data encryption


Scrambler – added 9/6/2006

Scrambler is a free 92 bit encryption/decryption program, capable of providing resonable security for your secrets. Actually, it’s based on matrix multiplication – if you know the elements of the matrix, you can invert the operation.


XORrior – added 9/6/2006

XORrior is a file encryption system using the simple – but, if used properly, powerful – XOR operator. If you use a (truly) random key file which is at least as big as the source file, the XOR encryption will be unbreakable. You can obtain truly random files by, for example, recording radio noise with your soundcard.


fSekrit – added 10/9/2008

fSekrit is a small application for keeping encrypted notes. The real advantage of fSekrit is that notes are truly self-contained; the editor program and your note are merged together into a tiny self-contained program file, removing the need to install a special application to view your data. fSekrit uses very strong encryption (256-bit AES/Rijndael in CBC mode) to ensure that your data is never at risk.


File Good Security – added 6/1/2006

File Good Security is an encryption software which uses the algorithm (REDOC 3) to encypty sensitive personal information.


Storm – added 5/17/2006

Storm allows you to hide your confidential files and compressed folders in regular JPEG picture files. Your information is encrypted and hidden inside the JPEG file without affecting the picture’s appearance, quality or dimensions. Storm is very easy to use and it does not require a password.


FileBarricader – added 5/11/2006

FileBarricader is a file encryption utility which includes four industry standard encryption algorithms: DES, RC2, Rijndael (AES) and 3DES (TripleDES), four encryption strength settings: 64 bit, 128 bit, 192 bit and 256 bit, and makes self decrypting .exe files that can be sent to any computer.


Cipher Gui – added 3/25/2006

Cipher Gui overwrites every deleted file three times and prevents in that way any recovery of them. All parts of the partition not assigned to a file are being overwritten three times, in order to prevent any recovery of already deleted files.

Pages: 1 2 3 4 5 6 7 8 9