Encryption Key
TCFS project is a cryptographic network file system featuring group sharing of encrypted files. TCFS will encrypt your files before sending them to the file server and will decrypt them before they are read by the requesting application. Because the encryption/decryption process takes place on...
Platforms: *nix
License: Freeware | Size: 87.04 KB | Download (104): TCFS Download |
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
Platforms: Windows, Mac, BSD, Solaris, Linux
License: Freeware | Size: 41.68 KB | Download (47): Operation Project X Download |
Armacrypt Webmail Encryption can help you send and receive encrypted emails while using any major webmail service. Armacrypt can protect your email privacy using any Webmail service with seamless integration in Firefox and Internet Explorer.
Your secure email, including attachments, stays...
Platforms: Windows, XP, 2003, Windows Vista, 2008, 7, 7x64
License: Freeware | Download (51): Armacrypt Webmail Encryption Download |
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read...
Platforms: Windows
License: Freeware | Size: 2.38 MB | Download (472): TrueCrypt Download |
is a powerful utility that protects the contents of a single folder on your computer. Encryption Plus Folders Freeware uses the well-known and documented Blowfish algorithm and a 64-bit encryption key. Just enter a password and select a folder to apply secure file encryption to its contents. Each...
Platforms: Windows
License: Freeware | Size: 5.99 MB | Download (350): Encryption Plus Folders Freeware Download |
Blowcrypt is a file encryption utility based around the blowfish algorithm. It has a Tk frontend but can also be used from the command line. The key length is currently set to 448 bits. (the maximum that is permitted by the blowfish algorithm.) The system has been designed to be modular. The...
Platforms: *nix
License: Freeware | Size: 24.58 KB | Download (152): blowcrypt Download |
twocrypt provides a crypto tool with a deniable encryption option. twocrypt (2c) is a tool for the ultra-paranoid, providing a traditional crypto, but also an option of deniable (subpoena-proof) encryption. It encrypts one or two files at once. Each file can be recovered with its respective...
Platforms: *nix
License: Freeware | Size: 13.31 KB | Download (101): twocrypt Download |
Math::XOR is a package to handle XOR encryption of string buffers. SYNOPSIS use XOR; print xor_buf("hello", "world"), "n"; The XOR module allows you to quickly XOR two strings together. This is the only method of encryption that (assuming the randomness of the pattern used as an encryption...
Platforms: *nix
License: Freeware | Size: 2.05 KB | Download (159): Math::XOR Download |
Keyparc works on most computers - Windows, Linux and Mac OS X. Keyparc enables you to work with your secret files as-if they are in plain. You do not need to change your current workflow nor learn to use it. Access your sensitive files in Keyparc drive as-if it is a normal drive.
Access your...
Platforms: Mac
License: Freeware | Size: 7.1 MB | Download (417): Keyparc for Mac OS X Download |
Keyparc works on most computers - Windows, Linux and Mac OS X. Keyparc enables you to work with your secret files as-if they are in plain. You do not need to change your current workflow nor learn to use it. Access your sensitive files in Keyparc drive as-if it is a normal drive.
Access your...
Platforms: Linux
License: Freeware | Size: 3.3 MB | Download (429): Keyparc for Linux Download |
It takes the bytes string of data and adds the value of the bytes of a secret key to generate the encrypted data result. Previously encrypted data can also be decrypted by subtracting the values of the key's bytes. Requirements: - PHP 4.0 or higher
Platforms: Windows, Mac, *nix, PHP, BSD Solaris
License: Freeware | Download (50): SRCrypt Download |
AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
Platforms: *nix
License: Freeware | Size: 204.8 KB | Download (37): AirSnort Download |
ng the Blowfish algorithm by Bruce Schneier, HexaCrypt provides 128 bit commercial grade encryption for your sensitive files for the Microsoft Windows platform. The encryption key is either generated from a passphrase (using the MD5 algorithm), or you can supply your own key in hexadecimal...
Platforms: Windows
License: Freeware | Size: 10 KB | Download (461): HexaCrypt Download |
This is an excellent file encryption tool in that it is very easy and quick to use. 'File Encryptor' is freeware. The encryption method used will result in your files being ultimately impossible to run without first being decrypted. There was an encryption key created by Titlebar Software for the...
Platforms: Windows
License: Freeware | Size: 374 KB | Download (135): File Encryptor-NP Download |
WinAES is a handy and reliable application designed to enable you to encrypt and decrypt files. The application features strong hash functions and a password generator. You can also encrypt and decrypt text. Features: File Encryption: ยท Using one of most secure symmetric-key algorithms in this...
Platforms: Windows
License: Freeware | Size: 102 KB | Download (417): WinAES Download |
DLOCK2 is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted...
Platforms: Windows, Linux
License: Freeware | Size: 573 KB | Download (409): DLOCK2 Download |
This module depends on the Deploy module and adds the ability to deploy nodes automatically after creating or updating a node without user input.SecurityThis module depends on Encrypt for encryption and decryption of the stored authentication settings and securely storing your encryption key...
Platforms: PHP
License: Freeware | Size: 10 KB | Download (40): Auto deployment Download |
HTTcryPt is a Firefox extension that provides the user the ability to communicate with other people in secret by encrypting a web page at a time through two encryption algorithms: AES or Blowfish. HTTcryPt also allows you to encrypt only the contents of the HTML tags if within those tags was...
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (36): HTTcryPt for Linux Download |
The LDAP Proxy is a software application designed to seek out and retrieve public X.509 certificates containing public encryption keys. The public encryption key can then be used to encrypt email intended for the person associated with the retrieved certificate.
Platforms: *nix
License: Freeware | Size: 2.4 MB | Download (34): LDAP Proxy Download |
Installing Windows from a flash drive! An application that allows you to completely transfer the setup Windows XP, Windows 2003, Windows Vista, Windows 2008, Windows 7, Windows 8 on the USB drive in a few mouse clicks. This means that you can install Windows from a flash card, HDD or other...
Platforms: Windows, Windows 7
License: Freeware | Size: 19.59 MB | Download (39): Novicorp Wintoflash Download |