Cryptography Decrypted


Advertisement

Reach-a-Mail Password Recovery  v.1.1.100.2009


Reach-a-Mail Password Recovery features:
Recover all types of Reach-a-Mail stored e-mail passwords: POP3, SMTP;
Friendly interface;
Install/uninstall support

An unregistered version of Reach-a-Mail Password Recovery shows only first 2 characters of the decrypted passwords.
...

The Bat! Password Recovery  v.1.0


Null Logics TheBat! Password Recovery features:
Recover all types of The Bat! stored e-mail passwords: POP3, SMTP, IMAP;
Friendly interface;
Install/uninstall support

An unregistered version of Null Logics TheBat! Password Recovery shows only first 2 characters of the decrypted passwords.
...





Advertisement

MyDataSafe  v.5 10

MyDataSafe are using steganography and cryptography to securely store your data.
Use MyDataSafe to store any kind of data like in a safe.
Do only decrypt your passwords, pin numbers or files for short time, to edit or transfer them to other ...

Cryptosystem ME6  v.9.89



You can select a single file to be encrypted (or decrypted) by means of the usual Windows file selection dialog box. Multiple files can be selected by using wildcards, e.g., *.txt to encrypt all files with txt suffix. You also specify whether ...

Parallel Password Recovery (PDF  v.1.6.0.1

PDF documents can be password protected for opening, using 40, 128 or 256-bit cryptography. 40-bit keys can be broken with guarantee, regardless of password used. To recover PDF open password if 128 or 256-bit keys are used, Parallel Password Recovery ...

SecureFile  v.2.0

It creates a self-decryption archive which can be decrypted at the other end without any dependencies.

It incorporates powerful Blowfish algorithm and certificate ( public key/ private key ) for the process of encryption and decryption.It ...

CryptoSys PKI Toolkit  v.3 6

The CryptoSys PKI Toolkit provides you with an interface to public key cryptography functions from Visual Basic, VB6, VBA, VB.NET, VB2005/8/x, C/C and C# programs on any Windows system (W95/98/Me/NT4/2K/XP/2003/Vista/2008/W7).

You can create ...

DevSolutions SecureFile  v.3 1



DevSolutions SecureFile incorporates public key cryptography in which two complementary keys-a key pair-are used to maintain secure communications.

It compresses and encrypts selected files and produces a self-decryption archive. The ...

Komodia free SSL sniffer  v.1.0

0 and WinINET applications that allows you to sniff all traffic and see decrypted SSL traffic without using a proxy or alerting the browser. The sniffer is using Komodia's "SSL hijacker" which is an SDK for sniffing, intercepting and modiying SSL based ...

USA Shield  v.2 15

Later, the information can be decrypted into its original form. USA Shield integrates the strongest cryptography available today into the Windows environment.

Smash!  v.2.0

Smash! is a fast, powerful, user friendly encryption and decryption utility, complete with Government level file wiping, and Government approved cryptography. When it comes to keeping your files secure, safe, and out of unwanted hands, Smash! is the answer ...

TSR LAN Messenger  v.1.5.2.351

NET technology and supports modern cryptography standards. If you are having a LAN party or just need a modern messaging client for you office, TSR LAN Messenger is the right answer. Built on Windows .NET Technology, it uses AES cryptography to ensure ...

My Text is Treasure  v.1.0.0.42993

A simple, easy-to-use password manager designed to work like a text editor and uses a powerful cryptography algorithm to generate the end file.
My Text is Treasure Features:
1. It is a password manager
2. It works like a simple text editor
3.

JCrypTool  v.1.0.0 RC5a

JCrypTool is an extendable e-learning platform presenting cryptography and cryptanalysis in a modern and easy to use fashion. JCrypTool is built as platform-independent open-source program and is based on Java and the Eclipse Rich Client Platform.JCrypTool ...

SimpLite For MSN Messenger  v.2.5.2

Encrypt conversations using state-of-the-art cryptography.
3. Easy installation and use
4. Minimal user interaction, totally transparent encryption.
5. Full compatibility with SimpProIf your contacts are using SimpPro, you can also benefit ...

Pages : < 1 | 2
Newest Reviews