Categories
|
Audio & Multimedia
Audio Encoders/Decoders, Audio File Players, Audio File Recorders, CD Burners, CD Players, Multimedia Creation Tools, Music Composers, Other, Presentation Tools, Rippers & Converters, Speech, Video Tools Business
Accounting & Finance, Calculators & Converters, Databases & Tools, Helpdesk & Remote PC, Inventory & Barcoding, Investment Tools, Math & Scientific Tools, Office Suites & Tools, Other, PIMS & Calendars, Project Management, Vertical Market Apps Communications
Chat & Instant Messaging, Dial Up & Connection Tools, E-Mail Clients, E-Mail List Management, Fax Tools, Newsgroup Clients, Other Comms Tools, Other E-Mail Tools, Pager Tools, Telephony, Web/Video Cams Desktop
Clocks & Alarms, Cursors & Fonts, Icons, Other, Screen Savers: Art, Screen Savers: Cartoons, Screen Savers: Nature, Screen Savers: Other, Screen Savers: People, Screen Savers: Science, Screen Savers: Seasonal, Screen Savers: Vehicles, Themes & Wallpaper Development
Active X, Basic, VB, VB DotNet, C / C++ / C#, Compilers & Interpreters, Components & Libraries, Debugging, Delphi, Help Tools, Install & Setup, Management & Distribution, Other, Source Editors Education
Computer, Dictionaries, Geography, Kids, Languages, Mathematics, Other, Reference Tools, Science, Teaching & Training Tools Games & Entertainment
Action, Adventure & Roleplay, Arcade, Board, Card, Casino & Gambling, Kids, Online Gaming, Other, Puzzle & Word Games, Simulation, Sports, Strategy & War Games, Tools & Editors Graphic Apps
Animation Tools, CAD, Converters & Optimizers, Editors, Font Tools, Gallery & Cataloging Tools, Icon Tools, Other, Screen Capture, Viewers Home & Hobby
Astrology/Biorhythms/Mystic, Astronomy, Cataloging, Food & Drink, Genealogy, Health & Nutrition, Other, Personal Finance, Personal Interest, Recreation, Religion Network & Internet
Ad Blockers, Browser Tools, Browsers, Download Managers, File Sharing/Peer to Peer, FTP Clients, Network Monitoring, Other, Remote Computing, Search/Lookup Tools, Terminal & Telnet Clients, Timers & Time Synch, Trace & Ping Tools Security & Privacy
Access Control, Anti-Spam & Anti-Spy Tools, Anti-Virus Tools, Covert Surveillance, Encryption Tools, Other, Password Managers Servers
Firewall & Proxy Servers, FTP Servers, Mail Servers, News Servers, Other Server Applications, Telnet Servers, Web Servers System Utilities
Automation Tools, Backup & Restore, Benchmarking, Clipboard Tools, File & Disk Management, File Compression, Launchers & Task Managers, Other, Printer, Registry Tools, Shell Tools, System Maintenance, Text/Document Editors Web Development
ASP & PHP, E-Commerce, Flash Tools, HTML Tools, Java & JavaScript, Log Analysers, Other, Site Administration, Wizards & Components, XML/CSS Tools |
|
Cryptosystem ME6 9.92
|
Hermetic Systems
|
|
Description:Cryptosystem ME6 is a Windows program which uses a symmetric key encryption system to encrypt information in either a single file or in multiple files (at once) so that it cannot be read by those not knowing the key. Data is encrypted using a key which is from 16 to 64 characters long, and which can be either a phrase or a sequence of 64 random bytes (the software provides a way for you to generate such random keys). Without the key the encrypted data is unintelligible and the information cannot be read. If your files are encrypted using ME6 then you can sleep easily at night knowing that even if they are stolen the thief will obtain no information. The size, the type and the number of files which can be encrypted in a single operation is limited only by disk space.
You can select a single file to be encrypted (or decrypted) by means of the usual Windows file selection dialog box. Multiple files can be selected by using wildcards, e.g., *.txt to encrypt all files with txt suffix. You also specify whether you want to overwrite the original files with their encrypted (or decrypted) versions or to produce encrypted (or decrypted) files with different names. Files are normally compressed before encryption (which also makes cryptanalysis more difficult).
There are various options at the main menu which allow you to customize the operation of the program. For example, you can request the program to operate on files not only in a specified folder but also in all lower folders (this is useful for encrypting an entire project which has files in subfolders).
After you have specified the conditions of the encryption or decryption operation and instructed the program to perform the operation the conditions are checked and any errors or exceptional conditions (such as the non-existence of the specified input files or lack of space on the output disk) are reported.
|

|
encryption, secure, storage, security, encipherment, software, cryptography, file, data |
|
|