|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
APP/Encrypt is a COM+/MTS component that allows application developers to strong encrypting and decrypting of text and files. Supports the latest industry-standard strong encryption and hashing algorithms including: Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160, etc.
See also: cipher, hash, decrypt, encrypt, crypt, component, activex, COM, application, Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160
HIME: Huge Integer Math and Encryption 1.04
HIME is a library with encryption functions and huge integer math functions.
RSA public key, AES (Rijndael), RC4 secret key encryption, MD5, SHA-256 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman...
Every programming language that can access a dll can use HIME: C, C++, Visual Basic, Delphi, PowerBASIC, PureBASIC..
The math functions work with huge integers that can be up to 2^31 bits long (268 million digits).
See also: RC4, Diffie-Hellman, SHA-256, digital signature, RSA, Rijndael, AES, secret key encryption, public key encryption, library, dll, encryption, arbitrary precision, multiple precision, SHA-1, MD5
DeepCoder is a program to encrypt, decrypt and/or digitally sign e-mails and files using secret keys (passwords) or public keys.
It can be used with any e-mail program or wordprocessor program. No plug-ins are required.
Very easy to use and very straightforward!
DeepCoder works with any POP3 e-mail client (like Outlook, Outlook Express, Eudora, Pegasus, ...) or a browser for webmail (Yahoo! mail, Hotmail, ...) to encrypt and decrypt e-mails.
See also: compress, archive, files, e-mail, privacy, SHA-256, digital signature, RSA, Rijndael, AES, secret key encryption, public key encryption, decryption, encryption, decrypt, encrypt, protect, password, passphrase, PGP, webmail
Marxio File Checksum Verifier 1.2
Program to calculate and verify checksums of files downloaded from the internet. Supports major checksum types: MD4, MD5, SHA1, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, HAVAL 256, TIGER 192. Portable version - no installer, just one file. Basic interface with no fireworks. File Chcecksum Verifier (FCV) can save window position, stay on top on other windows or can be rolled-up to mini bar. Application is ideal for portable USB drives.
See also: generate, compare file checksum, verify checksum, drag and drop, portable, md4, md5, sha1, sha-256, sha512, haval, tiger, ripemd-128, ripemd-160, mini application, stay on top
Icon Extract Tool 1.0
Extract icons in the files: exe, dll, ico.
Automatic extract icons from disk or folder.
Extract icons, sub icons.
Support mono, 16, 256, color, and true color for 24bit,32bit(XP icon).
Save the icons to .ico files.
See also: subicon, 256 color, true color icon, xp style icon, extract icon, icons, icon
Utility Phone 1.5
FREE Worldwide PC-to-PC communications using: voice, video, online/offline text messaging, text chat and file transfer, all secured using AES 256 bit encryption. Other features include activity notifications and privacy mode. For corporate V.O.I.P. peering solutions, UtilityPhone can supply a private contact server so that a corporation can limit communications within their own private group. Subscribers may fix/lock their User I.D..
See also: AES, security, secure, video conferencing, video, offline messaging, instant messaging, messaging, text chat, voice, voip, AES 256 bit, communicate, communications
Icon Lock-iT XP 3.3
Icon Lock-iT XP, strong file encryption and security for Windows XP, 2000, NT Desktop files. Portable data storage security for iPod and flash drives. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Self-decrypting option lets you send/distribute encrypted files for on-the-go security. Accompanied by Security Suite for increased password security. Configurable user accounts let you decide who can lock files
See also: Lock-it, locking, secure, encryption, lock, password generator, flash drive XP, ipod security, privacy, protection, file, protect, password, 256 bit, ipod, Encryption, desktop
DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this product.
See also: drivecrypt, securstar, encryption, encryption software, hard disk encryption, disk encryption, steganography, computer security, 256, data security, computer securitz
This is encryption software for high-level security. It enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and drives, from within Windows Explorer with right-click ease. An included secure text editor allows you to create, encrypt, and decrypt documents in a way that can be sent by any email, messenger, or chat program.
See also: bit, 256, 448, 128, gost, AES, 3des, tripledes, blowfish, rijndael, algorithm, cryptography, email, messages, folders, secure, password, privacy, encrypted, security, encrypt, encryption, bits
This is the suite of encryption tools for high-level security. It enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and drives, from within Windows Explorer with right-click ease. An included secure text editor allows you to create, encrypt, and decrypt documents in a way that can be sent by any email, messenger, or chat program.
See also: encryption, encrypt, security, encrypted, privacy, password, secure, folders, messages, email, cryptography, algorithm, rijndael, blowfish, tripledes, 3des, AES, gost, 128, 448, 256, bit, bits
TestKing Application Developer Exam Simulator 2.1
We are all well aware that a major problem in the IT industry is that there is a lack of quality study materials. Our Certification IBM Application Developer Exam Preparation Materials provide you everything you will need to take a certification examination. Details are researched and produced by Certification Experts who are constantly using industry experience to produce precise, logical and verified explanations for the answers.
See also: IBM, Application Developer, 000-256
Network Password Manager 2.3
Network Password Manager is a security tool created especially for the enterprise. It helps employees to store and manage passwords within their company. The program can also store additional information: URLs, comments, documents, custom fields, dates etc. Your administrators can restrict access for users and groups to a records, folders and functions. Network Password Manager is a flexible and easy to use software.
See also: password, manage, network, management, security, enterprise, 256 AES, encryption, protection, storage, login, access, multi-user, administrator, user, keep
A quick and professional way to add strong encryption to your application. 1Crypt is an ActiveX control which allows you to easily and securely encrypt files and strings using 256-bit AES Rijndael) encryption. String and file ceccksums using SHA 256-bit hashes. Using strong encryption in your application doesn't have to be complicated.
See also: encryption, encrypt, 256-bit, 256, bit, library, strong, aes, rijndael, file, files, string, strings, dll, function, functions, add, use, application, app
Utility for protecting the integrity and verifying the accuracy of data files using checksum (message digest, hash) calculation algorithms like CRC32, MD5, SHA-1 and more. Its will allow to easily and quickly verify integrity of files downloaded from Internet, transferred over a network and/or burned onto CD/DVD. Uses the XML-based and Unicode-enabled checksum file format and also supports the SFV, MD5SUM and other checksum files formats.
See also: checksum, crc, crc32, sfv, md5, md5sum, sha, sha1, sha-1, integrity, comparison
CDCheck is utility for prevention, detection and recovery of damaged files with emphasis on error detection. It offers readability verification, creation and checking of MD5, CRC-32, SHA... hashes (in file formats SFV, MD5 and CRC), extremly efficient file compare and recovery. CDCheck can be used on all files visible by the operating system. Apart from this it also works with audio CDs and provides information about inserted CD/DVD (type...).
See also: Verification, Extraction, Audio, SHA, CDR, DVDR, DVD, SFV, hashes, hash, MD2, MD5, detect, rescue, revert, recover, error, binary, compare, CRC32, CRC-32, CRC, disk, cd-rom, cdrom, scan, check, prevention, detection, DAE
Encoder Wizard ActiveX 3.0
Encoder Wizard is a collection of two ActiveX (ocx) controls, Encoder Wizard and Decoder Wizard. These two controls allow you to fully support the Base64, Quoted- Printable, UUEncode, yEnc, MD5,HMAC MD5, URL, SHA-1, and Binary 2 Hex encoding methods. You can Encode and Decode data quickly and intelligently.
See also: sha ocx, md5 activex, base64 activex, hmac, sha, md5, uuencode, printable, quoted, base64, hmac ocx
Hyper Hasher Suite 6.0.2
The Hyper Hasher Suite will fulfill all your file hashing needs. Hyper Hasher allows you to calculate 26 different hash/checksum and HMAC values for any file on your system, while the HashFile utility adds support for MD5 & SFV file creation and verification. These tools feature advanced options including a unique customizable interface, configuration saving, optional windows shell integration, Pentium 4 optimizations for speed, and much more!
See also: md4, hasher, hyper, hashfile, sfv, ed2k, edonkey, gost, ghash, fcs, emule, ccitt, crc16, crc32, RIPEMD, sha, md2, whirlpool, crc, md5, hmac, hash
Recovery of passwords for MD4, MD5, MySQL and other hashes:
- 16 types of hashes supported.
- 7 types of attack, including Rainbow-tables attack.
- Additional tools for generating, recovery and storing of users' passwords.
See also: passwords, MD5, MD4, SHA-1, MySQL, hashes, recovery, keeper, generator, fastest
Hpmbcalc Hex Calculator 3.2
This is a programmable multiple-precision hex calculator with many utilities. With Hpmbcalc, you can easily perform a lot of big number math operations, such as: square root, modular inverse; hash and CRC calculation; pseudo-random number generation; primality test; hex, dec, oct, bin conversion; etc.
See also: hex calculator, hex calc, big number calculator, CRC calculator, hash calculator, hex editor, hex viewer, SHA, RIPEMD, CRC32, modular calculator, cryptanalysis tool
HsCipherSDK Encryption Library 1.0
HsCipherSDK is an Encryption Library providing an API to a suite of symmetric cryptographic algorithms and digital signing functions. The library includes block and stream cipher modules: AES, 3DES, ARC4, CAST-128, Blowfish,Twofish, MD5, SHA-1.
HsCipherSDK includes Standard DLL and ActiveX DLL for use from Visual C++, Visual Basic or other languages, code examples, documentation. HsCipherSDK Plus edition includes full source code in Viusal C++
See also: AES, DES, Triple DES, ARC4, CAST128, Cast5, Blowfish, Twofish, MD5, SHA-1, C Source Module, Encryption Library, FIPS 197, C Source Library, FIPS-46-1, FIPS-46-3, RFC 2144, RFC 1321, RFC 3174