Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1621)
- Business (4268)
- Communications (1275)
- Desktop (189)
- Development (614)
- Education (177)
- Games & Entertainment (714)
- Graphic Apps (690)
- Home & Hobby (107)
- Network & Internet (579)
- Security & Privacy (529)
- Servers (65)
- System Utilities (11778)
- Web Development (291)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
XorIt 1.9
Security & Privacy :: Encryption Tools
Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) XorIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a "one-time pad" and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly. XorIt is written in Assembly Language for maximum efficiency. XorIt is a simplified version of our program CryptIt.
Specifications:
Version: 1.9 |
Download
|
Similar Products:
Development :: Components & Libraries
The Secure File Transfer Protocol provides secure file transfer functionality over any reliable data stream, SSH in this case. It is the standard file transfer protocol for use with the SSH2 protocol. wodSFTPdll library implements client side of this protocol which is reliable and easy to use
Windows | Shareware
Read More
Development :: Active X
SSH Server ActiveX component (but also Telnet Server ActiveX as well) that will give you ability to easily add SSH2 (and SFTP) server capabilities to your application, as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys
Windows | Shareware
Read More
DATA RECOVERY SOFTWARE FAQ 7.0.1.6
System Utilities :: Backup & Restore
Want to undelete your official text files from removable USB devices? Visit www.recoverybull.com website to download Data Recovery Software FAQ to rescue accidentally deleted music files from portable removable memory stick devices.
Windows | Shareware
Read More
VANDYKE CLIENTPACK FOR WINDOWS, MAC AND UNIX 9.1.1
System Utilities :: Shell Tools
VanDyke ClientPack is a suite of tools for securely automating routine file transfer, shell, and public-key administration tasks, saving you time, reducing potential human error, and increasing compliance with security policies. The ClientPack provides Secure Shell encrypted logon and session data, including vsh port forwarding to secure TCP/IP data, X11 forwarding, and vcp and vsftp for secure SFTP file transfers.
Windows MAC Linux | Shareware
Read More




