|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
APP/Encrypt is a COM+/MTS component that allows application developers to strong encrypting and decrypting of text and files. Supports the latest industry-standard strong encryption and hashing algorithms including: Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160, etc.
See also: cipher, hash, decrypt, encrypt, crypt, component, activex, COM, application, Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160
HIME: Huge Integer Math and Encryption 1.04
HIME is a library with encryption functions and huge integer math functions.
RSA public key, AES (Rijndael), RC4 secret key encryption, MD5, SHA-256 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman...
Every programming language that can access a dll can use HIME: C, C++, Visual Basic, Delphi, PowerBASIC, PureBASIC..
The math functions work with huge integers that can be up to 2^31 bits long (268 million digits).
See also: RC4, Diffie-Hellman, SHA-256, digital signature, RSA, Rijndael, AES, secret key encryption, public key encryption, library, dll, encryption, arbitrary precision, multiple precision, SHA-1, MD5
DeepCoder is a program to encrypt, decrypt and/or digitally sign e-mails and files using secret keys (passwords) or public keys.
It can be used with any e-mail program or wordprocessor program. No plug-ins are required.
Very easy to use and very straightforward!
DeepCoder works with any POP3 e-mail client (like Outlook, Outlook Express, Eudora, Pegasus, ...) or a browser for webmail (Yahoo! mail, Hotmail, ...) to encrypt and decrypt e-mails.
See also: compress, archive, files, e-mail, privacy, SHA-256, digital signature, RSA, Rijndael, AES, secret key encryption, public key encryption, decryption, encryption, decrypt, encrypt, protect, password, passphrase, PGP, webmail
Marxio File Checksum Verifier 1.2
Program to calculate and verify checksums of files downloaded from the internet. Supports major checksum types: MD4, MD5, SHA1, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, HAVAL 256, TIGER 192. Portable version - no installer, just one file. Basic interface with no fireworks. File Chcecksum Verifier (FCV) can save window position, stay on top on other windows or can be rolled-up to mini bar. Application is ideal for portable USB drives.
See also: generate, compare file checksum, verify checksum, drag and drop, portable, md4, md5, sha1, sha-256, sha512, haval, tiger, ripemd-128, ripemd-160, mini application, stay on top
Icon Extract Tool 1.0
Extract icons in the files: exe, dll, ico.
Automatic extract icons from disk or folder.
Extract icons, sub icons.
Support mono, 16, 256, color, and true color for 24bit,32bit(XP icon).
Save the icons to .ico files.
See also: subicon, 256 color, true color icon, xp style icon, extract icon, icons, icon
Utility Phone 1.5
FREE Worldwide PC-to-PC communications using: voice, video, online/offline text messaging, text chat and file transfer, all secured using AES 256 bit encryption. Other features include activity notifications and privacy mode. For corporate V.O.I.P. peering solutions, UtilityPhone can supply a private contact server so that a corporation can limit communications within their own private group. Subscribers may fix/lock their User I.D..
See also: AES, security, secure, video conferencing, video, offline messaging, instant messaging, messaging, text chat, voice, voip, AES 256 bit, communicate, communications
Advanced File Protector 2.2
Do you have files and folders containing valuable and private information? Then Advanced File Protector is the right tool for you.
Advanced File Protector is a professional file encryption tool. It uses the strongest encryption algorithms available, including RSA and the newest AES standard Rijndael to let your private data remains confidential. Use key sizes from 64 up to 1024 bits, create self extracting/decrypting archives and much more.
See also: Advanced, File, Protector, encrypt, RSA, DES, AES, Rijndael, Blowfish, 128, 192, 256, 512, 792, 1024, privacy, protection, key, cipher, password, decrypt, context, menu, shell, drag, drop, NIST, Wizard, shareware, security
DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this product.
See also: drivecrypt, securstar, encryption, encryption software, hard disk encryption, disk encryption, steganography, computer security, 256, data security, computer securitz
This is encryption software for high-level security. It enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and drives, from within Windows Explorer with right-click ease. An included secure text editor allows you to create, encrypt, and decrypt documents in a way that can be sent by any email, messenger, or chat program.
See also: bit, 256, 448, 128, gost, AES, 3des, tripledes, blowfish, rijndael, algorithm, cryptography, email, messages, folders, secure, password, privacy, encrypted, security, encrypt, encryption, bits
This is the suite of encryption tools for high-level security. It enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as entire folders and drives, from within Windows Explorer with right-click ease. An included secure text editor allows you to create, encrypt, and decrypt documents in a way that can be sent by any email, messenger, or chat program.
See also: encryption, encrypt, security, encrypted, privacy, password, secure, folders, messages, email, cryptography, algorithm, rijndael, blowfish, tripledes, 3des, AES, gost, 128, 448, 256, bit, bits
TestKing Application Developer Exam Simulator 2.1
We are all well aware that a major problem in the IT industry is that there is a lack of quality study materials. Our Certification IBM Application Developer Exam Preparation Materials provide you everything you will need to take a certification examination. Details are researched and produced by Certification Experts who are constantly using industry experience to produce precise, logical and verified explanations for the answers.
See also: IBM, Application Developer, 000-256
Network Password Manager 2.3
Network Password Manager is a security tool created especially for the enterprise. It helps employees to store and manage passwords within their company. The program can also store additional information: URLs, comments, documents, custom fields, dates etc. Your administrators can restrict access for users and groups to a records, folders and functions. Network Password Manager is a flexible and easy to use software.
See also: password, manage, network, management, security, enterprise, 256 AES, encryption, protection, storage, login, access, multi-user, administrator, user, keep
Luxena dbExpress driver for Informix Pro 1.2.4
Luxena dbExpress driver for Informix Pro provides reliable access to all Informix Servers 7 (including SE) and higher. Supports all Informix data types, ensures excellent performance and provides a large set of advanced features.
See also: builder, Delphi, Linux, Kylix, shareware, deployment, easy, informix9, informix, parameters, setnet32, string, connection, collection, row, list, multiset, set, serial8, int8, lvarchar, clob, blob, type, data, migration, alternative, BDE, ADO, dbExpress, native, informix-se, informix7, informix10, sha
Disk Password Protection 4.8.711.0
Disk Password Protection 4.8: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc.
See also: aes, protection, access control, secure nt, partition lock, systme lock, os lock, disk lock, crypto, partition, volume, hdd, boot password, volume encryption, disk encryption, securent, sha
Utility for protecting the integrity and verifying the accuracy of data files using checksum (message digest, hash) calculation algorithms like CRC32, MD5, SHA-1 and more. Its will allow to easily and quickly verify integrity of files downloaded from Internet, transferred over a network and/or burned onto CD/DVD. Uses the XML-based and Unicode-enabled checksum file format and also supports the SFV, MD5SUM and other checksum files formats.
See also: checksum, crc, crc32, sfv, md5, md5sum, sha, sha1, sha-1, integrity, comparison
CDCheck is utility for prevention, detection and recovery of damaged files with emphasis on error detection. It offers readability verification, creation and checking of MD5, CRC-32, SHA... hashes (in file formats SFV, MD5 and CRC), extremly efficient file compare and recovery. CDCheck can be used on all files visible by the operating system. Apart from this it also works with audio CDs and provides information about inserted CD/DVD (type...).
See also: Verification, Extraction, Audio, SHA, CDR, DVDR, DVD, SFV, hashes, hash, MD2, MD5, detect, rescue, revert, recover, error, binary, compare, CRC32, CRC-32, CRC, disk, cd-rom, cdrom, scan, check, prevention, detection, DAE
Encoder Wizard ActiveX 3.0
Encoder Wizard is a collection of two ActiveX (ocx) controls, Encoder Wizard and Decoder Wizard. These two controls allow you to fully support the Base64, Quoted- Printable, UUEncode, yEnc, MD5,HMAC MD5, URL, SHA-1, and Binary 2 Hex encoding methods. You can Encode and Decode data quickly and intelligently.
See also: sha ocx, md5 activex, base64 activex, hmac, sha, md5, uuencode, printable, quoted, base64, hmac ocx
Hyper Hasher Suite 6.0.2
The Hyper Hasher Suite will fulfill all your file hashing needs. Hyper Hasher allows you to calculate 26 different hash/checksum and HMAC values for any file on your system, while the HashFile utility adds support for MD5 & SFV file creation and verification. These tools feature advanced options including a unique customizable interface, configuration saving, optional windows shell integration, Pentium 4 optimizations for speed, and much more!
See also: md4, hasher, hyper, hashfile, sfv, ed2k, edonkey, gost, ghash, fcs, emule, ccitt, crc16, crc32, RIPEMD, sha, md2, whirlpool, crc, md5, hmac, hash
Recovery of passwords for MD4, MD5, MySQL and other hashes:
- 16 types of hashes supported.
- 7 types of attack, including Rainbow-tables attack.
- Additional tools for generating, recovery and storing of users' passwords.
See also: passwords, MD5, MD4, SHA-1, MySQL, hashes, recovery, keeper, generator, fastest
Hpmbcalc Hex Calculator 3.2
This is a programmable multiple-precision hex calculator with many utilities. With Hpmbcalc, you can easily perform a lot of big number math operations, such as: square root, modular inverse; hash and CRC calculation; pseudo-random number generation; primality test; hex, dec, oct, bin conversion; etc.
See also: hex calculator, hex calc, big number calculator, CRC calculator, hash calculator, hex editor, hex viewer, SHA, RIPEMD, CRC32, modular calculator, cryptanalysis tool