Tools

Softwares 1907 views 25 replies

I will post here softwares or tool or settings etc related to various Tools

Replies (25)

100K Zipper

help to Zip

ATF Cleaner

 

just try it it will clean the ATF

means it cleans the usage data and chache files but do not remove the actual files and data

Berlitz

 

it is a kind of interpretor menas translate the words sentences in to different but limited languages

Driver Backup

sirf nam hi kafi hain

sugestion/addition/alteration are welcomed

 

and this is not the end

I will accumulate few more and post here soon

check new listings soon....

dsCrypt v1.10
Copyright (c)2002-2004 Dariusz Stanislawek


dsCrypt is AES/Rijndael file encryption software with simple, multi-file, drag-and-drop operations. It features optimal implementation, performance and safety measures. dsCrypt uses an advanced encryption algorithm and offers unique options for enhanced security.



FEATURES

- extensively tested and widely accepted algorithm
- BruteHalt and exceptional resistance to brute-force password search
- inherent resistance to brute-force key search
- Secure PassPad and immunity to keylogger-infested environments
- disclosed implementation and source code
- secure use of system resources
- verified data and file processing
- efficient user interface and operation
- speedy performance
- really small executable file
- self-contained and dependency-free
- installation-and-pollution-free
- freeware status and unrestricted distribution



USAGE

Click the "Mode" menu item to select encryption or decryption. Drag-and-drop files from Windows Explorer on dsCrypt's window, or use the "Open" command to browse and select files.



CHANGE LOG

v1.10
- progress indicator
- press Esc to abort processing
- function key "F4 - save the active key in hexadecimal format"
- option "Save and check CRC" (active in v1.00)
- option "Overwrite files"
- option "Reset key after inactivity [min]"
- resets key after changing "Key setup iterations"
- improved PRNG
- updated documentation
- saving options only if changed (incl. the window's position)
- option "Key setup constant [0 - 4294967295]"; used [0] in v1.00

The last option combined with the "Key setup iterations" further enhances security particularly in keylogger-infested environments, provided you preset and save them on a secure system.



SECURITY

Use a difficult, alpha-numerical (including space and special characters), case sensitive password with at least 10 and up to 32 characters. Beware of keyloggers! A verified password is indicated by the yellow background and will be used for all consecutive operations without any prompts unless a decryption fails. Passwords become verified after a successful decryption or entering them twice in the password box. To change your most recently used password, click the "Pass" menu item. The algorithm has not been broken and there are no means of data recovery if you forget a password. Note that due to the nature of the IV-CBC mode of operation, the same data and password will always produce different cipherdata.

dsCrypt overwrites original files, does not create any temporary files, and erases the data and password memory allocation after use, so any possible paging/swap file leftovers are nullified. It does not save your password in any form. Apart from the ".dsc" extension (which can be changed) encrypted files do not contain any dsCrypt specific, recognizable characteristics or data identification. Files have to be decrypted entirely with a provided password and the integrity of the file padding as well as CRC are assessed to ensure a correct conclusion.

As for the algorithm, here is nist.gov info: "NIST is pleased to announce the approval of the Federal Information Processing Standard (FIPS) for the Advanced Encryption Standard, FIPS-197. This standard specifies Rijndael as a FIPS-approved symmetric encryption algorithm that may be used by U.S. Government organizations (and others) to protect sensitive information."



BRUTEHALT

A brute-force dsCrypt password search is going to be very slow; it takes 250ms to setup a single key on P3-650MHz plus more time for decryption, and this delay can be increased as much as necessary. The delay is caused by a huge number of processing iterations needed to generate a key from a password. Since the key depends on the number of iterations, this step can not be bypassed and the delay can only be reduced by optimized code and faster hardware. Brute-force search of the 256-bit key itself is not feasible. It is possible to alter the number of key setup iterations with the "Opt" menu to further increase brute-force password search resistance. Greater values increase the resistance and delay, but when you change it, you will not be able to decrypt files encrypted with a different iteration value. The BruteHalt option forces a potential attacker to try out all possible numbers (aeon wait) if you change the 100000 default.



SECURE PASSPAD

Keyloggers are powerless against dsCrypt's Secure PassPad. It employs a mouse operated, graphical keypad, which directly communicates with the application. Hold Shift and click the "Pass" menu item to try it. Use the "Opt" menu to make it permanent. Unlike the standard password entry methods, Secure PassPad will accept the entire range of available characters and exponentially increase security. Furthermore, a password can also be memorized as a pattern on the grid.



OPTIONS

dsCrypt offers a "Passfile" as an option for defeating keyloggers as well as using the 256-bit key to its fullest capacity. With a Hex editor, create a 32-byte, random binary file with any of the 256 values and encrypt it with a "light", typical password. Start dsCrypt with the Passfile on the command-line or drag-and-drop it on "dscrypt.exe" or its shortcut, and enter the "light" password. Alternatively, hold Ctrl, click the "Pass" menu item and open a Passfile, or again hold Ctrl and drag-and-drop a Passfile on dsCrypt's window. From now on the contents of your Passfile will be used as an ultra-secure password. To break your encrypted files one would need the Passfile and its password. Keyloggers can get only a password, but a Passfile can reside on a floppy, CD, or be hidden within ordinary files.

dsCrypt can automatically use a Passfile attached to the end of other files. You could append it with eg. copy/b to host files like EXE, JPG, WAV, etc. and they will still work as usual.

dsCrypt can generate a random key for a Passfile if you press F6. You should modify it in a Hex editor to randomize it even more, then encrypt and save in a safe place or hide in another file. Note that the encryption step is not an option and dsCrypt will not accept an un-encrypted Passfile.

dsCrypt appends the ".dsc" extension to encrypted files and removes it after decryption. However, you can rename encrypted files to anything you like and the decryption will still function.

Keyboard shortcuts:
Mode - Alt+M or Space
Pass - Alt+P or Enter
Open - Alt+O or Tab
Info - Alt+I or F1
Exit - Alt+F4 or Esc

Function keys:
F1 - help
F2 - check the active key (in hexadecimal format)
F3 - save the active key in binary format
F4 - save the active key in hexadecimal format
F6 - generate a random, binary key
F12 - website



IMPLEMENTATION

Cipher: AES (Rijndael)
Mode: CBC
Key: 256 bit
IV: 16 byte randomized time and system events derivative
Passphrase: max 32 characters
Max File Size: 2GB (theoretically)
Cipher File Structure:
[cipherdata] + [padding <= 16 bytes] + [IV = 4 CRC* + 12 random bytes]
(* - optional)



VERIFICATION

A command-line version of dsCrypt and its source code are available from the website. The version is much faster in processing of large files.



Get updates directly from:
https://www.ozemail.com.au/~nulifetv/freezip/freeware/
...otherwise try:
https://www.ploty.com/freezip/freeware/
https://edxor.tripod.com/fw.htm
https://www.geocities.com/edxor/fw.htm

Some of other products available on this website:

WildCrypt - AES/Rijndael file encryption software. Its crypto-security is enhanced by the exclusion of any means of key or data verification, which could aid a potential attacker. WildCrypt offers many ways of crypto-key definition, camouflage and management. It is really small, fast and pollution-free.

PassPack - secure, streamlined and incredibly compact manager of passwords and confidential information. It features exceptional resistance to brute-force password search attacks. PassPack offers both import and export of unencrypted data.

SureCrypt - ultra small encryption program designed for fast processing of extremely large files. It can encrypt or decrypt files as fast as Windows Explorer can copy them. SureCrypt presents a flexible user interface with detailed record of all operations.



   ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
  °º                                                                º
 °°º dsCrypt is Freeware. Free for private or business use. Free    º
 °°º for distribution and publication, but in unmodified package.   º
 °°º It can be freely bundled with any product or application.      º
 °°º Individual permissions are not required and will not be given. º
 °°º                                                                º
 °°ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
 °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°



DISCLAIMER:
THIS SOFTWARE IS SUPPLIED AS IS. THE AUTHOR DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THE WARRANTIES OF MERCHANTABILITY AND OF FITNESS FOR ANY PURPOSE. THE AUTHOR ASSUMES NO LIABILITY FOR DAMAGES, DIRECT OR CONSEQUENTIAL, WHICH MAY RESULT FROM THE USE OF THIS SOFTWARE.

File Shredder

 

absolute shield file shrader

(see in help menu for details)

Free Calender

 

Free-Cal is for those times when you, just need a calendar. It's small, fast, and is perfect for the quick-launch toolbar. Comments are welcome, but remember, it's just a calendar.

Iridium Global Time Convertor

 

as the name suggests

Magnifying Glass

 

sirf nam hi kafi hain

Screen Keyboard

install it and use it

by the ay in normal cases XP also has the same under accessibility option given under the accessories followed by the start/programme

Show Desktop

Pocket KillBox

 

be the killer by killing the processes unwanted

 

but beware of the law....

MemPad

 

as name suggest

just try it


CCI Pro

Leave a Reply

Your are not logged in . Please login to post replies

Click here to Login / Register