Cryptographic Hsbc


Advertisement

CrypTool  v.1. 4. 1930

CrypTool is an open-source e-learning application, used in the implementation and analysis of cryptographic algorithms. It supports both contemporary teaching methods at schools and universities as well as awareness training for employees and civil servants.

Febooti fileTweak Hash and CRC  v.3.0

With Febooti fileTweak Hash & CRC it is possible to compute most popular file hash checksums (such as MD5, CRC32, SHA-1 and other) in order to verify file integrity (if cryptographic hash value is provided) or to supplement file with checksum, thus creating ...





Advertisement

True Random Password Generator  v.1.0

Some of them use standard pseudorandom number generators which are unsuitable for cryptographic purposes. Such generators create weak passwords and must never be used! LastBit Password Generator is a cryptographic random generator, so all generated passwords ...

DevSolutions Crypt  v.1.0.1

DevSolutionsCrypt library is a powerful and easy to use cryptographic ActiveX and DLL component for Windows developers that allows applications to encrypt/decrypt data or files using the latest industry standard strong encryption algorithms.It can be ...

TrayBarNotebook with EMail monitor  v.2 3

Notice new mail, save notes and passwords.
EMail monitor with wave and visual notification.
Operative notebook.
Cryptographic password saver.
The small size ~110KB.
Allows to keep operatively the text on ten pages.
The icon of ...

VoiceCipher  v.1 1

Use your voice as cryptographic key! VoiceCipher is file encryption software using strong cryptographic key created from your voice. No need to remember long keys - just say short phrase.

SimpleAuthority  v.2 3

It generates and manages keys and certificates that provide cryptographic digital identities for people and/or computer servers. These identities are designed to be used in applications for secure email, document signing, VPN access, client SSL authentication ...

USA Shield  v.2 15

It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network ...

OpenSSL Hasher  v.1.0.0

Create cryptographic hash value with this tool. OpenSSL Hasher is an easy-to-use software developed for .NET that uses the "OpenSSL .NET" managed wrapper for OpenSSL that will enable you to generate the cryptographic hash value for a string or any file ...

Cobynsofts Hash Calculator  v.1.1

Used to detect file tampering and duplication Cobynsoft's Hash Calculator is a freeware utility for calculating MD5 and SHA-1 cryptographic hash values for single files or for multiple files by selecting entire folders. The tool will output the file(s) ...

EasyMD5Calculator  v.1.0.0.1

MD5 is a popular cryptographic hash function with a 128-bit hash value. MD5 hashes are typically represented as a sequence of 32 hexadecimal digits. This software will enable you to instantly view the MD% hashes of any file.

MD5Test  v.1.0

MD5Test is an implementation of the MD5 cryptographic hashing algorithm for Silverlight.MD5 is generally considered insecure for use in cryptographic operations. If possible, you should be using a more modern algorithm for your software, such as SHA2 ...

Vigenere Cipher  v.1.0

The Vigenere cipher is an old cryptographic system, which offers very little security, but is interesting to analyse. This software allows you to encrypt and decrypt messages and files using the original form of the cipher, which only handles capital ...

ABI- SecurePro  v.1.0.1.9

This encryption software includes features like a cryptographic library, a command-line interface, delayed and automated encryption, self-decrypting files, advanced logging, and password protection. Specify the time and date for the encryption to begin ...

Cryptola  v.1.1

Cryptola uses cryptographic technology designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard.

Pages : < 1 | 2
Newest Reviews