Blowfish Algorithm With Diagram


Advertisement

Private Notetaker

It automatically encrypts each file using the Blowfish algorithm and also allows you to protect files with individual passwords. No extra operations required. You save and open files as you do with standard text editors. On purchase they provide you ...

ScriptCryptor

VBScript or JScript files will be converted into EXE files, the source of your scripts will be encrypted with Blowfish algorithm. Once converted, they cannot be modified or viewed by other users.





Advertisement

Ddcrypt  v.2.0

The software is based in the Blowfish algorithm of 448 bits to proceed with the encryption. It works as an extension of the Windows Shell that could be accessed just with a right-click of the mouse over the folder or file.

This program has ...

Utalk Network Messenger  v.1.00


Message Encryption with Blowfish Algorithm.
Multicasting and Broadcasting Supported.
Multiple File Attachments Supported.
Attractive Interface and Easy to Use.
Reminder Utility Added.
Logs of The communication Supported.

Ashampoo Privacy Protector Plus  v.1.04

It supports 448-bit encryption with the Blowfish algorithm, and you can create self-decrypting archives with multiple files or entire directory trees.

EncryptMe

The program uses the AES algorithm with the 256-bit key length to encrypt data, which allows it to securely protect any information. The unique "Restore the forgotten password" option will help you avoid a critical information loss and the additional ...

A-Lock  v.7 40

A high level of protection is provided using the proven Blowfish algorithm. Only those with the correct password can read your messages. It also includes a lockable list file for names and passwords. It has automatic one-click encryption and decryption, ...

Registration Backup  v.24. 9. 2004

Your data will be very securely encrypted using the unbroken Blowfish algorithm, and access to your data will be password protected (with your password also encrypted using Blowfish). This program is very easy to use with a simple but effective interface.

Cipherlok  v.2 1

Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting ...

Lzip for Linux  v.1.3

Lzip is a lossless data compressor based on the LZMA algorithm, with very safe integrity checking and a user interface similar to the one of gzip or bzip2. Lzip decompresses almost as fast as gzip and compresses better than bzip2, which makes it well ...

Webm8  v.7.53.07

WebM8 data files are securely encrypted using the Blowfish algorithm with a 256 bit key.

DupExplorer

Smart comparison algorithm with a wide variety of options lets you decide how to find duplicates - by size, by date, content, names or a combination of these criteria. All types of storage media (HDD, floppy, CD/DVD, removable and network drives) are ...

FlashCam

Mpeg-4 video encoding algorithm with MP3 audio encoding technology gives perfect video transfer result. Client is based on Macromedia Flash it is fast loading, multiplatform and friendly with Mpeg-4 video. Our application not requires any 3rd party ...

Convert MySQL Database To MSSQL

Software helps to convert MySQL db into MSSQL database using an advance algorithm with support to all attributes like primary key, foreign key constraints, indexes etc. Automatic MySQL to MSSQL database converter software can work on both systematic mode ...

Alligator Data Guard

Alligator Data Guard is a tool for protecting your confidential information, using AES algorithm with 256-bit key and Haval 256-bit Hash Message Authentication Code (HMAC) to simultaneously verify the data integrity and the authenticity for better security.

Pages : 1 | 2 >
Newest Reviews