privacy. E... and logic text conversions, great for education, fun, or privacy. EDXOR is small, self-contained, dependency-free and very fast. It provides over 90 menu items, including many unique functions and options, for diverse applic...ons and options, for diverse applications....

Download size: 35 kBytes

Multiple Password GeneratorVer.: 1

categ.: >

...ords (for things such as email accounts, social network accounts etc) using just a single ...unts etc) using just a single easy to remember password (the master password). So it is good if you simply want to remember one easy password for di...o it is good if you simply want to remember one easy password for different accounts (of various sorts) you may have. Once you have typed in your master password simply press generate to generate the other six passwords. It ...nerate the other six passwords. It is suggested to make the master password a memorable secret that only you know the answer to. This program uses a combination of cryptographic methods to generate secure passwords. Program works with Windows 7 in XP compatability mode....

Download size: 226 kBytes

P-GuardVer.: 1.03

categ.: >

...ic services, which allow encrypt any type of sensitive user`s data. Only person, who is ow...s data. Only person, who is owner of encrypted file may decrypt this file. Shell integration allows to use P-Guard with maximum comfort: You can sta... integration allows to use P-Guard with maximum comfort: You can start P-Guard from right-mouse context menu or you can easily integrate the P-Guard in your favorite file manager.......

Download size: 384 kBytes

Backup verification toolVer.: 1.3

categ.: >

...r burned without errors. That is, the copied file(s) is exactly the same as the original. ...tly the same as the original. This is done by calculating a cryptographic checksum using the md5 message-digest algorithm on each file from the sour...um using the md5 message-digest algorithm on each file from the source and the copy destination. The checksums for each file are then compared. Any difference indicates that the copied file is not the same as the original sou...is not the same as the original source file. Name of the file that fail to match the original source file is printed to stdo. Initially this script was written to verify that a CD ROM backup has been burned error free. Currently the script can verify whole directory trees as well as single files....

Download size: 2 kBytes

R-Crypto Disk SecurityVer.: 1.5

categ.: >

...tion and personal data on a desktop, notebook, or a removable data storage device against ...e data storage device against unauthorized access. R-Crypto creates virtual disks (virtual data storage devices) encrypted on-the-fly. Such virtual ...s (virtual data storage devices) encrypted on-the-fly. Such virtual disk is an ordinary file stored on any data storage device whether it?s a hard drive, USB-disk, CD, DVD, or a network resource. An access to any information ...urce. An access to any information on the virtual encrypted disk is impossible unless user provides a correct password. All files stored on the disks are encrypted and decrypted in a real time using the cryptographic infrastructure of the Microsoft Windows operating system that includes various installable cryptographic service providers already pre-installed in Windows OS. For example Microsoft provides the mo...

Download size: 2979 kBytes

Datum LockerVer.: 0.1.13

categ.: >

...te taking which are deemed sensitive. Its strength comes from the use of Nullox`s linearis...m the use of Nullox`s linearistic distance cryptographic (LDC) algorithm to securely store your data on disk thereby presenting an intruder with ran...rely store your data on disk thereby presenting an intruder with random symbols due to the omittance of a valid key. Datum Locker operates on a timer thus monitoring when the application becomes idle, such a time will result...comes idle, such a time will result in the application locking and docking onto the system tray. Datum Locker allows you to juggle your workstation notes and login accounts safely as a lock exists on this data behind the scenes deploying cryptography since it is fundamentally for your eyes only. By safe from PC intruders and store your data on disk in an unreadable state with the Datum Locker....

Download size: 522 kBytes

FastSumVer.: 1.9

categ.: >

No icon available

... The high accuracy and speed attains through the usage of a well-known and time-proved cry...well-known and time-proved cryptographic algorithm, as a matter of fact FastSum is a Windows MD5 Checker. You do not have to be afraid of these unin...is a Windows MD5 Checker. You do not have to be afraid of these unintelligible words, all you have to know is ? how to run FastSum. You can rectify the errors occurring while data transfer. For example: Network transfers, CD-...For example: Network transfers, CD-R and DVD burning, software errors and much more. FastSum calculates short and strong digests of your data via MD5 algorithm to use it as references checksums for ulterior data integrity verification. FastSum is developed for easy processing of a huge files count and has usable command-line interface. To make the work easier FastSum MD5 utility for Windows provides special filt...

Download size: 424 kBytes

Advanced Hash CalculatorVer.: 1.31

categ.: >

...for files. Simply drag and drop files in this calculator and hash string for the files wil... hash string for the files will be displayed on the fly. Supported cryptographic hash calculation algorithms include CRC32 control sum, GOST hash, M... hash calculation algorithms include CRC32 control sum, GOST hash, MD2, MD4,.MD5, SHA-1, HA2 (256), SHA2 (384), SHA2 (512). You may copy separate hash string corresponding to the file contents data or export them in to text f...ts data or export them in to text file for future use. This software is capable of up to 1000 concurent hash calculations....

Download size: 579 kBytes

WISeCryptVer.: 1.3.44

categ.: >

...d protection. Users can securely protect, encrypt, decrypt and wipe files and folders on t...nd wipe files and folders on their PC or other storage devices. Users can safely transmit confidential data over the Internet knowing that only the ... transmit confidential data over the Internet knowing that only the desired recipient can read it. Users can obtain a free publicly trusted X.509 CertifyID secure email digital certificate from WISeKey, to create digital sign...rom WISeKey, to create digital signatures and S/MIME messages using their favourite email programs. Features include: integration with Windows shell; high security using trusted X.509 digital certificates; securing files and folders; wiping files and folders. It supports AES (Rijndael), 3DES, RSA, RC4 and other asymmetric and symmetric cryptographic algorithms....

Download size: 8789 kBytes

CryptoLabVer.: 1.02

categ.: >

..., and incorporates text-based encryption / decryption through the use of plug-in cipher mo...h the use of plug-in cipher modules. Advanced features include SMTP email support, a Key Manager and pseudo-random key generation. Features list: ...t, a Key Manager and pseudo-random key generation. Features list: Plug-in cipher modules. Advanced pseudo-random key generation. Easy-to-use tabbed interface for text files. Key Manager storage utility. Full password pr... storage utility. Full password protection (incorporating SHA-1 hashing algorithm). Integrated SMTP email support. PDF, HTML and Word Document export options. Statistics calculator. Included encryption modules: Affine Shift ARCFOUR Blowfish Cipher Caesar Cipher Data Encryption Standard Modular Shift Algorithm (by EJC Cryptography) Rijndael (American Encryption Standard) Substitution Cipher Vigenèr...

Download size: 797 kBytes

Find others 'cryptographic' freeware Pages : 1 2
 Sponsored Links:
Google
 
Web www.FreewareBox.com