|
|
Cryptography
|
CrypTalk License: Freeware
|
|
|
CrypTalk is a full-featured chat client based on strong public key cryptography. CrypTalk messages can include embedded pictures, data files, etc. Other features include: automatic or manual network computer detection, user groups, blacklists, auto responder, and message templates. Socks 4, 4a, 5 are supported.
Author: Reymax Software| Date: 16-02-2002 | Size: 700 KB
|
|
- |
|
HispreadVIEW License: Freeware
|
|
|
Hispread is a new Peer-2-Peer technology that provides the casual and professionnal computer user a simple way to backup any kind of data without the hassle of a full fledged backup and retrieval software linked to some expensive specific harware. Hispread uses the power behind any LAN or Internet to securely "spread" your data among different machines, insuring both their confidentiality (no one, except you, can access the data) and their retrieval in any circumstance (such as the failure of one or more machines, one or more disk on any machines, and so on). With this technique, you don't need to buy any kind of expensive equipment, you only optimize the one you already have. Harness the power of your LAN to backup your file in the most secure and easy manner, using cryptography, virtual RAID and GridStorage through innovative P2P technology.
Author: Hispread Technologies| Date: 09-08-2004 | Size: 1171 KB
|
|
- |
|
Windows 2000 Protected Store Key License: Freeware
|
|
|
A Protected Store is provided as part of CryptoAPI, in order to provide secure storage for sensitive information such as private keys and certificates. By design, the Protected Store should always encrypt the information using the strongest cryptography available on the machine. However, the Windows 2000 implementation uses 40-bit key to encrypt the Protected Store, even if stronger cryptography is installed on the machine. This vulnerability weakens the protection on the Protected Store, but does not eliminate it. An attacker would need to gain complete administrative ontrol over the machine that houses the Protected Store in order to gain access to it, and even then would still need to mount a brute-force cryptographic attack against it. However, customers who follow the recommended remediation for this vulnerability can ensure that such an attack would be significantly more difficult, if not impossible.
Author: Microsoft| Date: 31-07-2000 | Size: 282 KB
|
|
- |
|
P2P Messenger .NET License: Freeware
|
|
|
P2P Messenger is secure Instant Messaging client, working by Peer-to-Peer technology. It is fully decentralized and does not require any servers. Supports public-key cryptography
Author: Sergey| Date: 7-10-2002 | Size: 400 KB
|
|
- |
|
PHTML Encoder License: Freeware
|
|
|
The PHTML Encoder allows encoding PHP scripts before distributing them. The script code is encrypted before saving. Because PHTML Encoder is a cross-platform product, this software working on ALL computer and server platforms which support PHP. The PHTML Encoder includes console and GUI versions of conver. You can use wildcards to easily convert the whole projects.The PHTML Encoder is transparent to your visitors. It is possible to combine protected and unprotected scripts on one web site. PHTML Encoder has following features in comparison analogous software products: 1. PHTML Encoder uses cryptography for protection of PHP scripts. 2. You can get the completed source code of PHTML Encoder. This allows you to customize PHTML Encoder to meet your needs: you can change password, prefix, add own cryptography method, and so on. 3. Because PHTML Encoder is cross-platform product, this software working on ALL computer and web-server platforms, which support PHP. The encoded scripts from one computer platform will work on any other platform. 4. There are three ways of usage encoded scripts: substitution of existent PHP engine's library file, installation as PHP extension and self-decodeable scripts. In last case you don't need any changes in PHP installations.
Author: RS Software Lab| Date: 11-11-2004 | Size: 1683 KB
|
|
- |
|
OpenSSL License: Freeware
|
|
|
By using the Open SSL 0.9.7c library, developers can write applications that take advantage of Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1). The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself. Security features such as the following can be implemented: · Data integrity: An application can detect if data has been modified during transmission. · Authenticity: An application can verify the identity of the sender using certificates. · Privacy: An application can ensure that no intermediary between the sender and the recipient can understand the data. Transport Layer Security is an extension of SSL. It is now overseen by an international standards organization. It provides the same capabilities as SSL (data integrity, authenticity, and privacy between client and server), but takes advantage of newer, more advanced cryptographic technology. It is backwards compatible with SSL. The cryptographic library includes a multitude of encryption algorithms. The symmetric, or private key, encryption algorithms offered include Rijndael (now officially the Advanced Encryption Standard, or AES, algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital signature schemes to digitally sign documents. The Open SSL library uses some but not all of these algorithms. To compile for the Win32 platform, Perl or compiling under Cygwin is required. Some of the encryption routines/algorithms are covered by patents.
Author: ComponentSpot| Date: 30-09-2003 | Size: 2879 KB
|
|
- |
|
HashTab License: Freeware
|
|
|
A windows shell extension which installs a new tab with file hash information. Includes MD5, SHA1 and CRC032. Also allows for easy hash comparison. Great for verifying downloads without requiring any external tools.
Author: Beeblebrox.org| Date: 03-03-2004 | Size: 132 KB
|
|
- |
|
BladeBox Iron Edition License: Freeware
|
|
|
BladeBox creates virtual encrypted volumes, which are AES-ENCRYPTED files which can be mounted as if they were disk drives (with a DOS drive letter too). Virtual Encrypted Volumes (VEV) are seen and considered by the operating system as if they were actual volumes (drives), they have a drive letter, a volume name, and you can see them inside your My Computer resources and inside the Windows Explorer.BUT actually they are transparently encrypted files on disk. Every time you write or read data to those volumes, the data buffer is transparently encrypted/decrypted on-the-fly. The key concept for security is that data on disk ALWAYS remain encrypted. BladeBox gives System Administrators full control over network deployment of Virtual Encrypted Volumes by providing support for an administrative master password. Volumes can be automatically unmounted after XX (user-defined) minutes of inactivity or they can be quickly and silently unmounted by pressing the proper hot-key (special combination of keys).
Author: Liveye, SDC| Date: 27-09-2004 | Size: 2256 KB
|
|
- |
|
EDXOR License: Freeware
|
|
|
EDXOR is a versatile, convenient and optimal text editor and file processor that far surpasses the capabilities of other Notepad-like applications. It offers innovative clipboard handling, cryptographic options and logic text conversions, great for education, fun, or privacy. EDXOR is small, self-contained, dependency-free and very fast. It provides over 90 menu items, including many unique functions and options, for diverse applications.
Author: Dariusz Stanislawek| Date: 01-01-2004 | Size: 35 KB
|
|
- |
|
DLOCK2 License: Freeware
|
|
|
DLOCK2 is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2, except recompiled for the Win32 command line (for long filename support) and author contact information has been updated. The encryption key may be a passphrase on the command line or it may be contained in a file. You may use the included encryption/decryption source code in your own products at no charge. This software is free, however you may send the author donations to express appreciation if you like.
Author: Michael Paul Johnson| Date: 28-01-2004 | Size: 573 KB
|
|
- |
|
Kinar KeepSafe FreeMail License: Freeware
|
|
|
Kinar KeepSafe is the easiest to use secure email solution available today.Based on patent pending Universal Digital ID (TM) technology, FreeMail provides the enterprise level security without any prior setup, use of passwords, or manual key/certificate exchange. Simply download, install and activate your existing email account as a secure e-mail account. Then you'll be ready to send encrypted e-mail and attachments to anyone with an email address. It's that simple. It is the only secure email solution that allows you to use public-private key cryptography with anyone, beyond the boundaries of an organization. KeepSafe works as a standalone email application or with popular e-mail applications. Also, it is deeply integrated with Microsoft Outlook and Outlook Express. FreeMail allows an unlimited number of encrypted messages to up to ten other users. Also check out KeepSafe Professional. It allows you to send restricted documents - documents that cannot be shared or forwarded by the recipient with other users. Now you can ensure that your pictures or documents do not end up in the wrong hands or all over the Internet. Kinar KeepSafe does NOT install any spyware or adware. Your emails go through your email gateways; NOT through any Kinar servers. Kinar does not collect any private information about you. Get the power of Universal Digital ID working for you.
Author: Kinar, Inc.| Date: 04-08-2004 | Size: 4749 KB
|
|
- |
|
Zilla Data Nuker License: Freeware
|
|
|
When you delete a file from Windows it just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! This powerful program helps you shred important files & folders so that they cannot be restored & prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software. Shredder allows you to purge, wipe & erase data with methods that far exceed US Department of Defence standards for file deletion (DOD 5220.22). Easily automate the cleaning process with batch files, shortcuts and scheduler. Completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Overwrites all bits in selected files, including cluster slack space, with binary 1's, 0's, and/or random bit patterns. Supports complete folder deletions including subfolders. Shreds disk free space so you can even use shredder to destroy previously deleted files on your hard drive. Drag & Drop files or entire folders Delete even if the file is locked! No trails are left of any compromising or confidential information. Easily choose the number of overwrites according to your security ambitions. The higher the number the less the probability that even finest magnetic tracks could be detected. The Department of Defense (DOD 5220.22-M) recommends seven passes for top security. You can also shred files by right-clicking on them from the MS Windows Explorer or on the recycle bin and selecting the shred item on the popup context menu.
Author: ZillaSoft.ws| Date: 28-04-2004 | Size: 4214 KB
|
|
- |
| 1 |
|
|
Universal Explorer
Powerful windows explorer file manager and viewer.

Disk Size Manager Analyses hard disk space and collects statistics.

Web Data Extractor Email marketing software to extract specific contact.
 BackStreet Browser Powerful Offline Browser - Download Entire Website.
ListMotor Email List Manager, operates with email stored in simple text files or csv files.

|