methods cipher shareware downloads


Search results for «methods cipher»:

DP Multicrypt 2.0 DP Multicrypt 2.0
… r use 2048 bit keysize RC4 cipher use 2048 bit keysize RC2 cipher use 1024 bit keysize Mars cipher use 1248 bit keysize IDEA cipher use 128 bit keysize CAST256 cipher use 256 bit keysize . A commandline decrypter.exe (freeware) is include.… 

Amethyst CIPHER 1.05 Amethyst CIPHER 1.05
… HER is a powerful file encryption program for Windows. It is fast, easy-to-use, fully supports drag and drop, and is integrated into Windows Explorer – Amethyst CIPHER is the single-click solution for data encryption Limitations 30 days trial.… 

I-Cipher AP 2.2.2 I-Cipher AP 2.2.2
… ned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form.… 

CRYPTHER.DLL 2.5 CRYPTHER.DLL 2.5
… eysize, You can use this dll with all other compilers. Delphi demo is included. The new version is not compatible with the old DLL and my other programs, but is highly secure Limitations The registred version comes without NAG at the begin… 

Encrypt Easy 3.5 Encrypt Easy 3.5
…  New version of Encrypt Easy gives user even more functions - better interface, encrypted file compression, command line tool, Windows XP support, password validation box, detailed description of all function, interactive demonstration for users.… 

HS Crypto C Source Library 1.0 HS Crypto C Source Library 1.0
… iver and transmitter to encode each byte with a rotating byte of the key RFC1321 MD5 algorithm generates a 16 byte data signature which is unique to the input data. This may be used for data integrity checking or in digital signature applications.… 

CryptoBola JPEG 2 CryptoBola JPEG 2
… oes not provide any clues for brute attacks. Not only that the embedded data can not be extracted without the proper key, but the presence of any embedded data can not be confirmed or negated by starting the extraction process with any key.… 

Cynapse MailCryptor 1.72 Cynapse MailCryptor 1.72
… decryption) Auto generation of formatted HTML Import capabilities from text and rich text (rtf) files Supports Rich Text formatting in the message Preview Encrypted Message Copy Encrypted Message to Clipboard Limitations 30 Executions… 

Four Diagnostic Methods 1.0 Four Diagnostic Methods 1.0
… There are four diagnostic methods, namely, inspection, listening and smelling, i… 

Encode It 2.01 Encode It 2.01
… hat demand military strength shredding. Designed with both a project and explorer interface, it is sure to satisfy even the most demanding professional. There`s no compromising security when it comes to Encode It. Limitations 10 day evaluation… 


Related: methods cipher  cipher use  cipher  the cipher  cipher p2p