Home > By category > Security & Privacy >Other > Jay's Secure Java Diary



Jay's Secure Java Diary

  • Downloads: 
  • Views: 
  • Rating:

A Secure Diary Program written in Java and using the bouncycastle JCE Cryptograpic library. It uses a combination of BlowFish and TripleDES (XORed) to encrypt Diary entries.

Jay's Secure Java Diary License - GNU General Public License (GPL)

Free download from Shareware Connection - A Secure Diary Program written in Java and using the bouncycastle JCE Cryptograpic library.

Publisher: Securediary | License: Freeware | Price: 0.00
Version: 1.0 | Size: 821 KB | Platform: Linux, Mac OS X, WinOther
Released Date: | Rating: 0 | Title: Jay's Secure Java Diary

Author Url: http://securediary.sourceforge.net
Program Info Url: http://securediary.sourceforge.net
Download Url: http://sourceforge.net/projects/securediary/files/latest/download?source=directory

Jay's Secure Java Diary related downloads:

Java Diary - As its name suggests, Java Diary is a lightweight application written in Java that you can use to create your own diary.

imjay - A Secure Java Instant Messenger - Secure Java Instant Messenger. Supports asymmetric key encryption of messages. will support multiple protocols (Jabber initially) and multiple UIs.

Michael Jay Reichman's App - Michael Jay Reichman's Mortgage Mapp is a complete toolkit of everything you need to know about your next mortgage.  Complete with a full-featured mortgage calculator, daily mortgage rates, real-time news feed with up to the minute mortgage ...

Spanish Verbs 39 - Spanish Verbs 39 is a Java-based test that can be used to out your Spanish knowledge to the test.

openJDiary - Open source java diary tools.

Shareware Connection periodically updates pricing and software information of 'Jay's Secure Java Diary' from company source 'Securediary' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft,  Using 'Jay's Secure Java Diary' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of Jay's Secure Java Diary.

New Reviews

Trend Micro HouseCall - With time, PC users find it increasingly difficult to keep their systems free of malware and rogue apps, despite using latest and feature packed security software. This is mostly owing to the evolving nature of malware and newer types of ...

SlimCleaner - Nearly all PC users need to use various utilities to enhance performance of their laptop or desktop from time to time. Windows inbuilt utilities can serve the purpose but when you can find more capable third party apps at low or zero cost, why ...

SyncMate - Just like windows users, Macintosh users also need to sync their data with myriads of other devices and other Macs. It is possible to use Apple’s much touted iCloud to sync a Mac with other iOS based devices but that may not fit ...

Back4Sure - Given the fact nearly every PC user is dealing with huge amounts of data nowadays it becomes necessary to keep a backup of all such contents. You need to use a suitable app to take backups of all those precious movies, music, personal data, and ...

Cyotek WebCopy - It will be hard to find a computer user nowadays who does not need to access the web. Using web has become near mandatory for various personal and professional reasons. However, not everyone who owns a computer and accesses the web is blessed ...

Any Video Converter Free for Mac - Apple does have some stellar media applications for users of Mac OS but at times, you may feel the need for using third party apps too. Its FCP is regarded as an industry leading and powerful video editor but average Mac users may not need such a ...

Quick Crypt - PC users have become more conscious and careful about privacy of their data these days, especially about the data they need to share with others. There are valid reasons for this trend. Instances of personal information theft and attacking are on ...

MiniTool Partition Wizard Home Edition - It is true that you need a powerful CPU and adequate amounts of RAM to keep your computer running smoothly. However, it is also necessary to ensure that the hard disk remains in top condition. Hard disk needs to be properly optimized and ...

Paint.NET - Nearly every PC user needs to use some type of image editing software nowadays, whether it is for personal or professional reasons. It can be for making minor corrections to your vacation pictures before you share them on social media sites. It ...

Norton Security with Backup - Symantec is an old time player in PC security and its various security suites with Norton brand name are used all over the world. With time, Norton security apps have been tweaked to consume fewer resources and they come with several bells and ...




New Downloads

SpamAssassin in a Box

SpamAssassin in a Box is a
powerful and reliable spam
filter for Windows. Beside the
famous e-mail filter
SpamAssassin, ...

Protected Folder

Protected Folder is designed
to password-protect your
folders and files from being
seen, read or modified.
Whether you ...

NetBull

NetBull is the best and most
undetectable keylogger you can
find on the Net. By using the
latest in PC monitoring ...

Free RAR Password Recovery

Free RAR Password Recovery is
a free tool to recover lost
passwords on RAR (WinRAR)
archives using Bruteforce
attack. ...

dMaintenance

dMaintenance is a tool
designed for fully automated
and optionally invisible
maintenance tasks

Voodoo Shield

Traditional antivirus software
attempts to block the 15,000+
new viruses a day.

Panda Internet Security for
Netbooks

Panda Internet Security for
Netbooks is a professional,
powerful and advanced suite
designed to enable you make
the most ...

abylon SELFCERT

This Tool create self-signed
test certificates (X.509 v3)
for private use. It is very
easy to create and you can
encrypt ...

abylon LOGON

abylon LOGON protects your
computer again illegal access
in a comfortable kind. You
need only to train a smart
card, a ...

Intel Identity Protection
Technology

Intel Identity Protection
Technology enables
administrators to check if the
incoming connection requests
are issued from ...

Cryptosystem ME6

Windows software for
encryption and decryption of
single files or multiple files
in a single operation for
secure storage ...

CyberSentinel

Protect your children, block
pornography, monitor web and
chat room activity.