Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows 2012 SHA1 Hash: 4d5c52617e6eec6269fdd48a912ff8115219ea4f Size: 6.29 MB File Format: exe
Rating: 1.956521739
out of 5
based on 23 user ratings
Publisher Website: External Link Downloads: 430 License: Demo / Trial Version
wodCrypt is a demo software by WeOnlyDo Software and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows 2012.
You can download wodCrypt which is 6.29 MB in size and belongs to the software category Components Libraries. wodCrypt was released on 2016-02-13 and last updated on our database on 2017-04-12 and is currently at version 2.2.
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
wodCrypt Description
Cyber security is of utmost importance when it comes to any kind of data, given the high levels of threats, especially online. One method in particular is to make sure sensible data becomes difficult to understand, and this is done through encryption. For this particular purpose, wodCrypt provides a set of components and libraries to include in custom applications to make encryption available to the end user.
Fortunately, components are not dedicated to a single programming language. Target programs can be composed with ASP, BCB, C#, Delphi, VB, VBS, and VC. There are also several sample source files to load in a supported editor to get a better preview of what can be accomplished.
Once injected into a project, encryption becomes available with one of various algorithms like AES, DES, TripleDES, Blowfish, Cast, RC2, RC4, and RC5. However, it also becomes possible to perform symmetric encryption and decryption, with this operation using either an RSA or DSA algorithm.
One of the main traits is the use of BLOB methods to store target information. This is especially useful for properly handling large quantities of data, but it also enhances use of different parameters. In other words, Input and output items are kept of the same type, whether they’re files, byte arrays, or string variables. As such, info becomes readable either under Base64, or HEX code.
However, implementation doesn’t necessarily have to mean working with BLOB collections. Standard encryption/decryption methods can be used as well, but encrypted information is slightly vulnerable to hack attempts, since a common pattern is automatically created upon encryption, so that decryption can easily follow through.System requirementsVB
VC
Delphi
VBS
ASP
Limitations in the unregistered version30 days trial
Where to buy?
Last updated price and discount information 7 years agoupdate now