The UDC

The UDC 2.0.8.4

Program is designed for the password recovery by the hash-value (44 hash-functions included - MD4, MD5, DES, NTLM, GOST, SHA and others) using 5 high-speed attack methods. Distributed bruteforce and multicore attack are supported. The program is...

This is a secret key cryptographic system (or symmetric system). The secret key is communicate to the receiver by the asymmetric system called RSA (public key system). The advantages of the Bercode is very quickly rate of encrypt and decrypt, and the same...

Encrypt/decrypt your files and folders. Keep your documents and files safe when transporting them on portable hard drives, pen drives, zips, and floppies. Easy to use. Uses RC4 128 bit encryption.What is new in this release:This version is the first...

Folder Latch allows you to protect and lock your folder and files from unauthorized users. Tested up to 3.5 GB. Before you use it make sure you have valid permissions to that folder, subfolders and all objects within. Also try it with a test folder first....