Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
MongoDB Atlas runs apps anywhere
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
platform independent solution to encrypt files on a portable Device. Files will be encrypted with TripleDES and hold in an XML-File. No local Installation needed.
An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
A plattform independent encryption-tool with a simple user interface (swing/java). It uses 'Password Based Encryption' (PBE) to encrypt and/or decrpyt files on the filesystem. Encryted files will also be compressed using the zip-format.
This is an experimental program that encrypt/decrypt/divide/join files. This program uses a new algorithm made by me, this algorithm is experimental and I working on it, every day this algoritm will be better.
A Java program to encrypt files and make them relatively safe for transfers across networks. Currently just in commandline form, but an application is in the works.
Password Keeper:
Password Keeper will be a program that lets you put all of your passwords in one file and encrypt it easily instead of using a flat file.
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
Cryptar is a cryptographic network backup program that is able to be very efficient with network resources by using an algorithm derived from the rsync algorithm. It uses SHA-1 hashes to verify (sign) its data and AES to encrypt it.
Simple XOR Encryption is written in c++ and can encrypt files using insecure XOR encryption.
Could be used to form framework for implementing XOR encryption in other programs, such as encrypting save game files in games, etc.
Tested on Windows + Linux.
Encrypt-roller is a encryption/decryption package. The goal of the project is to incorporate multiple encryption schemes and mechanisms to provide security and validity for files being stored or transferred.
NoFault is a library written in C used to encrypt or decrypt data with XOR encryption. KNoFault, NoFault32 and CLNoFault are direct applications of the library, which is easy to use in your own programs.
SharEncrypt is a file encryption tool for Windows implemented using OpenSSL API. It can easily encrypt files simultaneously for multiple recipients given their
digital certificates.
...Has many features which are non-existant in other OTP programs, and includes 5 programs (plus an uninstaller) which allow the user to create keys, create fake keys, encrypt, and decrypt files.