/**

popular collection of scripts for all

*/
/** Search */

Encryption Tools

 }

Scramit

Hits: 412
*****
0.0

Advanced Invisible Keylogger

Hits: 387
*****
0.0

SafeBit Disk Encryption

Hits: 68
*****
0.0

CryptoExpert 2007 Professional

Hits: 377
*****
0.0
Encrypt and Decrypt files
Advanced Invisible Keylogger:
SafeBit Disk Encryption
CryptoExpert creates new
using small Drag and Drop
the most powerful stealth
features military strength
virtual hard drives that
Window that can sit on top
spy software offered by
on-the-fly AES encryption,
appears to applications like
of your applications. Keep
ToolAnywhere! Advanced
by creating virtual drives,
any other physical hard
your Private files Private.
Invisible Keylogger runs
where you can hide files and
drive. Any data that the
Program can be kept on your
silently at the lowest level
folders, keep them encrypted
user attempts to write to
USB to open encrypted files
of Windows capturing every
all them time, but still
this drive is intercepted
on your PC at work or files
keystroke typed including
work with these files just
and encrypted by
recieved via email on any PC.
usernames and Windows log-on
like you work with normal
CryptoExpert. Drive is
 
passwords.
files.
invisible without password.


Date: Mar, 17 2007


Date: Mar, 13 2007


Date: Mar, 13 2007


Date: Mar, 11 2007
Easy File Protector a
A programmable
Create, edit, read or email
NCrypt TX is a text based
password protected security
multiple-precision hex
an encrypted/plain text file
cryptographic tool with
utility to restrict access
calculator with many
with this Notepad-like text
Steganography capabilities.
to files and folders by
utilities. With it, you can
editor. Supports 4
Supports DES, Rijndael-AES,
user-defined time schedule.
easily perform a lot of big
encryption/decryption
SHA, and MD5 algorithms.
Files and folders become
number math and encryption
algorithms: BLOWFISH, Triple
Convert your e-mail or other
undeletable, unrenamable,
operations, such as: square
DES(3DES), RIJNDAEL(AES),
messages into a sequence of
unreadable, unmodifiable,
root, modular inverse; hash
XOR. Use it to protect
encrypted hexadecimal or
and unexecutable.
make; primality test; hex,
strictly confidential data,
Base64 characters.
 
dec, oct, bin conversion.
to keep passwords.
 


Date: Mar, 09 2007


Date: Mar, 08 2007


Date: Mar, 07 2007


Date: Mar, 06 2007
{ Copyright } ©2019 NuclearScripts.com