Substitution Crypto


Advertisement

Crypto  v.4.3

Crypto! is a Windows version of the popular cryptogram puzzles often found in puzzle books and the Sunday paper. Crypto! selects a quote or phrase from its library of 50, encrypts it, and presents it for you to solve. Solving cryptograms with Crypto! ...

Crypto!

Cryptogram puzzle game for Windows. The computer makes it easy to erase mistakes. Letter frequencies are provided to make solving more fun. Hints help you if you get stuck. Solve puzzles from books or magazines, create your own puzzles, and print puzzles.





Advertisement

Folder Crypto Password  v.3 1

With Folder Crypto Password, you select a folder or folders to be protected, choose one of ten encryption algorithms, enter a password, and press one button. That's it. Now, no one can access, rename, or copy the data that you protected. More importantly, ...

Crypto Password Protect Folder  v.3.1.1

With Crypto Password Protect Folder, you select a folder or folders to be protected, enter a password, and press one button. That's it. Now, no one can access, rename, or copy the data that you protected. More importantly, protection works in all applications, ...

Quick Crypto  v.3 1

QuickCrypto file encryption prevents anyone using a file, seeing what it contains or even understanding what type of file it is (filenames can be changed when encrypting, but the original filename can be restored on decryption if required).

...

TEXT-CRYPTO  v.1.0.0.0

ESAY ENCRYPT-DECRYPT

This is the best tool which can be used to encrypt and decrypt the text messages.
With this app you can securely communicate your secrets.
>Type
>Provide password
>Encrypt
>Send via sms/e-mail/copy n ...

Crypto Helper  v.1.0

CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm ...

Lavernock Enterprises Password  v.1.1.0.0

Lavernock Enterprises Password Generator is a utility that generates strong passwords by using the Crypto Service Provider to generate a cryptograhically strong sequence of random characters.
It's a tool with a very easy to use and friendly interface ...

OneNote Password

OneNote password protection is based on strong crypto algorithms, so password recovery is a complex task. OneNote Password uses various recovery methods: Plain Dictionary and Hybrid Dictionary attacks, Brute-Force attacks, and Smart-Force (TM) attacks ...

Desktop Tray Clock

Desktop Tray Clock - designed as a more informative substitution for a standard tray clock on windows desktop using different skins, over 100 skins are included in the distribution for desktop clock.

Desktop Tray Clock also is a software alarm ...

WodCrypt  v.2.1.3

It provides supports for most common crypto algorithms, such as:AES, DES, TripleDES, Blowfish, Cast, RC2, RC, RC5, etc...

Feature:
* ActiveX for strong encryption, decryption and digital signatures.
* Supported ciphers AES, ...

Audio Control  v.4.238

Audio Control is an audio mixer software utility for visualization and control of the computer audio volume, and is an improved substitution for the standard Windows Volume control. Audio Control inspects the host system for audio devices and displays ...

10Tec iGrid.NET

NET either as a list view substitution or as a full-featured grid control. With iGrid.NET you can format each cell independently as well as the whole column at once, create a message preview like in MS Outlook, build tree-like interfaces, freeze rows ...

Active Alarm Clock

Designed as a more informative substitution for a standard tray clock in Windows. Not only does it display time in the hour-and-minute fashion, the clock also displays date, system uptime, time for any time zone, current weather conditions, forecasts ...

File Own Guard

The File Own Guard is designed for a strong file encryption by the range of crypto-algorithms with an adjustable compression, secure file removal (shredding) using one of the eight special algorithm. The FOG has many other useful security features, which ...

Pages : < 1 | 2
Newest Reviews