Sort by: Relevance
Crypt bifrost in Title/Summary
Bifrost is an application development framework promoting good development practices. The backend development is focused on CQRS (Command Query Responsibility Segregation) for promoting Domain Driven Design.
- Publisher: Dolittle
- Last updated: May 8th, 2011
Folder Crypt--encrypts your Windows files or folders using true low level encoding and standard algorithms. Folder Crypt allows you to hide and protect sensible data and documents easily and you can work on an encrypted folder as in a normal Windows folder
- Publisher: LittleLite Software
- Home page: www.littlelite.net
- Last updated: August 30th, 2010
The Crypt Full Version includes ten great levels with more challenging play and fun. The game now has two characters grunts and bosses. The Grunts are the bad “guys” that try to prevent the progress of the user while the Bosses are the end-of-level opponent the user must destroy to finish the level.
Crypt bifrost in Description
SoftCamEditor is a program that allows to edit key files used by emulators of TV crypt systems. This software has a clear and handy interface. It is easy to use, you can do all the operations using only your mouse. There is embedded navigation system – Browser window, where you can look through web pages and download the latest keys.
- Publisher: BitManSoft, Inc.
- Home page: bitmansoft.com
- Last updated: May 9th, 2008
Crypt-o will help you to organize and store securely any kind of valuable information, such as logins, passwords, customers or employees lists, access codes etc. The data is reliably stored in a Firebird SQL Server database and is encrypted using AES encryption algorithm with 256-bit key. Crypt-o client applications access the Crypt-o Server using secure TLS connection.
- Publisher: Soft-o
- Home page: www.soft-o.com
- Last updated: March 19th, 2015
Crypt Removal Tool is a program that effectively removes Crypt files and registry keys. One clue that your computer may be infected is that you are getting a high amount of pop-ups and/or error messages. You should install this utility and start scanning. It will kill the core of Crypt and not only symptoms.
- Publisher: Security Stronghold
- Last updated: October 15th, 2011
The heavy-duty blowfish algorithm powers this encryption application. Within minutes you will be able to encrypt and hide your sensitive files; no more worrying about those "prying eyes".
The user interface is intuitive and "explorer like" enabling even the novice user to immediately understand and utilize all the functions of the application.
The Crypt 1.2 is a first-person shooter game for windows. The game features one demo level with more challenging play and fun. There are two characters: grunts and bosses. The Grunts are the bad people that try to prevent the user from progressing through the level while the Bosses are the end-of-level opponent the user must destroy to finish the level.
Additional Crypt bifrost selection
AES Crypt is a file encryption program that use the standard Advanced Encryption Standard (AES). After installing the application, you can encrypt/decrypt a file by simply right clicking on it, and selecting "AES Encrypt/Decrypt", and entering the required password.
- Publisher: Packetizer, Inc.
- Home page: www.aescrypt.com
- Last updated: August 28th, 2015
Chilkat Encryption ActiveX is a program that provides symmetric encryption: AES, Blowfish, Twofish, RC2, ARC4, DES, 3DES, PBES1, PBES2. It allows you to create and verify DSA signatures, generate DSA keys based on parameters created by OpenSSL and set public key explicitly from P, Q, G, and Y values.
This program is one of the most powerful freeware word processors. It is a nice replacement for the standard Windows NotePad and WordPad. Crypt Edit requires Windows 95 OSR2, Windows 98/2000, or Windows NT 4.0 or later to run. No additional DLLs or whatever are required. It can easily create, protect, modify, post, and print your documents.
- Publisher: PolySoft Solutions
- Home page: cryptedit.chat.ru
- Last updated: March 30th, 2008
Most data protection measures are designed to protect against threats from outside the organization, while most in-house risks are usually overlooked or ignored. However, the potential damage caused by the misuse of confidential company data is exactly the same no matter where the threat originates.
- Publisher: Sophos
- Home page: www.sophos.com
- Last updated: November 18th, 2013
This is a very simple application that encrypts or encodes a string of characters. Type or paste the string, choose the encryption/encoding method, click Encode and you're done. It supports a lot of formats (SHA,MD,CRC32,UNIX encryption format, etc.).
- Publisher: Cédric Belin
- Last updated: May 20th, 2011
Open-Crypt is an application that allows you to hash, encrypt, and decrypt a list of directories or files. The user can drag and drop or choose via a browser which files or folders he needs to crypt. The selection allows for MD5, SHA1, SHA128, SHA256, SHA512 hashing which is saved in a CSV file and for AES encryption based on the user's keyed-in phrase.
- Publisher: mPulis Software
- Home page: code.google.com
- Last updated: September 7th, 2010
Password Crypt Professional 2004 is a password manager the aim of which is to help you keep your passwords and other critical information - such as your credit card and social security numbers - secure and encrypted, so that nobody else can access them. It achieves that by encrypting files that you can create from the program itself, to which it also assigns a user name and password.
The maps look like a simple grid, or spreadsheet. You start out with a blank slate of columns and rows (which you can add or subtract). You create the map by assigning plot locations to cells on the grid. This then communicates with your database to color-code the map according to the status of the owner/resident of the plot. Feel free to try to create your own map.
- Publisher: TBGTOM
- Home page: ck.tbgtom.com
- Last updated: April 27th, 2012
You may also see the name of your USB device as pop-up field when plugging the token into one of your USB ports. Please note that we currently do not recommend using the generic Microsoft CCID drivers, as USB token devices may still malfunction independently of the hardware vendor.
GSKit Crypt install package is required for low level encryption support.
To set up GSKit to support Certificate Management Services (CMS) key databases using the iKeyman GUI, complete the following procedure before starting the GUI:
1. Ensure that you have installed GSKit version 8.
2. Set JAVA_HOME to point to the java subdirectory of the Tivoli® Directory Server installation directory.