Software Index
Linux Software Security Tools  

Eureka Public Key

download download home home   report broken
important software information
company name:
Steven Zoch
license: Freeware
minimum requirements: No special requirements.
functional limitations:
Eureka Public Key description
Eureka Public Key was created due to numerous requests for a public key application using our strong encryption techniques. The basic principle for its use is one creates their own public key and distributes the key to whomever they will be transferring encrypted files with.

When one receives a key, they import it into their key database. You can create and import as many keys as you wish. Both public keys are used in the cryption process. You select your particular public key to use and the public key of the person who will receive it.

When a file has been received you put in your public key that matches the one they used and select their public key that was used in the encryption. See the Encryption, Decryption and Import/Export sections for more information on these topics. To create a public key, click on Keys then Create Public Key or click on the gold key icon under the menu items.

All you have to do is define a name for the public key and click on Create. All encrypted files will be written to the Encryptions folder. Likewise, all decrypted files will go to the Decryptions folder. If a file already exists with the same name, it will be overwritten.

Encryption:

To Encrypt a file, click on File then Encrypt.

All you have to do is select Your public key, their public key and click on Encrypt or press enter then select the file you want to process.

The file selected will be encrypted and then placed in your Encryptions folder. Now you can send this file in the manner you prefer.

Note that this application encrypts in a binary format. In other words, it uses the full 256 character set and is not a text file. You will need to send it as an attachment if you are using email to transmit it.

Decryption:

To Decrypt a file, click on File then Decrypt.

All you have to do is select Your public key, their public key then click on Decrypt and select the file you want to process.

The file selected will be decrypted and then placed in your Decryptions folder.. Encryption software and Data Security Solutions for the Internet and business or personal security for Windows, Macintosh, Linux and Mainframes. Where the search for data security on the Internet is found.
Similar software
cosign (Popularity: ) : cosign is a Web single sign on system that allows users to authenticate once per session and access any protected Web resources at the institution. When you use cosign the passwords are sent only to a single, central URL.

Sessions have ...

Sshpass (Popularity: ) : Sshpass project is a tool for non-interactivly performing password authentication with SSH's so called "interactive keyboard password authentication".

Most users should use SSH's more secure public key authentication instead.. Shachar Shemesh - Publisher Page of Sshpass - Downloadplex.com. Publisher of Sshpass, ...

cpdu (Popularity: ) : cpdu is a command-line file encryption tool for Linux/UNIX that allows for storing encrypted files into archives. It uses secure memory allocation and allows for a secure local key file securely stored into your home directory

It has more room for ...

PlexCrypt (Popularity: ) : PlexCrypt is a smart software that protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructure (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, ...
Paperkey (Popularity: ) : Paperkey is a reasonable way to achieve a long term backup of OpenPGP (GnuPG, PGP, etc) keys is to print them out on paper. Due to metadata and redundancy, OpenPGP secret keys are significantly larger than just the "secret bits". ...
seccure (Popularity: ) : seccure toolset implements a selection of asymmetric algorithms based on elliptic curve cryptography (ECC). In particular it offers public key encryption / decryption and signature generation / verification.

ECC schemes offer a much better key size to security ratio than classical ...

J2SSH (Popularity: ) : J2SSH provides a fully-featured Java SSH version 2 API implementation.

J2SSH is an object-orientated Java implementation of the SSH version 2 protocol. It provides a rich, powerful, and extensible SSH API that enables developers to gain access to SSH servers and ...

LSM-PKCS11 (Popularity: ) : LSM-PKCS11 is a project intended to support the implementation of Lite Security Modules. The targets of such implementations are PKIs (Public Keys Infrastructures) for intra-company and network applications, requiring a non-trivial security level but not so 'budgeted' to allow the ...
Distributed RSA Key Generation (Popularity: ) : Distributed RSA Key Generation is a software to generate shared RSA keys. Currently, only keys for two parties using Gilboa's protocol are supported. But the protocol stack is extensible, so in the future there may be other protocols supported.

Work has ...

Eureka Encryption Global Edition (Popularity: ) : Eureka Encryption Global Edition contains file encryption, multiple encryption, merge encryption, multiple file encryption, embedded applications (Crypt Words, Steganographer, Interface) and other tools such as a file shredder and scrambler.

Eureka Encryption Global Edition is available for Windows, Mac and Linux. ...

Email Security through Procmail (Popularity: ) : Email Security through Procmail (the Procmail Sanitizer) provides methods to sanitize email, removing obvious exploit attempts and disabling the channels through which exploits are delivered.

Email Security through Procmail also provides facilities for detecting and blocking Trojan Horse exploits and worms.. ...

Eureka Encryption Global Edition (Popularity: ) : Eureka Encryption Global Edition contains file encryption, multiple encryption, merge encryption, multiple file encryption, embedded applications (Crypt Words, Steganographer, Interface) and other tools such as a file shredder and scrambler.

Eureka Encryption Global Edition is available for Windows, Mac and Linux. ...

User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
Email*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
 
Similar scripts
MSCCrypto (Popularity: ) : MSCCrypto is COM component for Active Server Pages and stand-alone applications. It includes collection of the best encryption and hashing algorithms: - RSA public key algorithm (512/1024/2048 bits key size) - AES symmetric block algorithm (128/192/256 bits key size) - ...
BeeCrypt (Popularity: ) : BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit.It includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
ACProtect standard (Popularity: ) : ACProtect standard is Windows compatible. ACProtect is an application that allows you to protect Windows executable files(PE files) against piracy. Using public key encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked codes. ...
ASPPGP (Popularity: ) : This is a security application and a windows component where the users can encrypt emails, texts and files. The users have the ability to send protected emails with the support of public key. The datas like signatures on the users ...
IP*Works! S/MIME ASP Edition (Popularity: ) : IP*Works! S/MIME implements the S/MIME standard for encryption and decryption using Public Key Cryptography Standards (PKCS). Using IP*Works! S/MIME Edition you can encrypt files, emails, and even newsgroup postings as well as sign and verify message signatures using X.509 digital ...
IP*Works! S/MIME C++ Edition (Popularity: ) : IP*Works! S/MIME implements the S/MIME standard for encryption and decryption using Public Key Cryptography Standards (PKCS). Using IP*Works! S/MIME Edition you can encrypt files, emails, and even newsgroup postings as well as sign and verify message signatures using X.509 digital ...
IP*Works! S/MIME Visual Basic Edition (Popularity: ) : IP*Works! S/MIME implements the S/MIME standard for encryption and decryption using Public Key Cryptography Standards (PKCS). Using IP*Works! S/MIME Edition you can encrypt files, emails, and even newsgroup postings as well as sign and verify message signatures using X.509 digital ...
SecureFX (Popularity: ) : SecureFX is a highly configurable secure file transfer client for SFTP and FTP with advanced features like site synchronization, a scriptable command-line utility for unattended file transfers, and public-key and Kerberos v5 (GSSAPI) authentication.
SSH Factory (Popularity: ) : SSH Factory is a powerful networking tool available with intuitive API to get connected with remote servers. This program consists of several java based client components to help you to communicate with SSH and telnet components with the support of ...
What is new for security in .NET 2.0? (Popularity: ) : The new security components in .NET 2.0 can help you greatly reduce the amount of code you need to write in order to make your applications secure. Security is difficult to get right, and it is a good strategy to ...
Rate me
supported os's
stats
downloads 7
version 1.0.0
size in Kb 2,662
popularity   
993/1272475
user rating 0/10
our rating 0 Stars
share info
Recommend Eureka Public Key
Report spyware
New Software
Popular Software
Latest Reviews