XorIt Icon

XorIt Full Description

Extremely compact and simple Assembly Language XOR encrypter

Full Description

Publisher:
ACAPsoft
Version:
1.1
Released:
20, December 2007
License:
Shareware
Size:
33 Kb
Price:
$8 to buy
Rating:
1
10

0

Product Info

Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) XorIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a "one-time pad" and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly. XorIt is written in Assembly Language for maximum efficiency. XorIt is a simplified version of our program CryptIt.

What's new in current version
Internal revision, speed improvements, and interface changes.

Please contact XorIt publisher, ACAPsoft if you have questions or issues regarding this product.
Awful
Poor
Average
Good
Excelent
 
Share XorIt Review, Assembly Language XOR File encrypter Page  Share
Page URL: 
Using a crack or a pirated serial or key generator to activate XorIt full version without buying a license key is against the law.

Exclusive Giveaway for Softarea51.com users
Featured downloads
Firefox Review The award-winning Firefox Web browser has security, speed and new features that will change the way you use the Web. Don t settle for anything less
AVG AntiVirus FREE Review AVG AntiVirus FREE 2013 provides advanced protection for web surfing, emailing, and social networking. And it's packed with features, too: AVG Do Not Track, LinkScanner, Anti-Spyware, and free 24/7 phone support for the USA, UK, Ireland, and Canada.
Google Talk Review Google Talk is a simple and free way to talk with and send instant messages to your friends.
Related downloads
XorIt XorIt
XorIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted for maximum security.
CryptIt CryptIt
CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book.
CryptIt CryptIt
CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book.
Chop Chop
Program for splitting large files for easier distribution with CRC, CL access and simple Encryption. Files can be split by either the number of files that you want, the maximum file size, or you can use preset common sizes for floppies, CDs, etc...
iTimeSync iTimeSync
iTimeSync synchronizes your computer clock with an internet time server. It supports both TIME (RFC-868) and the SNTP (RFC-2030), as a client and server, and it can run as a Windows Service.
TwinSeek TwinSeek
TwinSeek will speed sorting significantly by comparing all the files in a directory, and will then show what ones are 95% similar. TwinSeek can also used to provide a detailed comparison of the differences between two files.
GigAlarm GigAlarm
GigAlarm is an alarm program, capable of thousands of different alarms. The alarm can be either a wave file playing, a program/file running, changing the background wallpaper, a window, shutdown or hibernation resume.
TomeBase TomeBase
TomeBase is a compact Book and Movie database written in Assembly language, making it an extremely small and efficient package. (TomeBase installed takes up less than 100KB.) There are 19 data fields and search plus CSV file Exporting is supported.
jFolder jFolder
This assembly langage program allows Windows 2K/XP users to customize the appearance of folders. You can choose the icon and tool tip of any folder, giving the same effect (if desired) of system folders like the Recycle Bin or "My Documents".
Related Press Releases
LetEncrypt - Encrypt your text file with unlimited ways!
Encrypt your text files with unlimited high levels ofencryption algorithms.- LetEncrypt shows you the level of encryption through a security meter.- Encrypt your text file by using unlimited ways.- Import/Export your encryption settings.- 2 main systems of encryption, ASCII and Numeric encryption.Homepage:http:// www.infradrive.com/letencrypt. phpDownload:http://www.infr...
Swap it! Encrypt it! - The Internet's Newest File Transfer Company
The recently launched Swap it! Encrypt it! file transfer service offers users an inexpensive, no membership way to send large files, and Swap it! Encrypt it! Lite is a great way to send small files (up to 25MB) for free! March 23, 2009 Swap it! Encrypt it!, the internet's newest file transfer company, delivers users an unparalleled file transfer service at prices so low it...
Encrypt Fox v1.00 - Security & Privacy::Encryption Tools Software
EncryptFox.com Inc. announced Encrypt Fox. Encrypt Fox software converts YOUR USB flash drive into your personal vault and the key to access and LOCK your private files. EncryptFox software is the most advanced portable security application available on the market today. EncryptFox turns your in-hand serial numbered USB flash drive into an encrypted vault. Encrypt Fox gives you the ability...
Encrypt PDF Program v2.3.8.2 - Security & Privacy::Encryption Tools Software
PDF Encrypt has announced Encrypt PDF Program. Encrypt PDF program support two passwords apply to PDF. The first is the user password to restrict open a PDF file. The second is owner password to disable all restriction of PDF file such as copy, edit, form fill, modify, content, comment, signing, extract, annotations, assemble, content for accessibility. PDF prevents unauthorized distribution...
New Folder Vault(r) 2 Portable - Hide Lock Encrypt Folder(s) File(s)
What 's New In Folder Vault 2.0 :* Added the ability for securing data in the vault folder on portable removablemedia; ie USB Flash Drives etc.* Decreased the setup file size from 6MB to 2MB.* Added the ability to change the Stealth Mode hotkey keyboard combination.* Added Explorer Context Menu 's (Right-Click) to easily lock a file, folder or drive.* Improved the overall speed...
File Security Manager 1
On March 20, 2006 UNGSoft Developers Group releases new versionof File Security Manager - unique and useful program makes NTFS security availablein Windows XP Home. With File Security Manager today every Windows XP Home user canget permissions editor like Win XP Pro provides. The program can work with userrights, ownership, effective permissions and has even more power features: SecurityWizard,...
Related software and technology conferences
Data Visualization for Discovery and Analysis: Simple Graphing Techniques for Analyzing Quantitative Business Data
Probably as much as 90% of all Business data analysis can be done using simple graphing techniques to discern meaningful Patterns in the data. Plenty of existing resources already teach the skills and practices involved in doing sophisticated statistical and financial analysis to support the mere 10% of Business data analysis that requires those specialized skills, but where are the resources...
Multimedia Enhanced Language Teaching
FOCUS OF THE PROGRAMME In the first stage of the cognitive approach for the second language acquisition, comprehensible input, the underlying assumption is that the learner needs help in identifying the critical features in “the wealth of the linguistic and nonlinguistic information they receive”. This means that the supports embedded in the multimedia instructional approach should guide...
5th International Online Language Conference
All submitted papers undergo a blind-review process before any decision is made. Scientific committee members of IOLC 2012 comprises of university professors from around the globe. All accepted papers in the conference will be published in a Vol. 3 of "Frontiers of Language and Learning", which will be indexed in: EBSCO, Google Scholar and Google Books. Participants will have the opportunity...
2ndAnnual International Conference on Language, Literature and Linguistics (L3 2013)
"To speak a language is to take on a world, a culture," says Frantz Fanon. To undestand a culture fully, one must first be dedicated to learning its native language. Linguists well as our body of literature play a crucial role in unlocking the secrets behind the world's multitude of languages, and helping people understand how the human mind works across time and space, from different eras and...