Software Index
Linux Software Security Tools  

twofish

download download home home   report broken
important software information
company name:
Renci
license: Freeware
minimum requirements: No special requirements.
functional limitations:
twofish description


twofish is a secure command line encryption tool that allows ZLIB compression, base64 encoding and variable size keyfiles.

Its nicely written and there is room for improvements.

I have written other file encryption programs pretty much just like this one but this one is the best one i have written. Its not the well written probably but i like it.. Applications for your KDE-Desktop - KDE-Apps.org. Applications for your KDE-Desktop - KDE-Apps.org Community Portal for KDE Applications Software Office Multimedia Graphic Network Printing Education Games Development Administration Scientific Security Utilities Screensaver News Forum GUI Polls Links Downloads QT Look X11 Linux



Similar software
Ruby Crypt (Popularity: ) : Ruby Crypt library is a pure-ruby implementation of a number of popular encryption algorithms. Block cyphers currently available include Blowfish, GOST, IDEA, and Rijndael (AES). Cypher Block Chaining (CBC) has been implemented. Twofish, Serpent, and CAST256 are planned for release ...
PlexCrypt (Popularity: ) : PlexCrypt is a smart software that protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructure (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, ...
Gringotts (Popularity: ) : Gringotts is a small utility that allows you to jot down sensitive data (passwords, PINs, small files, etc.) in an easy-to-read, easy-to-access, and most of all very secure form.

It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, ...

TrueCrypt for Linux (Popularity: ) : TrueCrypt is free open-source disk encryption software.

Here are some key features of "TrueCrypt":

· Creates a virtual encrypted disk within a file and mounts it as a real disk.
· Encrypts an entire hard disk partition or a storage device such as ...

The Blowfish cipher (Popularity: ) : The Blowfish cipher in C and i386 assembler.

In cryptography, Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. While no effective cryptanalysis of Blowfish ...

tarmill (Popularity: ) : tarmill project is a tar file compression/encryption program.

This is a program to compress and encrypt tar archives. Each archive member is handled separately, so damage in the middle of the archive does not render the rest of the archive unusable ...

Tiger Envelopes (Popularity: ) : Tiger Envelopes is an easy way to get your email privacy back.

With Tiger Envelopes you use email just like you always have with everyone. And, without you doing anything, your messages are private with people who use envelopes.

The mission of ...

User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
Email*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
 
AD


Rate me
supported os's
stats
downloads 16
version 1.0
size in Kb 440
popularity   
836/1272475
user rating 0/10
our rating 0 Stars
share info
Recommend twofish
Report spyware
New Software
Popular Software
Latest Reviews