|
|
Crypto
|
Crypto Anywhere License: Freeware
|
|
|
Crypto Anywhere is secure email on the move ! Crypto Anywhere is small enough to fit on a single floppy or USB key chain drive and so easy to use your grandma will be using it. Don't have a computer yourself but want to protect your web based e-mail at your local internet cafe ? Crypto Anywhere is for you ! If you suspect your employer is reading your private email, put an end to that. If you run Crypto Anywhere from a floppy disk or USB drive, you can encrypt your email without even installing software on your workstation. With Crypto Anywhere you can send and receive secure mail to and from anyone with an email account - the recipients do not have to be "crypto savvy" or even have Crypto Anywhere themselves. Crypto Anywhere implements trusted, industry standard, strong encryption algorithms based on RSA public key encryption, the Twofish block cipher and the ISAAC random number generator. Crypto Anywhere e-mail is compatible with SecExMail client based and SecExMail Gate server based encryption.
Author: Bytefusion Ltd.| Date: 16-04-2003 | Size: 1301 KB
|
|
- |
|
PlainText Crypto License: Freeware
|
|
|
This program lets you encrypt your text files into a sequence of digits. To encode and decode some text, the special key files are used. Every key file is unique and cannot be generated again. The encoded text cannot be restored without having a key file that had been used for encoding. This software may be also helpful for those who need to send secured texts via email. The encryption algorithm is stable against breaking and encoded texts are effectively protected.
Author: DGreenSoft| Date: 28-07-2004 | Size: 613 KB
|
|
- |
|
CHAOS Compressor License: Freeware
|
|
|
Data compression utility, which allows you to quickly open, create, and modify your archives.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 491 KB
|
|
- |
|
ABC CHAOS License: Freeware
|
|
|
What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. The additional special protection completely excludes an opportunity of selection of the password to the encrypted information at use of the generator of the passwords and keys.
Author: Security Resources Group| Date: 10-01-2003 | Size: 368 KB
|
|
- |
|
CHAOS Generator License: Freeware
|
|
|
CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 201 KB
|
|
- |
|
AES Free License: Freeware
|
|
|
AES Free is the program that creates self-extracting encrypted AES-files for Windows. Self-extracting files are executable programs (EXEs) that contain a AES-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting AES-files simply by running it like any other program. No other software is needed. These self-extracting AES-files are ideal to storage and electronically distribute the information because they contain multiple compressed files and folders.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 515 KB
|
|
- |
|
CHAOS Self Extractor License: Freeware
|
|
|
CHAOS Self-Extractor is the program that creates self-extracting chaos-files for Windows. Self-extracting files are executable programs (EXEs) that contain a chaos-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting chaos-files simply by running it like any other program. No other software is needed.These self-extracting chaos files are ideal to electronically distribute the information because they contain multiple compressed files and folders.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 531 KB
|
|
- |
|
P2P Messenger .NET License: Freeware
|
|
|
P2P Messenger is secure Instant Messaging client, working by Peer-to-Peer technology. It is fully decentralized and does not require any servers. Supports public-key cryptography
Author: Sergey| Date: 7-10-2002 | Size: 400 KB
|
|
- |
|
HashTab License: Freeware
|
|
|
A windows shell extension which installs a new tab with file hash information. Includes MD5, SHA1 and CRC032. Also allows for easy hash comparison. Great for verifying downloads without requiring any external tools.
Author: Beeblebrox.org| Date: 03-03-2004 | Size: 132 KB
|
|
- |
|
DLOCK2 License: Freeware
|
|
|
DLOCK2 is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2, except recompiled for the Win32 command line (for long filename support) and author contact information has been updated. The encryption key may be a passphrase on the command line or it may be contained in a file. You may use the included encryption/decryption source code in your own products at no charge. This software is free, however you may send the author donations to express appreciation if you like.
Author: Michael Paul Johnson| Date: 28-01-2004 | Size: 573 KB
|
|
- |
|
CHAOS Shredder License: Freeware
|
|
|
Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensitive files even after you have formated the hard disk. Sensitive data can easily fall into the wrong hands. And because Windows is not capable of deleting information beyond recovery, you are at risk! Passwords, financial documents, even those "about last night" e-mails are fair game for the IT professionals, computer technicians or hackers. CHAOS Shredder allows you to purge, wipe and erase data with methods that far exceed US Department of Defense standards for file deletion (DOD 5220.22).
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 287 KB
|
|
- |
|
CryptoText License: Freeware
|
|
|
CryptoText is a COM encryption component written in ATL3.0 for Windows 9x, NT4.0 and Windows 2000/XP. It provides simple access to the CryptoAPI in Windows from Visual Basic, Visual C++ and scripting languages (eg ASP). As well as being a standalone product CryptoText can be used with CryptoTextCE for the PocketPC / Windows CE platform to exchange encrypted data with handheld devices. CryptoText encrypts the input text data, and converts the resulting binary encrypted form to a series of ASCII characters which are suitable for use in a SQL statement, or for storage in a text/.ini file. For example the text 'My Password' might become the text string '79978e13df1019826c16944fe1'. This type of conversion is necessary because certain characters are reserved and have special meanings in an SQL statement, and by default the Windows CryptoAPI functions will take binary input data (your text) and map each of the characters to a binary number in the range 0 - 255. The simplest solution, although somewhat wasteful of space, is to convert the binary number into a string representation of the equivalent hex number, guaranteeing that only the characters 0-9 and a-f will be present.
Author: | Date: 31-10-2003 | Size: 46 KB
|
|
- |
|
cryptlib License: Freeware
|
|
|
Cryptlib by Peter Gutmann is a security toolkit that allows even less experienced programmers to add strong encryption and authentication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various hashed message authentication code algorithms: · HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally, asymmetric (public/private key) encryption algorithms such as the following are available: · Diffie-Hellman, DSA, RSA cryptlib can also be used with a variety of crypto devices (for example, Fortezza cards and Smart cards). The library is free if used in personal, freeware, or shareware projects. The library is written in C. ActiveX and C++ wrappers are provided. The project is OSI Certified Open Source Software.
Author: ComponentSpot| Date: 10-03-2004 | Size: 1347 KB
|
|
- |
|
CryptoTextCE License: Freeware
|
|
|
CryptoTextCE is an ActiveX / COM component written in ATLCE for the PocketPC. It provides simple access to the CryptoAPI in Windows CE from embedded Visual Basic and embedded Visual C++. CryptoTextCE is a companion product to CryptoText for the desktop, and data encrypted on the PocketPC using CryptoTextCE can be decrypted on Windows NT/9x using CryptoText and vice versa. If you are collecting sensitive data on a PocketPC device and transferring it to a destop PC or server using SQL Server CE or some other form of file based synchronisation, you can use CryptoTextCE to encrypt the data before transfer and CryptoText to decrypt it again on the server. As with CryptoText, CryptoTextCE encrypts the input text data and converts the resulting binary data to a series of characters which are suitable for use in a SQL statement, or for storage in a text/.ini file. The additional step performed by CryptoTextCE is the optional conversion from a UNICODE string to an ANSI string before encryption. This addresses the issue that all strings in eVB for the PocketPC are held as two byte UNICODE characters internally. If you are not making used of the extended character sets available with UNICODE the conversion to ANSI reduces the size of the encrypted data, and increases compatability with desktop Windows operating systems.
Author: | Date: 31-10-2003 | Size: 280 KB
|
|
- |
|
Zilla Data Nuker License: Freeware
|
|
|
When you delete a file from Windows it just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! This powerful program helps you shred important files & folders so that they cannot be restored & prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software. Shredder allows you to purge, wipe & erase data with methods that far exceed US Department of Defence standards for file deletion (DOD 5220.22). Easily automate the cleaning process with batch files, shortcuts and scheduler. Completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Overwrites all bits in selected files, including cluster slack space, with binary 1's, 0's, and/or random bit patterns. Supports complete folder deletions including subfolders. Shreds disk free space so you can even use shredder to destroy previously deleted files on your hard drive. Drag & Drop files or entire folders Delete even if the file is locked! No trails are left of any compromising or confidential information. Easily choose the number of overwrites according to your security ambitions. The higher the number the less the probability that even finest magnetic tracks could be detected. The Department of Defense (DOD 5220.22-M) recommends seven passes for top security. You can also shred files by right-clicking on them from the MS Windows Explorer or on the recycle bin and selecting the shred item on the popup context menu.
Author: ZillaSoft.ws| Date: 28-04-2004 | Size: 4214 KB
|
|
- |
| 1 |
|
|
Universal Explorer
Powerful windows explorer file manager and viewer.

Disk Size Manager Analyses hard disk space and collects statistics.

Web Data Extractor Email marketing software to extract specific contact.
 BackStreet Browser Powerful Offline Browser - Download Entire Website.
ListMotor Email List Manager, operates with email stored in simple text files or csv files.

|