Substitution Crypto


Advertisement

Crypto Obfuscator For .Net  v.2013 R2

Crypto Obfuscator For .Net provides superior code protection, obfuscation, optimization and automatic exception reporting for your .Net assemblies. Crypto Obfuscator combines powerful obfuscation, encryption and optimization techniques to provide the ...

Crypto Wallet  v.3.0.0

Crypto Wallet for Windows Mobile is a powerful and easy to use assistant for secure and convenient data managing. Keep your mind free from countless numbers and letters.
Crypto Wallet will get you organized and let you quickly find your important ...





Advertisement

ASL Crypto Manager

The ASL Crypto Manager program is intended for fast encrypting of any users files. For this purpose, RC4, a high-speed on-the-fly algorithm of encrypting, is used in the program. The program allows to encrypt any taken file and to pass it safely to the ...

Crypto++ SDK 2007

WARNING: Don't Buy Any Software Protection Product Until You Have Tried For FREE The New Award Winning, Quick, Easy, and Affordable,"Crypto++ SDK 2007" Professional Software Protection System - Risk-Free!

Crypto Logger For .Net  v.2010

Crypto Logger For .Net is a flexible and high-performance logging framework for your .Net software. Crypto Logger comes with a powerful yet easy-to-use logging console to view, search, analyze and manage log data and perform remote-logging and live-logging.

Crypto Anywhere  v.3.0

Crypto Anywhere is secure email on the move ! Crypto Anywhere is small enough to fit on a single floppy or USB key chain drive and so easy to use your grandma will be using it.
With Crypto Anywhere you can send and receive secure mail to and from ...

Crypto Chat 4 Skype - A simple Crypto  v.2.0.1

Just install it, select the contact you want to have secure chats with, generate a unique key and send it to your Crypto/Skype counterpart using Crypto's convenient Web sever stream mechanism. Once two Crypto users have succesfully exchanged encryption ...

Atmel Crypto Evaluation Studio  v.1.0.3

The ACES (Atmel Crypto Evaluation Studio) package is a suite of software tools to configure and demonstrate the Atmel ATSHA204 device using the Atmel AT88CK101STK8, the Atmel AT88CK109STK8, the Atmel AT88CK454BLACK, and the Security Xplained kits.
...

Crypto Anywhere - OpenPGP Edition  v.2.0

Crypto Anywhere allows you to make a travel floppy which can be used in internet cafe's or at work. You don't even need to install the software - just run it from the floppy disk or USB thumb drive. Encrypted messages can be sent to friends who don't ...

Touch Crypto for s60 E3  v.1 80

80! Touch Crypto is the best encryption tools to protect your private files - photos, multimedias, audios, videos, songs, voice - all confidential documents on your mobile! It uses 128bits AES algorithm to encrypt your files. Without password, no one ...

Touch Crypto for S60 E5/Symbian^3  v.1 80

80! Touch Crypto is the best encryption tools designed specially for touch screen mobile. It uses 128bits AES algorithm to encrypt your private files - photos, multimedias, audios, videos, songs, voice - all confidential documents on your mobile! It is ...

Crypto 2000  v.4 4

Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can ...

Crypto Manager  v.0.2.0

Crypto Manager is a software for encrypt/decrypt files or text inside clipboard with a password or a certificate located either in certificate storage (certmgr.msc) or in a .cer file.Crypto Manager Features:
1. Crypt files with password
2. Crypt ...

Crypto.mod  v.1.3

Crypto.mod is a simple LOADABLE cryptographic module for tcl 8.3+ (possibly older, not tested). The module supports the blowfish, twofish and rijndael ciphers.

VH Crypto API for Java  v.1.0

Being that Sun's Java Cryptography Extension (JCE) is not well-documented and has a steep learning curve, the vH Crypto API for Java is being created to abstract the procedures which are commonly used in cryptography.

Pages : 1 | 2 >
Newest Reviews