Skip to main content

Home/ Avangate Outsourced E-Commerce Solutions/ Group items matching "Blowfish" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
tech writer

Notrax Secure Internet Browser - 0 views

  •  
    NoTrax is the Anonymous Internet Browser that leaves No Evidence of Internet activity on your Computer. It does not write to the Registry during browser sessions. No more index.dat worries. It does not store any information randomly on your PC, it does not use the Recycle Bin and it does not create any application logs. It erases History files, Cookies and the Cache using secure deletion methods while you browse and upon exit from browser sessions. The Cache is held and erased in memory. It also comes with an Erase Cache button that you can activate at any time during browsing. The Cache is encrypted using Blowfish. NoTrax supports SSL (Secure Socket Layer) and TLS (Transport Layer Security). The root certificates are built-in. NoTrax comes with an automatic shutdown option if idle for a certain amount of time (you decide). NoTrax does not run Spyware, JavaScript or ActiveX.
tech writer

The Cipher - 0 views

  •  
    The program is designed to encrypt and decrypt files. Encryption and decryption of files by the method of GOST, Blowfish, IDEA, Misty1, Rijndael, Twofish, Cast128, Cast256, RC2, RC5, RC6, DES, TEA on password; Encryption and decryption of files by the method of CHR, BIT using the file-key; Select one or more methods of encryption; Creation of a separate encrypted file with the extension. Cip; Complete removal of the source file.
tech writer

The Cipher | familytree - 0 views

  •  
    The program is designed to encrypt and decrypt files. Encryption and decryption of files by the method of GOST, Blowfish, IDEA, Misty1, Rijndael, Twofish, Cast128, Cast256, RC2, RC5, RC6, DES, TEA on password; Encryption and decryption of files by the method of CHR, BIT using the file-key; Select one or more methods of encryption; Creation of a separate encrypted file with the extension. Cip; Complete removal of the source file.
‹ Previous 21 - 28 of 28
Showing 20 items per page