Exploit the possiblities
Showing 1 - 2 of 2 RSS Feed

Files

sd2002.zip
Posted Dec 4, 2002
Authored by Security Storm | Site securitystorm.net

Secure Data 2002 is the start of a new line of security tools by Security Storm. Secure Data 2002 brings an easy to use interface to the best encryption technologies. From XOR to Blowfish to RC4 and many more Secure Data 2002 is the easy way to encrypt and decrypt sensitive data using common encryption technologies and a passphrase of your choice. Secure Data 2002 is compatible with Windows 9x, Windows Me, Windows NT, Windows 2002, and Windows XP.

tags | encryption
systems | windows, 9x, nt, me, xp
MD5 | eea35012b658c7a045e4c7026a298f6c
det.zip
Posted Dec 11, 2000
Authored by Sergey Shevchenko | Site klsoft.f2s.com

Data Encryption Toolkit is a program for data encryption with many additional features. This program allows you to use 5 well-known and highly secured encryption algorithms (Blowfish, DES etc.). DET will help you to encrypt single files, groups of files or the whole folders, including all its subfolders, easy and quickly. You can work with encrypted folders as simply as with usual folders (except entering the unlocking password). All encryption and decryption actions will be done on fly. The program is integrated into any Windows shell and all its functions are available from the context menu. Besides encryption the program has some additional features. DET has a high speed, is easy to setup and to use.

tags | shell, encryption
systems | windows
MD5 | a5764f863ae502ca6bb17a33be805814
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Apple Rushes Out Fix To Telugu Letter Text Bomb Bug
Posted Feb 20, 2018

This is an article straight from the wires, you can read the full story here.

tags | headline, phone, denial of service, flaw, apple
Mac Trojan Coldroot Went Undetected For Years
Posted Feb 20, 2018

This is an article straight from the wires, you can read the full story here.

tags | headline, malware, trojan, apple
Jenkins Vuln Makes For Great Monero Mining Slaves
Posted Feb 20, 2018

This is an article straight from the wires, you can read the full story here.

tags | headline, malware, flaw, cryptography, java
North Korea Hacker Unit Reaper Now Global Threat
Posted Feb 20, 2018

This is an article straight from the wires, you can read the full story here.

tags | headline, government, cyberwar, korea
Bogus Linux Vulnerability Gets Publicity
Posted Feb 20, 2018

This is an article straight from the wires, you can read the full story here.

tags | headline, linux
Google Reveals Edge Bug That Microsoft Has Had Trouble Fixing
Posted Feb 20, 2018

This is an article straight from the wires, you can read the full story here.

tags | headline, microsoft, flaw, google
Mueller Flips American Who Sold Bank Info To Russians
Posted Feb 19, 2018

This is an article straight from the wires, you can read the full story here.

tags | headline, government, russia, fraud, cyberwar
Hackers Pilfered $6M From Russian Central Bank Via SWIFT System
Posted Feb 19, 2018

This is an article straight from the wires, you can read the full story here.

tags | headline, hacker, bank, russia, cybercrime, fraud
Cryptography Is Our Digital Immune System
Posted Feb 19, 2018

This is an article straight from the wires, you can read the full story here.

tags | headline, privacy, cryptography
The Tactics Of A Russian Troll Farm
Posted Feb 19, 2018

This is an article straight from the wires, you can read the full story here.

tags | headline, government, russia, fraud, cyberwar
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close