Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 976 Categories, Downloaded 30.074.597 Times

96Crypt 2008.build.20

  Date Added: August 27, 2008  |  Visits: 758

96Crypt
Full screenshot

Report Broken Link
Printer Friendly Version


Product Homepage
Download (75 downloads)

96Crypt features several worldwide trusted block ciphers algorithms such as: 3DES, Blowfish, MARS, RijnDael-AES, SERPENT or Twofish. All our block ciphers operate in CTR or CBC mode with a MAC mechanism providing the highest level of confidentiality and integrity to your data. The user-provided secret password is processed with one of the following HASH functions: HAVAL, MD5, RMD, SHA-1, SHA256, SHA384, SHA512 or TIGER. The key used for EnCryption/DeCryption is calculated based on a user-provided typed password or file-password. After several rounds of HASHing / SALTing the entered or selected password, relying on cascading HASH functions, the result key will be used for EnCryption/DeCryption. -Steganography: Data, files of just any type or any extension without exception, may be EnCrypted & Hidden, using 96Crypt, inside a graphic picture or a digital sound used as an "innocent container". Several graphic images format are supported by 96Crypt: ( jpg, bmp, tga, tif, ras ) and several digital sound format are supported as well: ( wav, au, snd, iff, svx, aif ). -Compression: With a multi level compression scheme, EnCrypted files are even smaller. A complete FOLDER with it's subfolders would be easily and quickly EnCrypted in one single file. -File Shredder: The shredded files with 96Crypt cannot even be identified with the most sophisticated file recovery tools. This is because the shredded file's content is null, its size has changed to zero, and its date has been modified to a random date and no more clusters are assigned to that file. -CRC16 / CRC32 Checker-Modifier of any file or any hand-typed string. Registered version allows CRC16/32 file forging. Results may be easily printed or saved to an external file. -HASH / MAC Checker of any file or any hand-typed string. Results may be easily printed or saved to an external file.

Requirements: No special requirements
Platforms: Windows 98, Windows Me, Windows 2000, Windows XP, Windows 2003
Keyword: 3des 96crypt Aes Algorithm Blowfish Collision Crc16 Crc32 Crypt Decrypt Decryption Des E-mail Email Encrypt Encryption Hash Hasher Haval Mars Md5 Rijndael Rmd Salt Security
Users rating: 0/10

License: Shareware Cost: $27.00 USD Size: 1.46 MB
96CRYPT RELATED
Utilities  -  MD5 Hash Check 4dots 1.0
MD5 Hash Check 4dots is a free md5 hash check utility to verify the integrity of files by generating the MD5 hash of a file and comparing it with the MD5 hash of the source file. For example, some download sites list the MD5 checksum of...
15.21 MB  
Security Tools  -  DP HASH 1.0
Dp Hash 1.0 is the succession from my DPASHA. This program supported at this time the following hash: adler32, crc16, crc24, crc32, crc64, EDonkey, MD2, MD4, MD5, SHA, SHA1, SHA256, SHA384, SHA512, Sapphire, Panama, Tiger, RipeMD128, RipeMD160,...
436 KB  
File Cataloguers  -  BitChip File Gear 1.0.1010.112
BitChip File Gear is a powerful set of neatly file tools. It bundles several useful utilities in one. Currently it includes File Splitter/Joiner, Checksum Calculator. * File Splitter/Joiner It allow you to split large files (of...
482.15 KB  
Input Device Utilities  -  QuickiHash 1.00
QuickiHash is a lightweight application that has been designed to load quickly and display hashes for files in a number of different formats. Files can be dropped into the main window, on the application icon, specified via the commandline,...
45.73 KB  
Utilities  -  Encode It! 1.0
Encode It! is a handy utility for pentesters, developers and other application security professionals. Encode It! encodes and hashes provided strings. Supported methods include Base64, MD5, SHA1, SHA256, SHA384, SHA512, ASCII Encdoing, Reverse...
3 MB  
Security Tools  -  Checksums calculator 1.1
“Checksums calculator” an open source application that has been developed with Free Pascal compiler and Lazarus IDE. Can run on Microsoft Windows, MacOS X and Linux operating systems on both 32bit and 64bit architectures while is translated...
1.22 MB  
File Restoration  -  EF CheckSum Manager 7.40
EF CheckSum Manager is a program designed for the integrity examination of files on the standard formats SFV, MD5, SHA1, SHA256 and SHA512. They can verify existing checksums or create new checksum for your important data. The EF CheckSum Manager...
1.83 MB  
File Utilities  -  Iside 1.4
Iside compares files and folders by computing their hash code (MD5 SHA1 SHA256 CRC32 SHA384 SHA512). Right click on a file, select Copy and by right clicking on another file you will discover if the two files are equal. Includes file comparison,...
860 KB  
Development Tools  -  SHA Algorithms 160,224,256, 1.0
Generates Message Digest using algorithms : SHA160, SHA-224, SHA256,SHA384,SHA512 Support for Bit Oriented Message -- Enter Message Length in Bits -- Either enter Message (HEX) or -- generate a random message of length LEN in Bits -- Select the...
10 KB  
Utilities  -  Hash Finder 1.1
Hash Finder allows you to calculate the MD2,MD4,MD5,SHA1,SHA224,SHA256,SHA384,SHA512 checksums of any text strings. Hash Finders user interface is plain & simple. Simply enter the string you would like to convert and select the hash type...
409.6 KB  
NEW DOWNLOADS IN SECURITY TOOLS, FILE SECURITY
Security Tools  -  Privacy Eraser Free 4.30.2
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and...
4.7 MB  
Security Tools  -  Heimdal FREE 2.2.185
SCANS YOUR SYSTEM FOR VULNERABLE APPLICATIONS - Heimdal FREE scans your computer every 2 hours for outdated software. You can choose from a list of 70 most used software applications in the world. When it spots an out-of-date application, it will...
756 KB  
Security Tools  -  BestCrypt Volume Encryption 3.77.02
BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks - simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), while also working on UEFI and GPT...
8.59 MB  
Security Tools  -  DoNotSpy10 3.0
DoNotSpy10 is the world's first antispy tool for Windows 10. Its straight-forward user interface allows you to manage how Windows 10 respects their privacy. Microsoft introduces many new 'diagnostic' features with Windows 10. These services help...
1.64 MB  
Security Tools  -  My System Mechanic 1.0
My System Mechanic is a great software for repairing computer registry and dealing with issues of PC stability, but there may be errors on users system that are created by many other factors, like junk accumulations, internet settings or incorrect...
4.97 MB  
File Security  -  Fast File Encryptor 5.5
The Fast File Encryptor is designed for fast processing of extremely large files. It can encrypt or decrypt files, contents of folders and contains a lot of additional tools. The Fast File Encryptor presents a flexible user interface with detailed...
559.85 KB  
File Security  -  Privacy Drive Portable 3.10
Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from...
1.46 MB  
File Security  -  Privacy Drive 3.10
Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from...
1.39 MB  
File Security  -  Network LookOut Administrator Pro 4.3.2
The Network LookOut Administrator Pro allows you to see live screens of remote computers or show you screen to students. You can take control of a remote computer by controlling the mouse and keyboard. This way, you can always watch what users are...
31.49 MB  
File Security  -  BestCrypt Container Encryption 9.03.5
To protect your privacy, comply with regulations, such as HIPAA or PCI, and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt...
24.53 MB