|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
APP/Encrypt is a COM+/MTS component that allows application developers to strong encrypting and decrypting of text and files. Supports the latest industry-standard strong encryption and hashing algorithms including: Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160, etc.
See also: cipher, hash, decrypt, encrypt, crypt, component, activex, COM, application, Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160
HIME: Huge Integer Math and Encryption 1.04
HIME is a library with encryption functions and huge integer math functions.
RSA public key, AES (Rijndael), RC4 secret key encryption, MD5, SHA-256 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman...
Every programming language that can access a dll can use HIME: C, C++, Visual Basic, Delphi, PowerBASIC, PureBASIC..
The math functions work with huge integers that can be up to 2^31 bits long (268 million digits).
See also: RC4, Diffie-Hellman, SHA-256, digital signature, RSA, Rijndael, AES, secret key encryption, public key encryption, library, dll, encryption, arbitrary precision, multiple precision, SHA-1, MD5
DeepCoder is a program to encrypt, decrypt and/or digitally sign e-mails and files using secret keys (passwords) or public keys.
It can be used with any e-mail program or wordprocessor program. No plug-ins are required.
Very easy to use and very straightforward!
DeepCoder works with any POP3 e-mail client (like Outlook, Outlook Express, Eudora, Pegasus, ...) or a browser for webmail (Yahoo! mail, Hotmail, ...) to encrypt and decrypt e-mails.
See also: compress, archive, files, e-mail, privacy, SHA-256, digital signature, RSA, Rijndael, AES, secret key encryption, public key encryption, decryption, encryption, decrypt, encrypt, protect, password, passphrase, PGP, webmail
Marxio File Checksum Verifier 1.2
Program to calculate and verify checksums of files downloaded from the internet. Supports major checksum types: MD4, MD5, SHA1, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, HAVAL 256, TIGER 192. Portable version - no installer, just one file. Basic interface with no fireworks. File Chcecksum Verifier (FCV) can save window position, stay on top on other windows or can be rolled-up to mini bar. Application is ideal for portable USB drives.
See also: generate, compare file checksum, verify checksum, drag and drop, portable, md4, md5, sha1, sha-256, sha512, haval, tiger, ripemd-128, ripemd-160, mini application, stay on top
Icon Extract Tool 1.0
Extract icons in the files: exe, dll, ico.
Automatic extract icons from disk or folder.
Extract icons, sub icons.
Support mono, 16, 256, color, and true color for 24bit,32bit(XP icon).
Save the icons to .ico files.
See also: subicon, 256 color, true color icon, xp style icon, extract icon, icons, icon
Utility Phone 1.5
FREE Worldwide PC-to-PC communications using: voice, video, online/offline text messaging, text chat and file transfer, all secured using AES 256 bit encryption. Other features include activity notifications and privacy mode. For corporate V.O.I.P. peering solutions, UtilityPhone can supply a private contact server so that a corporation can limit communications within their own private group. Subscribers may fix/lock their User I.D..
See also: AES, security, secure, video conferencing, video, offline messaging, instant messaging, messaging, text chat, voice, voip, AES 256 bit, communicate, communications
Icon Lock-iT XP 3.3
Icon Lock-iT XP, strong file encryption and security for Windows XP, 2000, NT Desktop files. Portable data storage security for iPod and flash drives. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Self-decrypting option lets you send/distribute encrypted files for on-the-go security. Accompanied by Security Suite for increased password security. Configurable user accounts let you decide who can lock files
See also: Lock-it, locking, secure, encryption, lock, password generator, flash drive XP, ipod security, privacy, protection, file, protect, password, 256 bit, ipod, Encryption, desktop
A quick and professional way to add strong encryption to your application. 1Crypt is a function library (DLL) which allows you to easily and securely encrypt files, strings, and buffers using 256-bit Advanced Encryption Standard (Rijndael) encryption. Using strong encryption in your application doesn't have to be complicated.
See also: application app, use, add, functions, function, dll, strings, string, files, file, rijndael, aes, strong, library, bit, 256, 256-bit, encrypt, encryption
Blaze ImgConvert 2.05
Advanced batch image conversion supporting over 140 formats and an entire arsenal of options and features. Images can be resized or rotated automatically in the same operation. Comprehensive compression, sub-formats, colorspaces, and color depths are available. Sophisticated naming templates can be configured to format output filenames in any number of possible ways. Additional features: report logging, information on source files, and much more!
See also: convert, conversion, resize, rotate, image, graphics, colorspace, color depth, multi-page, rename, AFP, ANI, AWD, BMP, DIB, CGM, CMP, CMX, CUR, DCX, DGN, DICOM, DIC, DCM, DRW, DXF, DWF, DWG, EMF, EPS, EXF, EXIF, FAX, FLC, FLI, FPX, GBR, GEM, GIF, HPGL, JPG, TIF, PDF, PCX, PNG, PSD, PSP, MODCA, SGI, batch jpg, batch psd, batch dcx, dgn to eps, flc to gif, tif to dcm, emf to dxf, dgn converter, DGN DWG converter, eps dgn converter, convert tif to dwf, convert jpg to cur, 256 color, dcm audio converter, eps to dwg converter, psd to jpg convertor, converter dwg to dgn, convert CGM TO IMAGE, open dcx file, psd to jpg, converter gif to cgm
A quick and professional way to add strong encryption to your application. 1Crypt is an ActiveX control which allows you to easily and securely encrypt files and strings using 256-bit AES Rijndael) encryption. String and file ceccksums using SHA 256-bit hashes. Using strong encryption in your application doesn't have to be complicated.
See also: encryption, encrypt, 256-bit, 256, bit, library, strong, aes, rijndael, file, files, string, strings, dll, function, functions, add, use, application, app
Long Path Support API 1.2
Library to be used with C#, C++, VB allows your programs to overcome standard limitation on path length to files and directories. This limitation encounters in explorer, different file managers, and even when working with WinAPI itself. Our libraries work with both NTFS and FAT32 file systems. The library solves the problem with trailing spaces or other unsupported characters in filenames as well.
See also: path too long, accessing files with names longer than 256 chars, 256 chars limit, SDK, path too long, delete long path, trailing space, trailing dot, mac files, 260 path limit
Alligator Data Guard 1.1.060
Alligator Data Guard is a tool for protecting your confidential information, using AES algorithm with 256-bit key and Haval 256-bit Hash Message Authentication Code (HMAC) to simultaneously verify the data integrity and the authenticity for better security. You can encrypt all your data (file, folder, disk). It is also possible to combine folders and disks into one crypto-file. The encryption process is faster than other encryption software.
See also: encryption software, protect data, encrypt file, encrypt folder, encrypt disk, encrypt data, AES-256 bit key, Haval HMAC 256, best encryption tool, best encryption program, fastest encryption tool, fastest encryption software, best security
Batch Pdf Protection Software 1.3
Lock pdf documents with open password security and owner restrictions. Pdf open user password ensures that pdf file can be opened by authorized users only and owner guard restrict pdf print, edit, copy, form fill, sign, comment and page extraction. Tool supports strong RC4 and AES 128 bit + 256 bit encryption level security for protecting batch pdf files.
See also: Pdf, encryption, security, lock, protect, batch, files, RC4, AES, 128, 256, bit, secure, encrypt, disable, disallow, bulk, documents, print, edit, copy, form fill, sign, comment, form fill, split, merge, strong, strength
Pdf Locker with AES 256-bit 1.0.1
Secure your PDF Files using password protect capabilities which can be found in AdroitPDF Locker. AdroitPDF locker is a security tool that enables you to lock your PDF files using graphical interface based software that lets you manage bulk PDF. AdroitPDF Locker support data encryption levels RC4-40 bit, RC4-128 bit, AES-128 bit and AES-256 bit.
See also: Encrypt, pdf, encryption, locker, lock, protect, secure, protection, bulk, batch, RC4, AES, 128-bit, 256-bit, key, strong
Hpmbcalc Hex Calculator 3.2
This is a programmable multiple-precision hex calculator with many utilities. With Hpmbcalc, you can easily perform a lot of big number math operations, such as: square root, modular inverse; hash and CRC calculation; pseudo-random number generation; primality test; hex, dec, oct, bin conversion; etc.
See also: hex calculator, hex calc, big number calculator, CRC calculator, hash calculator, hex editor, hex viewer, SHA, RIPEMD, CRC32, modular calculator, cryptanalysis tool
HsCipherSDK Encryption Library 1.0
HsCipherSDK is an Encryption Library providing an API to a suite of symmetric cryptographic algorithms and digital signing functions. The library includes block and stream cipher modules: AES, 3DES, ARC4, CAST-128, Blowfish,Twofish, MD5, SHA-1.
HsCipherSDK includes Standard DLL and ActiveX DLL for use from Visual C++, Visual Basic or other languages, code examples, documentation. HsCipherSDK Plus edition includes full source code in Viusal C++
See also: AES, DES, Triple DES, ARC4, CAST128, Cast5, Blowfish, Twofish, MD5, SHA-1, C Source Module, Encryption Library, FIPS 197, C Source Library, FIPS-46-1, FIPS-46-3, RFC 2144, RFC 1321, RFC 3174
Easy Hash 1.0
Simple file and text hash value calculator. Supports more than 130 hash functions including: Adler 16-3, BKDR Hash, CK SUM, CRC DNP, CRC-16 (IBM), CRC-16 (Kermit), CRC-16 (Modbus), CRC-16 (Sick), CRC-16 (X25), CRC-16 CCITT (XModem), CRC-16 CCITT (ZModem), CRC-24, CRC-32, CRC-32 bzip2, CRC-32 jam, CRC-32 mpeg-2, CRC-64 (ECMA), FCS 16-32, FNV (0,1,1a) 8-1024, Fletcher-32, Haval 128-256, MD2, MD4, MD5, RIPEMD 128-320, Sapphire 128-320, Tiger
See also: hash, hash value, checksum, crc32, md5, sha1, sha-1, md4, crc16, tiger, ripemd, adler, sapphire, haval
Japplis Toolbox 1.1
Japplis Toolbox is a compilation of text utilities in one application. It can encode and decode URL, Base64, Hex, SoundEx or Metaphone. It can convert numbers from/to binary, octal, decimal, hexadecimal and to date. It gives you text information such as character count, word count, MD5 or SHA. You can get Java system properties, environment variables or Swing default values. You can run it online as Applet.
See also: text, url, encoding, decoding, base64, md5, sha, Java, regular expressions, codec
UNETSHA is a plug-in for extending security health check capabilities and interoperability with third-party endpoint security solutions on the Microsoft NAP platform. It enables more granular network access control in an enterprise-wide NAP implementation that includes heterogeneous network terminals such as Windows, Linux and Mac OS X.
See also: SHA, SHV, NPS, compliance check, NAP, NAC, network access protection, network access control
fpexpress? is a free utility for calculating and verifying message digest of disk file and/or text. Main features: 01.Multiple platforms (Windows,Linux, Mac OS X) support 02.Multiple languages ( English, Chinese, Russian, Japanese, Korean, German, French, Italian, Greek and Hindi languages) support 03.Multiple algorithms (MD5,SHA, and 20 others) support 04.and more...
See also: fpexpress, digest, hash, MD5, SHA, multiple languages, multiple platforms, Multiple algorithms, GUI