|
Excellent computer tool solutions from the best in download catalogs! Explore the popular software apps lists, learn the most recent versions of the asked-for programs apps, and obtain now! Do not toss away an option to setup the best programs: utilise SoftEmpire to test software system for free of charge. Have a look on the website of free utilities and app trials. Choose among computer services programs, download manipulators, games, and all other kinds of utilities for your notebook or digital stuff!
|
CryptIt
|
|
Download
|
Buy now!
|
View screenshots
|
Vendor Price: $ 8
License: Shareware
File Size: 0.04 Mb
Version: 1.4
Release Date:
10 Feb 2008
OS: Windows2000, WinXP, Windows2003, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Ultimate, Windows Vista Home Basic x64, Windows Vista Home Premium x64, Windows Vista Busine
System Requirements:
IE 4.0
Company: ACAPsoft
|
Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption ofthe file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a one-time pad and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly. CryptIt can also has some convenience features such as being able to automatically use pad files generated by our program GigAlarm, generate key files (from a stream cipher and thus not best for OTP usage) and also analyse the suitability of your chosen key file.
CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a word (string), but the advantages of the XOR method are lost then. Descriptions can be stored within the encrypted file, as well as the file name of the code. Command line operation is also supported and CryptIt is written in Assembly Language for maximum efficiency.
|
More to download:
MicroAsm
MicroAsm is Integrated Development Environment for assembly programming. It includes advanced source editor and 8086 assembler.
MicroAsm has a much easier syntax than any of the major assemblers, a great combination for beginners!...
ID_Bank
ID_Bank is a secure identity and password protection manager
ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information in a secure encrypted file.
Text2PDF
Text2PDF is a program to convert plain text file to PDF file, It can be used alone, or you can use it with other applications to convert your documents on the fly...
FairyHand
FairyHand is a Programmable Keystroke Simulator for Microsoft Windows operating systems. It's a new software concept developed by Natasoft. FairyHand can simulate anything you type on the keyboard to perform various tasks automatically. For examp...
AAA HTMLEncryptor
AAA HTML Encryptor can encrypt html web pages and make them unreadable. As a result, the source code of the website was protected from being analysed by hackers or competitors.
I-Cipher AP
I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It proves to be an invaluable tool for image protection against unauthorized use or theft.
Stealth Chat Monitor
Stealth Chat Monitor is an invisible, easy to use surveillance application, designed to monitor and record all chat conversations that took place on a computer.
PDA Forensic Program
PDA surveillance examiner utility displays information like OS registry, version, type, database records, text SMS status, IMEI number, SIM IMSI number and all other data which is saved on your windows based mobile phone like Palm top, smart phone.
Absolute Surveillance System
The program has been created as universal product for surveillance hybrid platforms working all together with wireless and wired Internet webcams, Television-boards, capture cards, power-line, and USB cameras.
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|