Related Keywords
algorithm downloadsalgorithm 2 downloads
algorithm development downloads
algorithm optimization downloads
algorithm x64 downloads
md5 algorithm downloads
aes encryption algorithm downloads
optimization algorithm downloads
using aes algorithm downloads
sha 1 algorithm downloads
secure hash algorithm downloads
genetic algorithm downloads
compression algorithm downloads
genetic algorithm optimizatio downloads
reliable algorithm and all downloads
google algorithm downloads
image algorithm downloads
comparison algorithm downloads
encryption algorithm downloads
checksum algorithm downloads
Top Software Keywords
decrypt downloadsencryption downloads
aes downloads
encryption software downloads
safe downloads
file encryption downloads
decryption downloads
privacy downloads
data encryption downloads
secure downloads
password downloads
files downloads
folder lock downloads
security downloads
recovery downloads
protection downloads
encrypt downloads
file downloads
email downloads
protect downloads
folder downloads
crack downloads
hide downloads
folders downloads
blowfish downloads
lock downloads
lock folder downloads
recover downloads
rijndael downloads
des downloads
Vista Download
Vista downloadVista antivirus download
Vista wallpaper download
Vista wallpapers download
Vista themes download
Vista pack download
Vista ultimate download
Vista home download
Vista basic download
Vista business download
Vista x64 download
Vista transformation download
Vista transformation pack download
Vista boot download
Vista dvd download
Vista sidebar download
Vista aero download
Vista product key download
Top Downloads
Top Rated
Navigation: Home
\ Security & Privacy
\ Encryption Tools \ File Privacy
File Privacy0.2 by Vengito (alias Needed Special Tools) |
![]() |
Software Description:
File Privacy has following features: - File decryption/encryption - File compare for cryptography - Create random key hex string and save as file - Hex string based decryption/encryption ...
type: Commercial ($0.99)
Download File Privacycategories: File Privacy Encryption Decryption 3DES TDES Triple DES Add to Download Basket Report virus or spyware |
![]() |
|
Software Info | |
Best Vista Download periodically updates pricing and software information of File Privacy full version from the publisher,
but some information may be out-of-date. You should confirm all information. Software piracy is theft, using crack, warez passwords, patches, serial numbers, registration codes, key generator, keymaker or keygen for File Privacy license key is illegal and prevent future development of File Privacy. Download links are directly from our mirrors or publisher's website, File Privacy torrent files or shared files from rapidshare, yousendit or megaupload are not allowed! |
|
Released: | September 10, 2017 |
Filesize: | 18.38 MB |
Language: | English |
Platform: | Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64 |
Install | Install and Uninstall |
Add Your Review or Windows Vista Compatibility Report |
File Privacy- Releases History |
Software: | File Privacy 0.2 |
Date Released: | Sep 10, 2017 |
Status: | Minor Update |
Most popular algorithm in Encryption Tools downloads for Vista |
DiskCryptor 1.1.846.118 download by ntldr
... disk partitions. o Choice to select an encryption algorithm (AES, Twofish, Serpent), including their combinations. * Full support for external storage devices. o Full support for encryption of external ...
type: Freeware
View Details
Download
categories: disk partition encryption, encrypt partition, disk encryptor, encrypt, decrypt, encryption |
![]() |
Best Folder Encryptor 16.97 download by DoGoodSoft
... files and folder with superfast, strong and faultless algorithms. You can choose from five encryption methods when ... a folder in a time with internationally mature algorithm. Each encrypted file in this folder can be ...
type: Shareware ($39.95)
View Details
Download
categories: folder encryption, file encryption, encryptor, decrypt, encryption software, disk protection, disguise folder, Best Folder Encryptor |
![]() |
Encrypting Safe 1.1 download by Google
... from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source ... Smart Phone Behind: Using Symmetric key Algorithm for Encrypting and Decrypting note Features: - ...
type: Freeware
View Details
Download
categories: encrypt text, text encryption, Encrypting Decrypting symmetric key algorithm, encrypt, encryption, encryptor |
![]() |
Cryptnos 1.3.3 download by Jeffrey T. Darlington
... and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, ... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, ...
type: Open Source
View Details
Download
categories: password generator, generate password, cryptographic hash, password, generator, hash |
![]() |
Free Text Encrypt 1.00 download by KRyLack Software
... to protect your confidential data. The AES encryption algorithm secures the sensitive and unclassified information from illegal ... your message; - Secure AES 256 bit encryption algorithm; - Easily copy encrypted messages to the clipboard ...
View Details
Download
|
![]() ![]() ![]() ![]() ![]() ![]() |
Best Encryption Expert 12.03 download by DoGoodSoft
... encrypted files in a time with internationally mature algorithms. Each encrypted file in this folder can be ... into an encrypted file with very strong encryption algorithm. Portable Encryption packs and encrypts a folder into ...
type: Shareware ($39.95)
View Details
Download
categories: folder encryption, file encryption, encryptor, decrypt, encryption software, disk protection, data destruction, disguise folders, folder protection, hide folder, Best Encryption Expert |
![]() |
Appnimi MD2 Decrypter 1.0 download by Appnimi
... Above all it is FREE. The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.[2] The algorithm is optimized for 8-bit computers. MD2 is specified
View Details
Download
|
![]() |
Appnimi MD5 Decrypter 1.0 download by Appnimi
... Above all it is FREE. The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 ...
View Details
Download
|
![]() |
Appnimi SHA256 Decrypter 3.8.6 download by Appnimi
... Above all it is FREE. The Secure Hash Algorithm is one of a number of cryptographic hash ... for a text or a data file. SHA-256 algorithm generates an almost-unique, fixed size 256-bit hash. Hash ...
View Details
Download
|
![]() |
Appnimi SHA384 Decrypter 1.0 download by Appnimi
... it is FREE. A hash function is an algorithm that transforms (hashes) an arbitrary set of data elements, such as a text file, into a single fixed length value (the ...
View Details
Download
|
![]() |