Software Listing: String Encryption

Flash Secure Optimizer (FSO) is a software that can protect ActionScripts and compress SWF files. Support Flash CS5 and ActionScript 3. Identifier Renaming(Identifier Obfuscation), Strings Encryption, Encrypted Domain Locking, Obscuring ActionScripts. FSO lets you reduce SWF file size by optimizing/compressing most parts of SWF file. FSO provides you a simple custom user interface you have only some clicks to protect/optimize your SWF files.Working with Flash Secure Optimizer (FSO) is very simple. You have just 3 steps:*Adding one or more files to your project.*Selecting identifiers to rename from identifiers list and setting optimization options.

  • Publisher: Eramsoft
  • Date:
  • Size: 1638 KB
  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinVista

SWF Defender is a software that can protect ActionScripts inside the SWF. Support Flash CS5 and ActionScript 3. Obscuring ActionScripts, Strings Encryption, Encrypted Domain Locking. SWF Defender provides you a simple custom user interface you have only some clicks to protect your SWF files.Working with SWF Defender is very simple. You have just 3 steps:*Adding one or more files to your project.*Setting protection options.*Clicking on the Protect All button..

  • Publisher: Eramsoft
  • Date:
  • Size: 1228 KB
  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinVista

Comprehensive code protection:- Symbol obfuscation: Renames symbolic metadata, such as class, field, event, and method names, into meaningless characters. Hash and minimal renaming schemes allow renaming to be optimized for incremental obfuscation or minimal metadata size. - Control flow obfuscation. - String encryption. - Ability to crash ILDASM: Prevents hackers from using the ILDASM tool, and many other tools based on Microsoft's reflection APIs, to analyze and disassemble your code. - Assembly watermarking: Helps prevent unauthorized distribution of your product by embedding registration data into the visible text and internal binary structures of your executable.

  • Platform: Win2000, WinOther

.NET Obfuscator Professional is .NET code protection tool to secure .NET assemblies. Obfuscation significantly aggravates reverse engineering and reduces its effectiveness. Skater .NET Obfuscator is a comprehensive professional solution for .NET application code protection. Skater .Net Obfuscator prevents ILDASM/ILASM (MSIL disassembler and MSIL assembler) circuit clout technique. The breaking technique is based on injecting a piece of code into assembly that leads ILDASM to crash and inability to handle the assembly. Skater .NET Obfuscator reshuffles your .NET assemblies to the new build that is impossible to be understand, and unimaginable to decompile.

  • Publisher: RustemSoft
  • Date: 12-09-2011
  • Size: 2419 KB
  • Platform: WinOther

FS master is the optimum software for data and text security. With this useful software, you can protect all your data from unauthorised access keeping all your files intact. With this software, your privacy is secured. Key features 1) The use of passwords for the protection of data. 2) Comprehensive help file for users. 3) A tutorial centre to help dummies. (Unique) 4) String encryption and decryption. (Unique) 5) A password library serving as a store of passwords to prevent the loss of data. (Unique) 6) Ability to retrieve lost password for encrypted file. 7) Cipher and decipher information stored in a unique document to prevent loss of encrypted data.

  • Platform: WinOther

DeepSea Obfuscator makes obfuscation of your .NET assemblies an intuitive and integrated part of your product development. Integrates seamless in Visual Studio..

  • Platform: WinOther

Orange Heap software is intended for protecting internals of your .NET applications from any unauthorized uses. It features advanced obfuscation techniques such as: name mangling, string encryption, assemblies merging, cross assembly obfuscation and much more. Rich user interface application will make possible to configure every symbols in your aplication if it is necessary and command-line tool will make possible to apply protection in automatic mode..

  • Platform: WinOther

Do you know that it is easy to hack paid apps code from the Windows Store? There are security vulnerabilities on windows 8 XAML-based metro style applications. Distinctly, the problems are fundamental design flaws that allow reveal compiled code of Win8 applications, modification of deployed apps and the negative implications on intellectual property rights protection. There are a lot of freeware .NET tools called .NET assembly browsers that allow pirates to hack Win Store app\'s code.For example, Refractor - .NET decompiler and assembly browser allows pirates to reverse-engineer paid app\'s code.

  • Publisher: RustemSoft
  • Date: 15-01-2013
  • Size: 4734 KB
  • Platform: Windows 7, Windows 8, WinOther, WinVista

Codefort is an intelligent and powerful software protection tool, designed to help .NET and Silverlight programmers to deliver their software securely, without risking exposure of their intellectual property. At the same time, Codefort can perform optimizations on the assemblies to increase the performance of your application.

Codefort has unique protection features that you don't find in any other protection product. In the past, when obfuscating an application that relied on XAML code, you needed to manually exclude the members and types that were referenced by the XAML code.

Codefort introduces XAML and BAML obfuscation, which is able to rename references directly in the XAML and BAML code, thus increasing the percentage of members and types that can be obfuscated to nearly 100%.

  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

DevExtras .NET Obfusasm allows you to protect your assemblies by using a variety of advanced obfuscation techniques and is very easy to integrate into your release process.

The assemblies are obfuscated after compilation as part of the build process so your development process is completely unaffected. Assemblies can be obfuscated either via the GUI or the command line. Give Obfusasm a try to fully assess its capabilities!

Here are some key features of "DevExtras .NET Obfusasm":

Symbol Renaming Obfuscation:
* This is the most basic but effective method of obfuscation.

  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

This application is now freeware for various reasons. I first wrote the core of the Phoenix Protector for a Company when I was 19. That project didn't work out for internal reasons not related to the quality of the product itself. I then wrote the Phoenix Protector, which was basically a new GUI for the now improved core. However, during the years (one has to consider that I was quite young when I developed the .NET Obfuscator) I became ever more conscious that I didn't want to spend My Life writing protections and also that I was not convinced by protections for the .NET technology in the first place.

  • Platform: Win2000, WinOther

The .Net Obfuscator of Choice - Dotfuscator. * ISV's Choice for protecting products from reverse engineering. * Industry's choice to protect proprietary code from internal and external hacking. * Microsoft's Choice to ship inside Visual Studio 2005 in an introductory lite version. For Enterprise Protection Microsoft uses Dotfuscator Professional to obfuscate their own .NET code. *Your choice for unparalleled protection. Key Features Include: Leading .NET Code Security * Namespace/Type/Method/Field renaming using our patented Overload-InductionTM renaming system * Enhanced Overload Induction * Control Flow Obfuscation * Designed to stop even the best of decompilers from producing useful output.

  • Platform: Win2000, Windows Server, WinOther

The Java Obfuscator of Choice - DashO. * ISV's Choice for protecting products from reverse engineering. * Industry's choice to protect proprietary code from internal and external hacking. * Sun's Choice to obfuscate their own Java code. * Your choice for unparalleled protection. Features Include: Leading Java Code Security * Package/Class/Method/Field renaming using patented Overload-Induction(tm) * Advanced Control Flow Obfuscation * String Encryption Java Code Efficiency * Unused Class/Method/Field and constant pool entry removal * Class and method level optimization to improve JIT performance * Dynamically-loaded class (forname) detection Comprehensive and Efficient Java Code Development and Deployment * Support for all JDK (JSE, J2EE, J2ME, etc) versions up to and including 1.

  • Platform: Linux, Mac OS X, Unix, Win2000, Windows Server, WinOther

JBJF Encryption/Decryption Tool is a lightweight and easy to use application designed to help you encrypt text using a key string.

Featuring an intuitive interface, JBJF Encryption/Decryption Tool allows you to set the key string and encrypt any text with just a few clicks.


.

  • Platform: WinOther

This gives you access to unbreakable OTP encryption. You can encrypt to and from files or directly to the clipboard. Paste cipher-text directly into text documents. Generate real random keys with no more than a radio and a sound card. One-Time Pad (OTP) encryption a.k.a. infinite key encryption. OTP encryption is absolutely unbreakable if used correctly. This system is well known and has been used for a long time by various intelligence agencies. Solid Programs LanBuster, Solid Encryption and Truly Random. Shareware for encryption, LAN control, password generation.

  • Platform: Win2000, WinOther

AIEncryptor lets you take instant control of string and file encryption within your .Net applications. With only a single line of code our encryption library lets you safely secure application data such as passwords, serial keys, emails, user reports etc. Developers can choose the level of encryption they require from as little as supplying a Pass Phrase right through to fine tuning the HASH algorithm and Salt Values.

Our encryption component uses only the strongest 256 bit cipher routines (Rijndael) to ensure your data is as safe as possible from hackers. We allow you to choose Pass Phrases and Salt Values constructed from basic strings to foil attempted hacks.

  • Platform: Windows Server, Windows Vista, WinOther

This encryption script make a series of consecutive encryption steps to ensure security. 11 key values are derived from a key sentence and used to hide all possible origin patterns. The encrypted result is a number raw string, which can be decoded for each one who knows the key sentence..

  • Platform: JavaScript, Scripts

Easy and advanced encryption, decryption and hash ActiveX component for ASP or ASP.Net ***Support standard encryption and decryption algorithm like RSA, RC4, DES etc Ultra Crypto Component supports crypto algorihtm with industry strength like RC2, RC4, DES, 3DES, 3DES2, AES128, AES192, AES256. The encryption and decryption algorithm is implemented by underline crypto service providers. So the algorithms supported will be increased as the security requirements advance. ***Support standard hash algorithm like MD5, SHA Ultra Crypto Component also supports the typical hash algorithm like MD2, MD4, MD5, SHA, SHA256, SHA384, SHA512.

  • Platform: Tablets, Win2000, Windows Server, Windows Vista, WinOther

Encryption ActiveX Component (Chilkat Crypt ActiveX) is a useful software component for encrypting and decrypting both strings and binary data. Implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and decryption using digital certificates.

Provides hashing functionality for both strings and binary data using SHA1, SHA384, SHA512, MD2, MD5, and HAVAL. Provides BZIP2 compression for both strings and binary data. Provides digital signature creation and verification. Provides encoding functionality for Base64, quoted-printable, and hex-encoding.

  • Platform: Win2000, WinOther, WinServer

Cryptonomy is an "in place encryption tool", unlike other tools of this type, you do not need to access it once set up other than to enter a key string. It can be used with any text based application able to handle either format and can access clipboard. It can manipulate both RichText Format (RTF) and Unicode/Plain Text making it ideal for use in email or any message sending program. Use it anywhere you want to keep you messages private, on-line or off. Create private message in public places. Use Cryptonomy to keep your email, your notes and your messages private.

Cryptonomy is fully portable and will also work from a USB stick.

  • Platform: Windows 7, WinOther, WinVista

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Avant Browser

There are many browsers available to download on World Wide Web, but more than 90% people use either of Chrome, Firefox or Internet Explorer. Due to this, many people either don’t know about other non-popular browsers or don’t care to ...


Castle Wars

Castle wars is a unique blend of the strategy genre with a small amount of war and micro management elements added in to make it more unique. In castle wars the aim is to eliminate all the other players from the map, and become the only player left ...


Aqua Pearls Game

Aqua Pearls game (or simply aqua pearls) is a free ware downloadable game that has many elements of the classic game zuma. In aqua pearls (and zuma) A variety of coloured balls will slowly work their way around the screen on a predetermined path, as ...


Battle of Britain

Battle of Britain is a top down strategy and shooter game that takes place during the historic battle of Britain, as the name would suggest. The game takes place from a top down perspective, and has a fairly interesting method of control. Instead of ...


Skies of War

Skies of war is a top down plane shooter free ware game which really does reinvent the concept, and add a great deal to it. In skies of war you are a plane tasked with destroying a vast number of bases, enemy units and enemy planes. As you play ...


Vehicles 2

Vehicles 2 is a great example of innovation in a game, from the very beginning cut scene (which explains the general back story to the game in a very light, humorous way) to the gameplay style, it has a lot of influence from other games in the ...


Bank Robber

Bank robber (the bank robber) is essentially a trial game or a demo for the full version of the bank robber, which costs $4.99, and is a third person stealth and strategy game. In the bank robber you play as a criminal having recently being released ...


Natural Voice Text to Speech Reader

NaturalReader is a piece of software which reads aloud written text on screen is a more natural sounding voice than most computerized voices. Free NaturalReader is a free version, where you can type or copy and paste text into the window, to be read ...


SpeedUpMyPC

SpeedUpMyPC is a program which apparently has the capabilities to boost your system performance by resolving computer issues it finds after scanning though your system SpeedUpMyPC is most definitely not the only piece of software that claims to be ...



New Downloads

Database Browser

This Easy to use tool allows
user to connect to any
database and browse or modify
data ,run sql scripts, export
and print ...

Equalizer APO

Equalizer APO is an
open-source parametric
equalizer for Windows.
Compared to similar audio
equalizers, APO is ...

SSuite OmegaOffice HD+

This office suite was created
for the professional and
discerning computer user. The
application interfaces have
been ...

RDS Knight Security
Essentials

RDS-Knight is the right shield
for your windows servers. In
minutes you will prevent
foreigners from opening a
session, ...

Blog Module for Directy CMF

The Blog Module allows you to
manage a simple blog on your
site. It can be used to manage
your personal blog, company
...

Dictionary Wordlist English
Japanese

Bilingual Dictionary Wordlist
for Japanese, Finnish,
Turkish, French, Spanish,
German, Portuguese, English,
Italian, ...

3D Binary Clock Screensaver

3D Binary Clock Screensaver is
a free desktop utilities
software with many
configurable options and
colors, you can also ...

View Free Disk Space

This simple utility designed
to easily and quickly see disk
space usage. This tool will be
especially useful in cases ...

Leawo Blu-ray to MKV
Converter

Leawo Blu-ray to MKV Converter
is a powerful Blu-ray/DVD
ripping tool that is dedicated
to rip Blu-ray/DVD to MKV
videos ...



Related Searches

Delphi String Encryption Password
Fast String Encryption Vbs Vb
Foxpro Dos String Encryption
Microsoft Access String Encryption
Microsoft String Encryption
Simple String Encryption Delphi
String Encryption Classic Asp
String Encryption Download
Qt String Encryption
Delphi Encryption String
Encryption Software String Fortran
Csc String