ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 3 Next » Displayed: 1 - 25 of 72
Sort by:  relevance | title | downloads | rating | date
VSCryptoHash 64-bit
VSCryptoHash 64-bit 2.5.3.509   
VSCryptoHash 64-bit is cryptographic hash calculation software. Simply drag and drop files ... file control sums. VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 ...
Freeware

iSeePassword - iTunes Password Recovery V2.1.3.0 screenshot
iSeePassword - iTunes Password Recovery V2.1.3.0 2.1.3.0   
... advantage of the advances in cryptanalysis to render cryptographic algorithms insecure. Brute force attack on cryptographic algorithm makes it extremely easy and safe to ...
Shareware | $39.95

Session
Session 1.17.14   
... voice calls, and file transfers. By using advanced cryptographic protocols, Session guarantees that your conversations remain confidential and protected from eavesdropping. Session also eliminates the need for phone numbers ...
Open Source

JFTP x64
JFTP x64 5.0.1 B20120623   
... SSL 3.0 and TLS 1.0 · Supports several cryptographic algorithms such as RSA, RC4, DES, Triple DES, Diffie-Hellman and DSA · Support for both Explicit and Implicit SSL connections · ...
Freeware

Avast Decryption Tool for Legion Ransomware
Avast Decryption Tool for Legion Ransomware 1.0.0.823   
... algorithms employed by Legion Ransomware. By leveraging advanced cryptographic techniques, it can decrypt a wide range of file types, ensuring that your documents, images, videos, and other critical data are ...
Freeware

Afick
Afick 3.8.1   
... concern for Afick. It includes features such as cryptographic checksums to ensure the integrity of the monitored files and directories. Additionally, it can be configured to send alerts via email ...
Open Source

JAP/JonDo
JAP/JonDo 00.20.001   
... cascade in detail, and verifies this information by cryptographic means. The users are thus able to selectively choose trustable mix cascades. Outages and maintenance times We cannot guarantee ...
Freeware

BizCrypto for BizTalk Server
BizCrypto for BizTalk Server 14   
... PDF, XML, ZIP pipelines let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP and POP3 adapters and MIME ...
Shareware | $1 066.00

BizCrypto for SQL Server
BizCrypto for SQL Server 14   
... PKI, PDF, XML tasks let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP, POP3 tasks and MIME task ...
Shareware | $1 066.00

xCELLencrypt screenshot
xCELLencrypt 4.2   
... encryption standard (AES) 256 bit encryption via Microsoft's cryptographic service provider (CryptoAPI). Users may elect to encrypt with a password or through the use of a key file. xCELLencrypt is ...
Shareware | $9.99

Devart SecureBridge
Devart SecureBridge 11.0.1   
... TCP traffic using SSH or SSL protocols and Cryptographic Message Syntax that provide authentication for client and server, strong data encryption, and data integrity verification. Its components can be used ...
Shareware | $99.95

DevToys
DevToys 1.0.13.0   
... toolkit includes utilities for generating secure passwords, calculating cryptographic hashes (MD5, SHA-1, SHA-256), and even encoding and decoding JWT tokens. These tools help developers implement and maintain high security standards ...
Open Source

Age of Empires III
Age of Empires III 1.2.1   
... use without compromising on security. It employs contemporary cryptographic techniques to ensure data confidentiality and integrity, making ... features of Age is its use of modern cryptographic primitives. It leverages the X25519 elliptic curve for ...
Open Source

Syncthing
Syncthing 2.0.15   
... encrypted using TLS, and the software uses strong cryptographic protocols to ensure that your data remains secure during transit. Additionally, since Syncthing is open-source, its code is transparent and can ...
Open Source

Appnimi MD2 Decrypter
Appnimi MD2 Decrypter 1.0   
... is FREE. The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.[2] The algorithm is optimized for 8-bit computers. MD2 is specified in RFC 1319. ...
Freeware

BestSync Portable x64
BestSync Portable x64 2024 (19.0.1.5)   
... a folder with a ZIP file, support AES cryptographic algorithm to protect the zip file with password. Synchronize Outlook (mail, contact, etc) and Windows Mail between PCs by utilizing USB ...
Trialware | $19.95

Zero Install Portable
Zero Install Portable 2.28.3   
... where Zero Install Portable excels. The software uses cryptographic signatures to verify the integrity and authenticity of applications before they are run. This ensures that users are protected from malicious ...
Open Source

SQLCipher
SQLCipher 4.13.0   
... new vulnerabilities and incorporate the latest advancements in cryptographic techniques. In summary, SQLCipher by ZETETIC LLC is an exceptional solution for developers seeking to implement robust, full-database encryption with ...
Freeware | $499.00

XolidoSign
XolidoSign 2.2.1.60   
... supports various signature methods, including digital certificates and cryptographic tokens, allowing users to choose the most suitable option for their security needs. This flexibility makes it an ideal solution for ...
Freeware

Ricochet Refresh
Ricochet Refresh 3.0.40   
... security patches and improvements, and it employs advanced cryptographic techniques to safeguard user data. Additionally, the decentralized nature of the platform means that there is no central point of failure, ...
Open Source

WickrMe
WickrMe 6.54.55   
... is bolstered by the app's use of advanced cryptographic protocols, which are regularly audited by third-party security experts. WickrMe also offers a self-destructing message feature, giving users control over ...
Trialware

Inky
Inky 4.1.0 (1.4.6)   
... spear phishing. Inky assigns each employee a unique cryptographic key, and that key is only ever provisioned into that employee’s physical devices. So Inky makes impersonation and forgery impossible. ...
Freeware

Ajax Minifier
Ajax Minifier 5.14   
... you will need to provide your own AjaxMin.snk cryptographic key-pair to sign the assemblies or you will get a build error. The Ajax Minifier project does not accept external ...
Open Source

wodSSH
wodSSH 3.1.1   
... low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH is easily - just put it on your form, set Protocol type and issue ...
Shareware | $189.00

PELock
PELock 2.08   
... of original file, encryption of code (publicly available cryptographic algorithms and algorithms build polymorphic ally) , reorganization of basic PE EXE structures in order to assure better ratio during compression, ...
Demo | $499.00
Results Page: 1 2 3 Next » Displayed: 1 - 25 of 72
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags