Link
xCELLencrypt 3.1.0
Download

AES encrypt cell(s) in Microsoft Office Excel.
ul>
  • License: Freeware Free
  • OS: Windows Vista/2003/XP/2000/98/Me/NT
  • Requirements: No special requirements
  • Publisher: Justin Gehtland&Keith Brown

    • License: Shareware $24.95
    • OS: Windows 98/NT
    • Requirements: No special requirements
    • Publisher: y3k-software

    • License: GPL Free
    • OS: Windows XP/2000/98
    • Requirements: No special requirements
    • Publisher: raychorn

    • License: GPL Free
    • OS: Windows 7/Vista/2003/XP
    • Requirements: No special requirements
    • Publisher: Marek Sienczak

    • License: Demo $4.99
    • OS: Windows 7/Vista/XP
    • Requirements: Microsoft Office Excel 2007/2010, .NET Framework 3.5 or higher
    • Publisher: FullScope Solutions, LLC

    AVD Clean N\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\' Optimize is a Security software developed by audiovideows. After our trial and test, the software is proved to be official, secure and free. Here is the official description for AVD Clean N\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\' Optimize:

    AutoKrypt is a Security software developed by Hitek Software LLC. After our trial and test, the software is proved to be official, secure and free. Here is the official description for AutoKrypt:

    Encryption software designed for automation. Automatically Encrypt and Decrypt files and Folders. Encryption methods include password based, secret key, public and private key, OpenPGP password, OpenPGP private and public key encryption. Includes key generators, and a key store to manage keys. Common tasks include encrypt, decrypt, Copy, zip, unzip, synchronize and file monitors. Includes scheduler to run tasks. A chaining feature can run tasks in sequence or conditionally depending on exit codes. Additional features include email Notifications on task failure, zip File Viewer, extensive logging, remote task control and more. It supports dynamic variables to achieve advanced automation tasks. Email notification profiles based on exit code can be set for tasks. Schedules can be synchronized to allow or prevent overlapping schedules. Dynamic variables allow for advanced automation solutions. Number of command-line utilities are available to remotely and programmatically control tasks and the scheduler. Run 1000+ tasks/day.
    Password Minder is a Security software developed by Justin Gehtland&Keith Brown. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Password Minder:

    Y3K S-Crypt 2000 is a Security software developed by y3k-software. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Y3K S-Crypt 2000:

    pyEggs is a Security software developed by raychorn. After our trial and test, the software is proved to be official, secure and free. Here is the official description for pyEggs:

    EditByBSEditor: pyEggs is Now able to encrypt Egg contents that are imported using a specialized Python code importer that knows how to import arbitrarily encrypted Python code and data files.

    pyEggs compiles all Python scripts contained within a Folder tree into an Egg suitable for uploading to PyPI.

    This is a completely automated process that begins with the setup.py which you must supply using the template supplied with this windows executable package.

    Once you type in the command line pyEggs handles the rest of the process.

    pyEggs is planned to support Cython. Folders that have .pyx files get automatic handling to allow .pyd files to be automatically generated from .pyx files - setup.py and build.cmd files are automatically generated if they are absent at the time the .Egg file is created for any given folder path for an Egg. Cython code must reside in a folder tree with \\\"ext\\\" at the base directly under the parent folder for the Egg. Cython code is place in the same Egg file as the source for the creation of the Egg.

    Cython is required to compile the .pyx files however the setup.py and build.cmd files will be created anyway. pyEggs shells-out to the OS to compile Cython extensions. It is assumed a suitabe C Compiler is installed whenever Cython extensions are being compiled however pyEggs cares not whether .pyd files are created from .pyx files only that the work is done through the build.cmd and setup.py files.

    The real value in being able to ship encrypted Python code lies in your ability to ship a custom tailored license for each end-user who wants to use your code. Each time someone downloads your product they can be issued a separate KEY they use to unlock your code and run it. The KEY can be tuned to a specific runtime environment such as a Computer Name or a bunch of data collected from the computer that was used to register the product.
    Hash Codes Portable is a Security software developed by Marek Sienczak. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Hash Codes Portable:


    The ideal cryptographic hash function has four main properties:

    it is easy to compute the hash value for any given message,
    it is infeasible to find a message that has a given hash,
    it is infeasible to modify a message without changing its hash,
    it is infeasible to find two different messages with the same hash.
    Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes , and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to Detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. Indeed, in information security contexts, cryptographic hash values are sometimes called fingerprints, checksums, hash codes, hash sums, hash values, or simply hashes, even though all these terms stand for functions with rather different properties and purposes.

    Want to be sure that your data has not been altered or damaged, earlier generate a hash code for them and at the right time compare to find out they are identical.

    Features:
    Hash data from keyboard, file or CD/DVD
    Uses Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 and Whirlpool Algorithm
    Copy hash codes to clipboard or save to disk
    Can compare hash codes
    Load saved hash code file to comparison
    Progress bar show the current process
    Suspend, resume or stop the hash process
    Save log information
    xCELLencrypt is a Security software developed by FullScope Solutions, LLC. After our trial and test, the software is proved to be official, secure and free. Here is the official description for xCELLencrypt:


    Version 3.1 adds support for Excel 64-bit.

    Related Downloads

    Encrypt every cell inside a MS Excel spreadsheet
    Create your own toolbar of buttons to quickly and easily format cells and rows.
    Do goal seek on multiple cells automatically.
    Make comments easy to manage and modify.
    help Microsoft Excel users audit and check spreadsheets models
    Spreadsheet Compare is a Microsoft Excel Add-In.

    Leave a Review