Software Index
Linux Software Security Tools  

Eureka Public Key

download download home home   report broken
important software information
company name:
Steven Zoch
license: Freeware
minimum requirements: No special requirements.
functional limitations:
Eureka Public Key description


Eureka Public Key was created due to numerous requests for a public key application using our strong encryption techniques. The basic principle for its use is one creates their own public key and distributes the key to whomever they will be transferring encrypted files with.

When one receives a key, they import it into their key database. You can create and import as many keys as you wish. Both public keys are used in the cryption process. You select your particular public key to use and the public key of the person who will receive it.

When a file has been received you put in your public key that matches the one they used and select their public key that was used in the encryption. See the Encryption, Decryption and Import/Export sections for more information on these topics. To create a public key, click on Keys then Create Public Key or click on the gold key icon under the menu items.

All you have to do is define a name for the public key and click on Create. All encrypted files will be written to the Encryptions folder. Likewise, all decrypted files will go to the Decryptions folder. If a file already exists with the same name, it will be overwritten.

Encryption:

To Encrypt a file, click on File then Encrypt.

All you have to do is select Your public key, their public key and click on Encrypt or press enter then select the file you want to process.

The file selected will be encrypted and then placed in your Encryptions folder. Now you can send this file in the manner you prefer.

Note that this application encrypts in a binary format. In other words, it uses the full 256 character set and is not a text file. You will need to send it as an attachment if you are using email to transmit it.

Decryption:

To Decrypt a file, click on File then Decrypt.

All you have to do is select Your public key, their public key then click on Decrypt and select the file you want to process.

The file selected will be decrypted and then placed in your Decryptions folder.. Encryption software and Data Security Solutions for the Internet and business or personal security for Windows, Macintosh, Linux and Mainframes. Where the search for data security on the Internet is found.



Similar software
cosign (Popularity: ) : cosign is a Web single sign on system that allows users to authenticate once per session and access any protected Web resources at the institution. When you use cosign the passwords are sent only to a single, central URL.

Sessions have ...

Sshpass (Popularity: ) : Sshpass project is a tool for non-interactivly performing password authentication with SSH's so called "interactive keyboard password authentication".

Most users should use SSH's more secure public key authentication instead.. Shachar Shemesh - Publisher Page of Sshpass - Downloadplex.com. Publisher of Sshpass, ...

cpdu (Popularity: ) : cpdu is a command-line file encryption tool for Linux/UNIX that allows for storing encrypted files into archives. It uses secure memory allocation and allows for a secure local key file securely stored into your home directory

It has more room for ...

PlexCrypt (Popularity: ) : PlexCrypt is a smart software that protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructure (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, ...
Paperkey (Popularity: ) : Paperkey is a reasonable way to achieve a long term backup of OpenPGP (GnuPG, PGP, etc) keys is to print them out on paper. Due to metadata and redundancy, OpenPGP secret keys are significantly larger than just the "secret bits". ...
seccure (Popularity: ) : seccure toolset implements a selection of asymmetric algorithms based on elliptic curve cryptography (ECC). In particular it offers public key encryption / decryption and signature generation / verification.

ECC schemes offer a much better key size to security ratio than classical ...

J2SSH (Popularity: ) : J2SSH provides a fully-featured Java SSH version 2 API implementation.

J2SSH is an object-orientated Java implementation of the SSH version 2 protocol. It provides a rich, powerful, and extensible SSH API that enables developers to gain access to SSH servers and ...

LSM-PKCS11 (Popularity: ) : LSM-PKCS11 is a project intended to support the implementation of Lite Security Modules. The targets of such implementations are PKIs (Public Keys Infrastructures) for intra-company and network applications, requiring a non-trivial security level but not so 'budgeted' to allow the ...
Distributed RSA Key Generation (Popularity: ) : Distributed RSA Key Generation is a software to generate shared RSA keys. Currently, only keys for two parties using Gilboa's protocol are supported. But the protocol stack is extensible, so in the future there may be other protocols supported.

Work has ...

Eureka Encryption Global Edition (Popularity: ) : Eureka Encryption Global Edition contains file encryption, multiple encryption, merge encryption, multiple file encryption, embedded applications (Crypt Words, Steganographer, Interface) and other tools such as a file shredder and scrambler.

Eureka Encryption Global Edition is available for Windows, Mac and Linux. ...

Email Security through Procmail (Popularity: ) : Email Security through Procmail (the Procmail Sanitizer) provides methods to sanitize email, removing obvious exploit attempts and disabling the channels through which exploits are delivered.

Email Security through Procmail also provides facilities for detecting and blocking Trojan Horse exploits and worms.. ...

Eureka Encryption Global Edition (Popularity: ) : Eureka Encryption Global Edition contains file encryption, multiple encryption, merge encryption, multiple file encryption, embedded applications (Crypt Words, Steganographer, Interface) and other tools such as a file shredder and scrambler.

Eureka Encryption Global Edition is available for Windows, Mac and Linux. ...

User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
Email*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
 
AD


Rate me
supported os's
stats
downloads 7
version 1.0.0
size in Kb 2,662
popularity   
975/1272475
user rating 0/10
our rating 0 Stars
share info
Recommend Eureka Public Key
Report spyware
New Software
Popular Software
Latest Reviews