(Page 2 of 26)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Cryptography » Data Encryption

ShareCrypt
Added 2006-09-18
by SecurStar
ShareCrypt has been designed to effectively and transparently encrypt shared network drives or folders by allowing simultaneous data access to different users and preventing unauthorized access from non-authorized people

Drive Crypt
Added 2006-09-18
by SecurStar
1344 Bit, Military strong, transparent Hard Disk encryption. DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time. It can also hide your date into music files.

Drive Crypt Plus Pack
Added 2006-09-18
by SecurStar
Offers AES 256 bit, full disk encryption and pre-boot authentication. Able to protect the entire computer including the operating system, in real time. Only softwar able to hide the entire operating systemDCPP also works with external USB-Token.

MDCrack
Added 2006-09-07
by Gregory Duchemin
MDCrack is a free featureful password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multi threading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s). This yields to phenomenal performance even on old generation multi-CPUs systems. Several options offer fine tuning for the attack and allow to save and resume your session at a later time. This program has multiple uses in real life, while its primary goal is obviously to test the strength of hashed passwords, it can also be used as a raw benchmark tool for integer calculs. For any question you may have, please be sure to first read the Frequenty Ask Questions file (FAQ) provided in MDCrack ZIP file. I hope you will enjoy this program.

WinPT - Windows Privacy Tray
Added 2006-08-18
by Timo Schulz
WinPT is a taskbar front-end for GnuPG which includes key management, encryption via the clipboard, direct file encryption and support for OpenPGP smartcards.

Attach Plus
Added 2006-07-12
by Attach Plus
Attach Plus is an email encryption utility for security conscious professionals. Attach Plus integrates 128-bit PDF and ZIP encryption into the applications you use most. Now you can use all the advanced features of PDF such as bookmarks, encryption and much more to protect confidential documents. Free 30-Day Trial!

Kryptor
Added 2006-06-01
by Angelo Rosiello
Kryptor is a graphical tool to encrypt files using the algorithm ARCS-256 bits. It is also possible to erase files by overwriting data with a pseudo-random sequence of bytes iterated three times, which will make data recovery a very complex operation.

Keygloo
Added 2006-05-15
by
This is a public key based encryption tool that supports both webmails and email clients. You can encrypt your e-mails directly from your gmail, hotmail, Outlook Express and other mail interfaces. Keygloo also helps your protect your desktop files.

Steganos LockNote
Added 2006-01-26
by Steganos GmbH
This open source software enables users to quickly and easily protect confidential notes, passwords, addresses, phone numbers or other sensitive information. LockNote looks and acts like a normal text file; however, it can only be opened with a password chosen by the user. The encrypted memo can be saved to a USB stick and used while on the road or on another PC. Like all other Steganos encryption products, LockNote employs 256-bit AES encryption. Since the freeware’s encryption and decryption mechanisms are integrated within the file, any encrypted data is saved within the program itself; thus, nothing needs to be installed, and there's no traditional software interface. After downloading the 300 KB program, the user simply opens it, types up the desired memo and selects a password. The next time the user wants to open the memo, he or she just needs to type in the password, and the data will appear. It is also possible to create a LockNote from a pre-existing text file by simply dragging and dropping the file onto a LockNote window. The file will be encrypted automatically. The software enables users to create as many LockNotes as desired, and they can be sent as e-mail attachments. Since LockNotes are executable files (exe format), it may be necessary to utilize WinZip to send a LockNote attachment in order to pass through certain mail filters. To provide maximum security on the road, LockNotes can be saved to storable media like USB sticks, thus enabling users to safely and easily transport important customer information, addresses or telephone numbers. A LockNote saved to a USB stick can be opened on any PC by entering the password. Then, the user can add more confidential notes, close the LockNote and remove the USB stick. The data will be securely encrypted.

SafeBit Disk Encryption
Added 2006-01-09
by NeoByte Solutions
SafeBit Disk Encryption is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, keep them encrypted all them time, but still work with them just like you work with normal files. Data is decrypted automatically during the transfer from disk to memory, and re-encryted when data is written back to disk. This process is transparent to the user. SafeBit Disk Encryption maintains the security of data even in case of incorrect system shutdown or system crash by keeping the files always encrypted. Container files are protected against accidental deletion. Security is increased also by the "automatic closure system" and emergency hotkeys. Safebit is the perfect suplement to a firewall and antivirus program, and stands as the last line of defense in case these fail. Nothing can crack the strong 256-bit AES encryption SafeBit uses (selected by the U.S. government as its official encryption standard). SafeBit has a very intuitive user interface which makes it friendly for computer beginners and also powerful for experienced IT experts that search for a reliable file encryption solution. It will protect your confidential information from your boss, wife, kids, friends, hackers, competitors, secret services or from any other possible intruder. SafeBit will help you improve the security offered by an antivirus or a firewall. While your documents are inside the encrypted closed vault, viruses and trojans will not be able to infect your important files. Keep your documents inside the encrypted safe and hackers will NEVER be able to extract your files from the vault even if your firewall fails, because the strong AES encryption algorithm cannot be cracked. Laptops are extremely vulnerable to thefts. Using SafeBit you will be able to secure the important documents on your mobile computer against possible thefts. Protect yourself with SafeBit now!

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus