|
|
|
Iside 3.2.1045 - Author Info Page
Description: Iside is a message digest computing and displaying tool (MD5,SHA1, CRC32,...).. (more)
|
Author Info for Iside 3.2.1045
Author/Company Name: LittleLite Software
Country: Italy
Web Site: http://www.littlelite.net/
Programs listed: 5
|
Other listings by this author |
Paloma 1.4.5012 (Downloads: 477)
Paloma, the password repository, provides rock solid passwords protection. Paloma, the password repository, provides rock solid passwords protection with no underground unknown processes and absolutely no interference with other programs. Easy to use with its "bookmarks like" tree passwords organization. The password database can be encrypted choosing between:
* DES (64 bit)
* Triple DES (128 bit)
* AES-Rijndael (up to 256 bit)
* Blowfish (up to 448 bit)
* ArcFour (up to 2048 bit)
...
|
NCrypt TX 2.3 (Downloads: 378)
Text based encryption tool with Steganography capabilities This text based encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications. NCrypt TX also has Steganography capabilities to hide a document inside a random generated text. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With NCrypt TX you can convert your text messages into a sequence of encrypted hexadecimal or Base64 characters....
|
LLMd5Sum 1.3 (Downloads: 253)
A simple md5sum generator with SHA1 and MD5 support. LittleLite LLMd5Sum is a simple md5sum generator with SHA1 and MD5 support....
|
LLCryptoLib 2.0.1024 (Downloads: 411)
LLCryptoLib provides methods for object-oriented cryptography software LLCryptoLib is a .NET library which allows programmers to easily add encryption, integrity and authentication services to their software. It is compatible with MS .NET and Novell Mono environments. It also provides shredding methods.
It offers both asymmetrical and symmetrical encryption classes and hashing functions for text and binary files plus full shredding capabilities. It also offers methods for digital certificates and public key management. It ...
|
|
|
|
|