ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 3 Next » Displayed: 1 - 25 of 74
Sort by:  relevance | title | downloads | rating | date
SQLCipher
SQLCipher 4.13.0   
... new vulnerabilities and incorporate the latest advancements in cryptographic techniques. In summary, SQLCipher by ZETETIC LLC is an exceptional solution for developers seeking to implement robust, full-database encryption with ...
Freeware | $499.00

XolidoSign
XolidoSign 2.2.1.60   
... supports various signature methods, including digital certificates and cryptographic tokens, allowing users to choose the most suitable option for their security needs. This flexibility makes it an ideal solution for ...
Freeware

BestSync Portable x64
BestSync Portable x64 2024 (19.0.1.5)   
... a folder with a ZIP file, support AES cryptographic algorithm to protect the zip file with password. Synchronize Outlook (mail, contact, etc) and Windows Mail between PCs by utilizing USB ...
Trialware | $19.95

Zero Install
Zero Install 2.28.3   
... paramount concern for Zero Install. The software employs cryptographic signatures to verify the integrity and authenticity of downloaded applications and their dependencies. This ensures that users are protected from malicious ...
Open Source

iSeePassword - iTunes Password Recovery V2.1.3.0 screenshot
iSeePassword - iTunes Password Recovery V2.1.3.0 2.1.3.0   
... advantage of the advances in cryptanalysis to render cryptographic algorithms insecure. Brute force attack on cryptographic algorithm makes it extremely easy and safe to ...
Shareware | $39.95

PELock
PELock 2.08   
... of original file, encryption of code (publicly available cryptographic algorithms and algorithms build polymorphic ally) , reorganization of basic PE EXE structures in order to assure better ratio during compression, ...
Demo | $499.00

wodSSH.NET
wodSSH.NET 2.6.5   
... low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH.NET is easily - just put it on your form (or initialize new instance on ...
Shareware | $199.00

Syncthing
Syncthing 2.0.14   
... encrypted using TLS, and the software uses strong cryptographic protocols to ensure that your data remains secure during transit. Additionally, since Syncthing is open-source, its code is transparent and can ...
Open Source

CryptoForge
CryptoForge 5.5.0   
... Gost. It also includes powerful compression to strengthen cryptographic security even more. The command-line interface allows quick integration into automated processes and scripts, and lets you perform tasks in both ...
Shareware | $39.70

Portable QPass screenshot
Portable QPass 1.3.2   
... Qt4 as a GUI library and libgcrypt as cryptographic library. ...
Open Source

Proton Pass screenshot
Proton Pass 1.33.4   
... and peace of mind. The software uses open-source cryptographic algorithms, allowing for transparency and trust in its security measures. The user interface of Proton Pass is both intuitive and ...
Open Source | $2.99

Zero Install Portable
Zero Install Portable 2.28.3   
... where Zero Install Portable excels. The software uses cryptographic signatures to verify the integrity and authenticity of applications before they are run. This ensures that users are protected from malicious ...
Open Source

BizCrypto for BizTalk Server
BizCrypto for BizTalk Server 14   
... PDF, XML, ZIP pipelines let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP and POP3 adapters and MIME ...
Shareware | $1 066.00

BizCrypto for SQL Server
BizCrypto for SQL Server 14   
... PKI, PDF, XML tasks let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP, POP3 tasks and MIME task ...
Shareware | $1 066.00

xCELLencrypt screenshot
xCELLencrypt 4.2   
... encryption standard (AES) 256 bit encryption via Microsoft's cryptographic service provider (CryptoAPI). Users may elect to encrypt with a password or through the use of a key file. xCELLencrypt is ...
Shareware | $9.99

Ricochet Refresh
Ricochet Refresh 3.0.40   
... security patches and improvements, and it employs advanced cryptographic techniques to safeguard user data. Additionally, the decentralized nature of the platform means that there is no central point of failure, ...
Open Source

WickrMe
WickrMe 6.54.55   
... is bolstered by the app's use of advanced cryptographic protocols, which are regularly audited by third-party security experts. WickrMe also offers a self-destructing message feature, giving users control over ...
Trialware

Session
Session 1.17.8   
... voice calls, and file transfers. By using advanced cryptographic protocols, Session guarantees that your conversations remain confidential and protected from eavesdropping. Session also eliminates the need for phone numbers ...
Open Source

Devart SecureBridge
Devart SecureBridge 11.0.1   
... TCP traffic using SSH or SSL protocols and Cryptographic Message Syntax that provide authentication for client and server, strong data encryption, and data integrity verification. Its components can be used ...
Shareware | $99.95

Inky
Inky 4.1.0 (1.4.6)   
... spear phishing. Inky assigns each employee a unique cryptographic key, and that key is only ever provisioned into that employee’s physical devices. So Inky makes impersonation and forgery impossible. ...
Freeware

Ajax Minifier
Ajax Minifier 5.14   
... you will need to provide your own AjaxMin.snk cryptographic key-pair to sign the assemblies or you will get a build error. The Ajax Minifier project does not accept external ...
Open Source

wodSSH
wodSSH 3.1.1   
... low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH is easily - just put it on your form, set Protocol type and issue ...
Shareware | $189.00

jk-ware Project Solutions
jk-ware Project Solutions 5.0   
... and a project to the construction of a cryptographic activation key. The source code contains multithreading and the award of license files. The resulting form administration program consist of a ...
Demo | $69.90

Dafny
Dafny 4.9.0   
... medical devices. - **Security:** Verifying the correctness of cryptographic algorithms and protocols to prevent vulnerabilities and exploits. - **Education:** Serving as an educational tool for teaching formal methods and program ...
Open Source

MarshallSoft FoxPro AES Library
MarshallSoft FoxPro AES Library 6.0   
... - Includes Diffie-Hellman key exchange functions. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...
Shareware | $119.00
Results Page: 1 2 3 Next » Displayed: 1 - 25 of 74
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags