SuggestSoft.com

Crypt

LLCryptoLib 2.0.1024

LLCryptoLib 2.0.1024: LLCryptoLib provides methods for object-oriented cryptography software LLCryptoLib offers both asymmetrical and symmetrical encryption classes and hashing functions for text and binary files plus full shredding capabilities. Free for non commercial uses. Hashing algorithms: MD2, MD4, MD5, SHA1, SHA256, SHA384, TIGER, RIPEMD160, CRC32. Encryption algorithms: ROT13, Playfair, PseudoDES, DES, Triple DES, Rijndael (AES), ARC4, Blowfish, CAST5, RSA.






No Image
Advanced Crypto Drive 1.0

cryption to keep secret data strongly secured. An encrypted virtual disk is simply a file that ACDrive mounts as an additional drive letter on your machine. You specify the pass phrase when the virtual drive is mounted and thereafter everything you access from there is automatically decrypted and anything you place there is encrypted. Main features of the program: Easy-to-use and reliable software Transparent on-the-fly encryption AES 256-bit strong

protection, disk, crypt, on the fly encryption, password, aes 128 bit, cipher, hide folder, transparent encryption, privacy, rijndael, secure data, encryption





No Image
FileMax Cryptor 1.1

FileMax Cryptor is a very quick and easy to use encryption tool.The encryption method used will result in your files being ultimately impossible to run without first being decrypted. Even if an unauthorized person gets access to your encrypted personal data, he will not be able to read it without the password.

crypt, password, cipher, encryption, sequrity, privacy



Drag`n`Crypt ULTRA 2.3.2: A small and easy to use file encryption Software with strong Twofish encrytion.
Drag`n`Crypt ULTRA 2.3.2

Drag`n`Crypt ULTRA is a small file encryption tool that supports Twofish Encryption algorithm. It uses a very handy "drop box" interface to make encryption and decryption fast and easy.

security, encryption



No Image
cryptlib 3.0

Cryptlib by Peter Gutmann is a security toolkit that allows even less experienced programmers to add strong encryption and authentication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption (private key) and

active x encryption, encryption delphi, encryption programming, encryption activex, encrypt visual basic, encryption component, encryption dll, encryption library, aes encryption, encryption ocx



Folder Crypt 3.6.7020: Password encryption for Windows files and folders with standard algorithms.
Folder Crypt 3.6.7020

cryption of your data. All you have to do is to supply a password or passphrase, which will be turned into a strong password by an hashing function. The encryption process is not reversible (you can decrypt the folder only if you know the correct passphrase). Your encrypted folder will appear as a .crypt file in place of the original folder. Original files and folders may be shredded. Opening, editing and listing folder contents is password protected

password protection, tripledes, blowfish, lock, arc4, rijndael, file encryption, encryption folder



Quiptics 5.2: Solve and construct real cryptograms on your Windows computer.
Quiptics 5.2

Real cryptograms on your Windows computer. All the challenge and enjoyment of solving cryptograms exactly like the ones found in newspapers or magazines. Make your own cryptograms instantly. Just type in a favorite quotation and click a button. Quiptics encodes the text automatically. You can print out Quiptics cryptograms to give to others to solve. Quiptics puzzles also have two difficulty levels.

acrostics, crossword puzzles, puzzles, games, word games, cryptograms, crosswords, spelling, trivia, reading, vocabulary


More Results: 1  2  3  4  5  6  

World IT News