encryption

  1. Screenshots: An Encryption Method object represents a particular encryption algorithm offered by the library. ... Objects of this type are assigned to the Xceed Encryption control's EncryptionMethod property ... in order to specify the underlying encryption method to use. ... Read more Show more results from this product

  2. Screenshots: The Hashing Method object represents a particular hashing algorithm offered by the library. Objects of this type are assigned to the Xceed Hashing control's HashingMethod property in order to determine the hashing algorithm to use when calling Xceed Hashing control methods that hash data. ... Read more

  3. Screenshots: Encrypting and decrypting entirely in memory requires five steps; Specify the encryption method ... to use; Specify the Secret Key to use; Tell the library to encrypt; Obtain the encrypted data and Make ... Read more

  4. $ | Buy

    Screenshots: 0 ... Read more

  5. $ | Buy

    Screenshots: The manual explains in detail the important points on how to encrypt, and which mistakes to avoid. ... Read more Show more results from this product

  6. Screenshots: The XOR.-Command does far more than XOR and contains parts of the highly optimized encryption ... Read more

  7. Screenshots: and helps you to find out if and how well they might be encrypted. 0 ... Read more

  8. $$$$$ | Buy

    Screenshots: Import an encryption key to use for added security across networks. ... Read more

  9. $$$ | Buy

    Screenshots: Perform AES encryption and decryption on files. ... Read more

  10. $$$$$ | Buy

    Screenshots: SQL Server backups. You can also encrypt your backup files using 128- or 256-bit key Advanced ... Encryption Standard encryption. ... Read more Show more results from this product

  11. Screenshots: the passwords for encrypted backups. Step 2: Specify the database to which you want to restore the backups. Step ... Read more

  12. $$$$ | Buy

    Screenshots: PowerTCP SSH and SFTP for.NET includes encryption/decryption using Triple DES and AES. ... Read more

  13. $ | Buy

    Screenshots: The PDF Secuity tab holds all PDF security settings including file encryption, file permissions ... Read more

  14. $ | Buy

    Screenshots: The PDF Secuity tab holds all PDF security settings including file encryption, file permissions ... Read more

  15. $$ | Buy

    Screenshots: Get aware of waiting blocks due to Network I/O (capture even encrypted data). 0 ... Read more