Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1643)
- Business (3971)
- Communications (1197)
- Desktop (222)
- Development (607)
- Education (291)
- Games & Entertainment (731)
- Graphic Apps (698)
- Home & Hobby (108)
- Network & Internet (593)
- Security & Privacy (536)
- Servers (69)
- System Utilities (31267)
- Web Development (297)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
CryptIt 1.4
Security & Privacy :: Encryption Tools
Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption ofthe file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a one-time pad and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly. CryptIt can also has some convenience features such as being able to automatically use pad files generated by our program GigAlarm, generate key files (from a stream cipher and thus not best for OTP usage) and also analyse the suitability of your chosen key file. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a word (string), but the advantages of the XOR method are lost then. Descriptions can be stored within the encrypted file, as well as the file name of the code. Command line operation is also supported and CryptIt is written in Assembly Language for maximum efficiency.
Specifications:
Version: 1.4 |
Download
|
Similar Products:
Security & Privacy :: Password Managers
Password Agent is a browser-independent Windows password manager for those privacy minded persons and companies who are sceptical about storing their passwords in someone else?s computer aka "cloud". By default Password Agent stores data in your local computer and not in the internet. Password Agent can semi-automatically fill user ID & password of web sites just by pressing a global hotkey in web browser.
Windows | Freeware
Read More
Business :: Databases & Tools
Library of SSIS tasks, components and scripts for Zip, GZip, BZip2, Tar archives, Secure File Transfer (SSH and FTPS), OpenPGP Encryption, Amazon S3, Salesforce, SharePoint, Advanced Excel support, Dynamics CRM, Email, IMAP, POP3, S/MIME, EDI, Oracle, DB2, Informix, ODBC bulk-load.
Windows | Commercial
Read More
Security & Privacy :: Encryption Tools
The security of sensitive data is often neglected. But the encryption of diaries, pictures or other secret documents is so simply. abylon BASIC is a collection to encrypt, sign, compress, search, copy, mail or move files and folders, full integrated into the context menu of the File Explorer. The encryption use the Blowfish- and/or AES algorithm and supports passwords, smart cards, certificates, CDs or memory sticks as secret.
Windows | Shareware
Read More
Development :: Components & Libraries
The Secure File Transfer Protocol provides secure file transfer functionality over any reliable data stream, SSH in this case. It is the standard file transfer protocol for use with the SSH2 protocol. wodSFTP.NET is a dotnet implemenation of client side of this protocol which is reliable and easy to use. SFTP protocol is designed to provide primarily file transfer, but also more general file system access on the remote server - in secure manner.
Windows | Shareware
Read More