ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 3 Next » Displayed: 1 - 25 of 72
Sort by:  relevance | title | downloads | rating | date
VSCryptoHash 64-bit
VSCryptoHash 64-bit 2.5.3.509   
VSCryptoHash 64-bit is cryptographic hash calculation software. Simply drag and drop files ... file control sums. VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 ...
Freeware

Afick
Afick 3.8.1   
... concern for Afick. It includes features such as cryptographic checksums to ensure the integrity of the monitored files and directories. Additionally, it can be configured to send alerts via email ...
Open Source

Session
Session 1.17.15   
... voice calls, and file transfers. By using advanced cryptographic protocols, Session guarantees that your conversations remain confidential and protected from eavesdropping. Session also eliminates the need for phone numbers ...
Open Source

iSeePassword - iTunes Password Recovery V2.1.3.0 screenshot
iSeePassword - iTunes Password Recovery V2.1.3.0 2.1.3.0   
... advantage of the advances in cryptanalysis to render cryptographic algorithms insecure. Brute force attack on cryptographic algorithm makes it extremely easy and safe to ...
Shareware | $39.95

BizCrypto for BizTalk Server
BizCrypto for BizTalk Server 14   
... PDF, XML, ZIP pipelines let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP and POP3 adapters and MIME ...
Shareware | $1 066.00

BizCrypto for SQL Server
BizCrypto for SQL Server 14   
... PKI, PDF, XML tasks let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP, POP3 tasks and MIME task ...
Shareware | $1 066.00

Devart SecureBridge
Devart SecureBridge 11.0.1   
... TCP traffic using SSH or SSL protocols and Cryptographic Message Syntax that provide authentication for client and server, strong data encryption, and data integrity verification. Its components can be used ...
Shareware | $99.95

Age of Empires III
Age of Empires III 1.2.1   
... use without compromising on security. It employs contemporary cryptographic techniques to ensure data confidentiality and integrity, making ... features of Age is its use of modern cryptographic primitives. It leverages the X25519 elliptic curve for ...
Open Source

JFTP x64
JFTP x64 5.0.1 B20120623   
... SSL 3.0 and TLS 1.0 · Supports several cryptographic algorithms such as RSA, RC4, DES, Triple DES, Diffie-Hellman and DSA · Support for both Explicit and Implicit SSL connections · ...
Freeware

Avast Decryption Tool for Legion Ransomware
Avast Decryption Tool for Legion Ransomware 1.0.0.823   
... algorithms employed by Legion Ransomware. By leveraging advanced cryptographic techniques, it can decrypt a wide range of file types, ensuring that your documents, images, videos, and other critical data are ...
Freeware

Proton Pass screenshot
Proton Pass 1.35.0   
... and peace of mind. The software uses open-source cryptographic algorithms, allowing for transparency and trust in its security measures. The user interface of Proton Pass is both intuitive and ...
Open Source | $2.99

JAP/JonDo
JAP/JonDo 00.20.001   
... cascade in detail, and verifies this information by cryptographic means. The users are thus able to selectively choose trustable mix cascades. Outages and maintenance times We cannot guarantee ...
Freeware

SQLCipher
SQLCipher 4.14.0   
... new vulnerabilities and incorporate the latest advancements in cryptographic techniques. In summary, SQLCipher by ZETETIC LLC is an exceptional solution for developers seeking to implement robust, full-database encryption with ...
Freeware | $499.00

XolidoSign
XolidoSign 2.2.1.60   
... supports various signature methods, including digital certificates and cryptographic tokens, allowing users to choose the most suitable option for their security needs. This flexibility makes it an ideal solution for ...
Freeware

xCELLencrypt screenshot
xCELLencrypt 4.2   
... encryption standard (AES) 256 bit encryption via Microsoft's cryptographic service provider (CryptoAPI). Users may elect to encrypt with a password or through the use of a key file. xCELLencrypt is ...
Shareware | $9.99

DevToys
DevToys 1.0.13.0   
... toolkit includes utilities for generating secure passwords, calculating cryptographic hashes (MD5, SHA-1, SHA-256), and even encoding and decoding JWT tokens. These tools help developers implement and maintain high security standards ...
Open Source

Proton Pass for Firefox screenshot
Proton Pass for Firefox 1.34.2   
... security is bolstered by the use of open-source cryptographic algorithms, ensuring transparency and trustworthiness. Additionally, Proton Pass supports two-factor authentication (2FA), adding an extra layer of protection to your accounts. ...
Trialware | $4.99

Syncthing
Syncthing 2.0.15   
... encrypted using TLS, and the software uses strong cryptographic protocols to ensure that your data remains secure during transit. Additionally, since Syncthing is open-source, its code is transparent and can ...
Open Source

NCP Secure Entry Windows Client
NCP Secure Entry Windows Client 12.0   
... having much load in sending direction. The embedded cryptographic module has been validated as conformant to FIPS 140-2 (certificate #1051). ...
Demo | $144.00

Stunnel
Stunnel 5.77   
... robust encryption and supports a wide array of cryptographic algorithms, ensuring that it remains resilient against evolving cyber threats. Regular updates and a proactive approach to vulnerability management further enhance ...
Freeware

CryptoForge
CryptoForge 5.5.0   
... Gost. It also includes powerful compression to strengthen cryptographic security even more. The command-line interface allows quick integration into automated processes and scripts, and lets you perform tasks in both ...
Shareware | $39.70

Appnimi MD2 Decrypter
Appnimi MD2 Decrypter 1.0   
... is FREE. The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.[2] The algorithm is optimized for 8-bit computers. MD2 is specified in RFC 1319. ...
Freeware

Cryptnos
Cryptnos 1.3.3   
... will help you generate strong, pseudo-random passwords using cryptographic hashes. Cryptnos combines a unique "site token" ... master password and runs this data through a cryptographic hash algorithm to produce a password that is ...
Open Source

ManageEngine Key Manager Plus
ManageEngine Key Manager Plus 7.1.0 Build 7100   
... need for organizations to secure and manage their cryptographic assets effectively, ensuring compliance, reducing risks, and enhancing ... centralization significantly reduces the complexity associated with managing cryptographic assets spread across diverse environments. One of ...
Trialware | $475.00

BestSync Portable x64
BestSync Portable x64 2024 (19.0.1.5)   
... a folder with a ZIP file, support AES cryptographic algorithm to protect the zip file with password. Synchronize Outlook (mail, contact, etc) and Windows Mail between PCs by utilizing USB ...
Trialware | $19.95
Results Page: 1 2 3 Next » Displayed: 1 - 25 of 72
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags