Crypto Bytes


Advertisement

Crypto.mod  v.1.3

Crypto.mod is a simple LOADABLE cryptographic module for tcl 8.3+ (possibly older, not tested). The module supports the blowfish, twofish and rijndael ciphers.

VH Crypto API for Java  v.1.0

Being that Sun's Java Cryptography Extension (JCE) is not well-documented and has a steep learning curve, the vH Crypto API for Java is being created to abstract the procedures which are commonly used in cryptography.





Advertisement

Crypto  v.4.3

Crypto! is a Windows version of the popular cryptogram puzzles often found in puzzle books and the Sunday paper. Crypto! selects a quote or phrase from its library of 50, encrypts it, and presents it for you to solve. Solving cryptograms with Crypto! ...

Crypto!

Cryptogram puzzle game for Windows. The computer makes it easy to erase mistakes. Letter frequencies are provided to make solving more fun. Hints help you if you get stuck. Solve puzzles from books or magazines, create your own puzzles, and print puzzles.

Folder Crypto Password  v.3 1

With Folder Crypto Password, you select a folder or folders to be protected, choose one of ten encryption algorithms, enter a password, and press one button. That's it. Now, no one can access, rename, or copy the data that you protected. More importantly, ...

Crypto Password Protect Folder  v.3.1.1

With Crypto Password Protect Folder, you select a folder or folders to be protected, enter a password, and press one button. That's it. Now, no one can access, rename, or copy the data that you protected. More importantly, protection works in all applications, ...

Quick Crypto  v.3 1

QuickCrypto file encryption prevents anyone using a file, seeing what it contains or even understanding what type of file it is (filenames can be changed when encrypting, but the original filename can be restored on decryption if required).

...

Sugar Bytes WOW  v.1 2

WOW's Modulation System is versatile but intuitive. The modulation signals can be mixed individually for each parameter - but they can just as well modulate each other! So for example, the LFO-rate can be modulated by the Envelope Follower, while the ...

TEXT-CRYPTO  v.1.0.0.0

ESAY ENCRYPT-DECRYPT

This is the best tool which can be used to encrypt and decrypt the text messages.
With this app you can securely communicate your secrets.
>Type
>Provide password
>Encrypt
>Send via sms/e-mail/copy n ...

Crypto Helper  v.1.0

CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm ...

Lavernock Enterprises Password  v.1.1.0.0

Lavernock Enterprises Password Generator is a utility that generates strong passwords by using the Crypto Service Provider to generate a cryptograhically strong sequence of random characters.
It's a tool with a very easy to use and friendly interface ...

Hexplorer  v.2.6

Hexplorer is a hexadecimal file editor that will offer many features: * 6 color schemes to interpret bytes visually. Every of them tries to fit some functionality (for example text analyzing) and user preferences * Unlimited undo * Access to logical ...

Convertitore Byte  v.1.0.0

Conversion between bytes and its multiples With this small software you can convert between byte and its multiples. There are five possible convertible measures: - Byte (B) - Kilobytes (KB) - Megabyte (MB) - Gigabyte (GB), - Terabyte (TB) This program ...

Check File Size Of Multiple Files Software  v.7.0

The filesize units that are available are bytes, kilobytes (KB), megabytes (MB), gigabytes (GB). The results can be saved to a text or Excel file or copied to the clipboard for pasting.

OneNote Password

OneNote password protection is based on strong crypto algorithms, so password recovery is a complex task. OneNote Password uses various recovery methods: Plain Dictionary and Hybrid Dictionary attacks, Brute-Force attacks, and Smart-Force (TM) attacks ...

Pages : < 1 | 2
Newest Reviews