Crypto Zoology


Advertisement

VH Crypto API for Java  v.1.0

Being that Sun's Java Cryptography Extension (JCE) is not well-documented and has a steep learning curve, the vH Crypto API for Java is being created to abstract the procedures which are commonly used in cryptography.

Crypto  v.4.3

Crypto! is a Windows version of the popular cryptogram puzzles often found in puzzle books and the Sunday paper. Crypto! selects a quote or phrase from its library of 50, encrypts it, and presents it for you to solve. Solving cryptograms with Crypto! ...





Advertisement

Crypto!

Cryptogram puzzle game for Windows. The computer makes it easy to erase mistakes. Letter frequencies are provided to make solving more fun. Hints help you if you get stuck. Solve puzzles from books or magazines, create your own puzzles, and print puzzles.

Folder Crypto Password  v.3 1

With Folder Crypto Password, you select a folder or folders to be protected, choose one of ten encryption algorithms, enter a password, and press one button. That's it. Now, no one can access, rename, or copy the data that you protected. More importantly, ...

Crypto Password Protect Folder  v.3.1.1

With Crypto Password Protect Folder, you select a folder or folders to be protected, enter a password, and press one button. That's it. Now, no one can access, rename, or copy the data that you protected. More importantly, protection works in all applications, ...

Quick Crypto  v.3 1

QuickCrypto file encryption prevents anyone using a file, seeing what it contains or even understanding what type of file it is (filenames can be changed when encrypting, but the original filename can be restored on decryption if required).

...

TEXT-CRYPTO  v.1.0.0.0

ESAY ENCRYPT-DECRYPT

This is the best tool which can be used to encrypt and decrypt the text messages.
With this app you can securely communicate your secrets.
>Type
>Provide password
>Encrypt
>Send via sms/e-mail/copy n ...

Crypto Helper  v.1.0

CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm ...

Lavernock Enterprises Password  v.1.1.0.0

Lavernock Enterprises Password Generator is a utility that generates strong passwords by using the Crypto Service Provider to generate a cryptograhically strong sequence of random characters.
It's a tool with a very easy to use and friendly interface ...

OneNote Password

OneNote password protection is based on strong crypto algorithms, so password recovery is a complex task. OneNote Password uses various recovery methods: Plain Dictionary and Hybrid Dictionary attacks, Brute-Force attacks, and Smart-Force (TM) attacks ...

WodCrypt  v.2.1.3

It provides supports for most common crypto algorithms, such as:AES, DES, TripleDES, Blowfish, Cast, RC2, RC, RC5, etc...

Feature:
* ActiveX for strong encryption, decryption and digital signatures.
* Supported ciphers AES, ...

File Own Guard

The File Own Guard is designed for a strong file encryption by the range of crypto-algorithms with an adjustable compression, secure file removal (shredding) using one of the eight special algorithm. The FOG has many other useful security features, which ...

Iron Key  v.2.0

No crypto software needs to be installed on the receiving side. Supports Windows drag-and-drop; integrated file shredder included.

Delete Files  v.11.04.01

Crypto algorithms like Depending on the sensitive nature of data, algorithms such as US Army AR380-19 (3 passes), Peter Gutmann (35 Passes), DoD 5220 + Peter Gutmann, and German VSITR (7 Passes) are used for this purpose. Kernel File Shredder removes ...

JCrypTool  v.1.0.0 RC5a

Eclipse based Crypto Toolkit. JCrypTool is an extendable e-learning platform presenting cryptography and cryptanalysis in a modern and easy to use fashion. JCrypTool is built as platform-independent open-source program and is based on Java and the Eclipse ...

Pages : < 1 | 2
Newest Reviews