Blowfish Algorithm With Diagram
Advertisement
ScriptCryptor
VBScript or JScript files will be converted into EXE files, the source of your scripts will be encrypted with Blowfish algorithm. Once converted, they cannot be modified or viewed by other users.
Advertisement
Ddcrypt v.2.0
The software is based in the Blowfish algorithm of 448 bits to proceed with the encryption. It works as an extension of the Windows Shell that could be accessed just with a right-click of the mouse over the folder or file.
This program has ...
Utalk Network Messenger v.1.00
Message Encryption with Blowfish Algorithm.
Multicasting and Broadcasting Supported.
Multiple File Attachments Supported.
Attractive Interface and Easy to Use.
Reminder Utility Added.
Logs of The communication Supported.
Ashampoo Privacy Protector Plus v.1.04
It supports 448-bit encryption with the Blowfish algorithm, and you can create self-decrypting archives with multiple files or entire directory trees.
EncryptMe
The program uses the AES algorithm with the 256-bit key length to encrypt data, which allows it to securely protect any information. The unique "Restore the forgotten password" option will help you avoid a critical information loss and the additional ...
A-Lock v.7 40
A high level of protection is provided using the proven Blowfish algorithm. Only those with the correct password can read your messages. It also includes a lockable list file for names and passwords. It has automatic one-click encryption and decryption, ...
Registration Backup v.24. 9. 2004
Your data will be very securely encrypted using the unbroken Blowfish algorithm, and access to your data will be password protected (with your password also encrypted using Blowfish). This program is very easy to use with a simple but effective interface.
Cipherlok v.2 1
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting ...
Lzip for Linux v.1.3
Lzip is a lossless data compressor based on the LZMA algorithm, with very safe integrity checking and a user interface similar to the one of gzip or bzip2. Lzip decompresses almost as fast as gzip and compresses better than bzip2, which makes it well ...
Webm8 v.7.53.07
WebM8 data files are securely encrypted using the Blowfish algorithm with a 256 bit key.
DupExplorer
Smart comparison algorithm with a wide variety of options lets you decide how to find duplicates - by size, by date, content, names or a combination of these criteria. All types of storage media (HDD, floppy, CD/DVD, removable and network drives) are ...
FlashCam
Mpeg-4 video encoding algorithm with MP3 audio encoding technology gives perfect video transfer result. Client is based on Macromedia Flash it is fast loading, multiplatform and friendly with Mpeg-4 video. Our application not requires any 3rd party ...
Convert MySQL Database To MSSQL
Software helps to convert MySQL db into MSSQL database using an advance algorithm with support to all attributes like primary key, foreign key constraints, indexes etc. Automatic MySQL to MSSQL database converter software can work on both systematic mode ...
Alligator Data Guard
Alligator Data Guard is a tool for protecting your confidential information, using AES algorithm with 256-bit key and Haval 256-bit Hash Message Authentication Code (HMAC) to simultaneously verify the data integrity and the authenticity for better security.