Here are the top 15 most popular cryptography softwares as derived from our TpSort Score which is a continually popular score, it denotes an estimated popularity of a software.
Open source secure image hosting with client-side AES-256 encryption.......
Securely share text and files which can be removed after a number of views.......
AreaGuardNeo is file encryption and USB protection tool integrated with Microsoft Active Directory.......
The enterprise cryptographic filesystem for Linux......
TruPax generates TrueCrypt - compatible container files from arbitrary sets of files and folders. Such files match exactly the size of the contained material and can be mounted by TrueCrypt, but also directly extracted using TruPax itself. Latter also works for containers formatted with FAT32 by TrueCrypt itself,......
ImmediateCrypt is an utility for encryption and decryption of plain text messages with the AES-256 cipher.It is released under the GPLv3 license (full Java source available) and works under any Java-enabled environment (Windows, Linux and Mac OSX).......
iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.......
The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCIV can compute MD5 or SHA-1 cryptographic hash values. These values can be displayed on the screen or saved in an XML file database for later use and verification.......
Computes the MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digest for any number of files while optionally recursively digging through the directory structure. Can also match input files against lists of known hashes in a variety of formats.......
Your personal document lock box. Securely stored and always at hand.You can finally access your confidential documents from anywhere in the world - securely encrypted, perfectly synchronized, and amazingly practical - with DocWallet, the free document manager from Deutsche Post AG, for iPhone, iPad, Mac and PC.......
Password protection and strong encryption of the external and internal drives, flash drives, backup drives, etc.......
Cryptix is a complete solution to study cryptography, encoding and ciphers. Hide your datas, encrypt your texts and documents.Cryptix contains password generators, Mnemonic, .htpasswd generator, RSA 512 bits key generator, Wordlist generator and numerous security tools.......
SilentEye is a cross-platform application design for an easy use of steganography, in this case hiding messages into pictures. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system.......
Cryptext helps you secure your writings and notes easily. Cryptext use AES algorithm to protect the content of your texts.Features :- AES encryption of your texts.- Choice of two AES methods for encryption and decryption.- Passwords are stored securely inside your keychains.- Logs of encryption and decryption.- Export,import,print your secured......
RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, MD4, MD5, SHA1, SHA256, SHA512, Tiger, DC++ TTH, BitTorrent BTIH, ED2K, AICH, GOST R 34.11-94, RIPEMD-160, HAS-160, EDON-R 256/512, Whirlpool and Snefru-128/256 algorithms. Hash sums are used to ensure and verify integrity......
About | Terms |
About UsContact Us | TpSort ScorePrivacy PoliceDMCA Policy |
© 2015-2016 www.tpsort.com, Inc