QuranCode 6.1.9 B769 Ali Adams     update

... numbers are used as keys in public key cryptography to exchange secret messages. The first chapter of the Quran named Al-Fatiha meaning The Opener not The Opening (as many think) is built on prime number to show that it is the key to unlocking The Message of the Quran .... Free download of QuranCode 6.1.9 B769

Gpg4win 3.1.5 Gpg4win project     update

... handbooks for email and file encryption. Both relevant cryptography standards are supported, OpenPGP and S/MIME. Gpg4win and the software included with Gpg4win are Free Software (among other things free of charge for all commercial and non-commercial purposes). You can choose all or some of the following modules during installation: .... Free download of Gpg4win 3.1.5

software pick   

SiSoftware Sandra Lite 2018.8.28.28 SiSoftware     update

... Sandra's General Processing (GP) benchmarks (GP Arithmetic, GP Cryptography, GP Memory) harness the full power of OpenCL and run simultaneously on both the CPU and GPU units of an APU, thus using all the processing power available. The GP benchmarks allocate workload based on the respective processing power of .... Free download of SiSoftware Sandra Lite 2018.8.28.28

software pick   

Small Utilities 7.4.1.3 Softspecialists     update

The Suite is a collection of all below listed sixty-nine Softspecialists Utilities. You can choose whether to download all the utilities together by the following link or pick them individually from the list below. Each application is fully portable, thus you can download the .ZIP file, decompress it and use the .... Free download of Small Utilities 7.4.1.3

wolfSSL 3.15.3 wolfSSL     update

The wolfSSL embedded SSL/TLS library is a lightweight SSL library written in ANSI standard C and targeted for embedded and RTOS environments - primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments as well because of its royalty free pricing and cross .... Free download of wolfSSL 3.15.3

OpenPuff Steganography and Watermarking 4.01 EmbeddedSW     new

... resistance Unique layers of security - 256bit+256bit symmetric-key cryptography with KDF4 password extension - 256bit symmetric key data scrambling (CSPRNG-based shuffling) - Data whitening (CSPRNG-based noise mixing) - Adaptive non-linear carrier bit encoding OpenPuff supports many carrier formats - Images (BMP, JPG, PCX, PNG, TGA) - Audio support (AIFF, MP3, .... Free download of OpenPuff Steganography and Watermarking 4.01

NCP Secure Entry Client for macOS 3.10_r40218 NCP engineering GmbH     update

... tokens or certificates, also with ECC (elliptic curve cryptography). To prevent unauthorized third parties from establishing a VPN connection, optional biometric authentication has been integrated in the NCP Secure Client prior to VPN connection. Easy import of vpn configuration files from different vendors (e.g. PCF files) is possible. The embedded .... Free download of NCP Secure Entry Client for macOS 3.10_r40218

NextGen Widget Encrypt 1.1.3.5 NEXTGEN WIDGET SOFTWARE     update

... use OpenPGP Encryption program with a focus on cryptography and data security. It's full with features that makes this encryption software easy to use and fun. At one time, everyone thought that Encryption was strictly for business use only. In today's society, encryption is for everyone because identity theft, stolen .... Free download of NextGen Widget Encrypt 1.1.3.5

Obsidium Lite 1.6.5-7 Obsidium Software     update

... * Integrated licensing systems using strong public key cryptography Obsidium offers two built-in licensing systems that take ... short license keys (using RSA and elliptic curve cryptography, respectively) which can be distributed to your customers in binary or textual form. Both types of license keys support fixed expiration dates, hardware locking .... Free download of Obsidium Lite 1.6.5-7

Obsidium 1.6.5-8 Obsidium Software     update

... * Integrated licensing systems using strong public key cryptography Obsidium offers two built-in licensing systems that take ... short license keys (using RSA and elliptic curve cryptography, respectively) which can be distributed to your customers in binary or textual form. Both types of license keys support fixed expiration dates, hardware locking .... Free download of Obsidium 1.6.5-8

Steg Easy cross platform steganography 1.0.0.2 Steg Easy cross platform steganography     new

... software, written in C++. It use steganography and cryptography techniques to hide information inside uncompressed and compressed ... image's artifacts and uses both symmetric-key and asymmetric-key cryptography. Arbitrary data can be hidden as compressed archive file and it's also possible to add a text comment. I wrote Steg in my spare .... Free download of Steg Easy cross platform steganography 1.0.0.2

Steg 1.0.0.2 Steg     new

For more details see website: homepage .... Free download of Steg 1.0.0.2

Encoding Decoding Free 3.5.1 Elefant Software     update

The program is completely free, easy, fast and powerful. It is the best way to encode and decode any type of file, which also integrates seamlessly into Windows Explorer. Be used to hide all the sensitive data and important that we want to keep away from prying eyes. Here are the .... Free download of Encoding Decoding Free 3.5.1

WinDefender 2.2 RTSECURITY     new

WinDefender is a tool that you can use to secure your confidential data and protect your files and folders on computers running Windows 95/98/ME. It provides real-time protection and security service with strong encryption. Once you encrypt your private folders then can use them just all others, non-encrypted ones - files .... Free download of WinDefender 2.2

RHash 1.3.5 Animegorodok    

RHash is a console utility for calculation and verification magnet links and a wide range of hash sums like CRC32, MD4, MD5, SHA1, SHA2, SHA3, AICH, Tiger, DC++ TTH, BitTorrent BTIH, GOST R 34.11-94, AICH, ED2K, RIPEMD-160, HAS-160, EDON-R, Whirlpool and Snefru algorithms. Hash sums are used to ensure and verify .... Free download of RHash 1.3.5

PuTTY 0.68 Simon Tatham    

... find this site useful (it's a survey of cryptography laws in many countries) but I can't vouch ... the Telnet-only binary (PuTTYtel) is unrestricted by any cryptography laws. Several users have pointed out to us recently that the top Google hit for "putty" is now not the official PuTTY .... Free download of PuTTY 0.68

software pick   

The Secure Spreadsheet 1.0 Calctopia Ltd.    

... two parties, empowered by the latest advancements in cryptography research, will be able to keep their data ... personal computer, enhanced by the Holy Grail of Cryptography, renews as the soul of the business PC. Every dataset considered private, valuable or confidential will be processed using secure computation techniques in the .... Free download of The Secure Spreadsheet 1.0

PWGen 2.9.0 Christian Thöing    

... Features: Free and Open-Source software Uses up-to-date cryptography (AES, SHA-2) Unobtrusive: easy to use, doesn’t install any weird DLL files, doesn’t write to the Windows registry, doesn’t even write to your hard disk if you don’t want it, can be uninstalled easily Secure memory management: memory allocated by the .... Free download of PWGen 2.9.0

VSFileHash 1.0.3.121 LOKIBIT.COM    

VSFileHash is a cryptographic hash calculation software. Simply drag and drop file in this calculator and hash string for the file will be immediately displayed. Great tool for network administrators and webmasters to calculate file control sums. VSFileHash supports a variety of cryptographic hash functions, including SHA1, SHA-224, SHA-256, SHA-384, SHA-512, .... Free download of VSFileHash 1.0.3.121

DiskCryptor 1.1.846.118 ntldr    

... of a non-encrypted system. o Support for hardware cryptography on VIA processors (PadLock extensions for hardware AES acceleration). o Support for hardware AES acceleration (AES-NI instruction set) on new Intel CPUs. * Transparent encryption of disk partitions. o Choice to select an encryption algorithm (AES, Twofish, Serpent), including their .... Free download of DiskCryptor 1.1.846.118

software pick   

PWGen Portable 2.8.0 Christian Thöing    

... Features: Free and Open-Source software Uses up-to-date cryptography (AES, SHA-2) Unobtrusive: easy to use, doesn’t install any weird DLL files, doesn’t write to the Windows registry, doesn’t even write to your hard disk if you don’t want it, can be uninstalled easily Secure memory management: memory allocated by the .... Free download of PWGen Portable 2.8.0

Cyber Crypto 4.0 Christos Beretas    

Cyber Crypto 4.0 is able to encrypt everything you like, any file, providing very high protection which is almost unbreakable. * Any files that you encrypted with previous versions of Cyber Crypto, please encrypt them with Cyber Crypto 4.0 for better security. ** Enjoy encryption, protect your sensitive data and keep .... Free download of Cyber Crypto 4.0

CloudShield EncryptSync 1.3a MZTEC Informatica SC LTDA    

What's CloudShield EncryptSync? CloudShield EncryptSync is a tool that Encrypt your Files before Cloud Upload. The Cloud Services like 'OneDrive, DropBox, Google Drive, ZipCloud, myPCBackup' among others, upload Data in Secure Way, but store your files in Clear Text Mode to offer a second layer Services. This tool make sure that .... Free download of CloudShield EncryptSync 1.3a

Pandora White Box 8.0 Christos Beretas    

... very simple interface with 5 categories including Utilities, Cryptography, Vulnerability Scanners and Security. From each of these ... previous tools plus the new ones below: - Cryptography Manic tool - Security NET Disassembler Intermediate Anti Monitoring Browsing E-Mail Validator - Vulnerability Scanners Denial of Service Scanner Intermediate .... Free download of Pandora White Box 8.0

LuJoSoft Checksum 1.0.0 LuJoSoft    

... The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, ... has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity. Description of SHA-1 SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed .... Free download of LuJoSoft Checksum 1.0.0

cryptography web results