RTZ Posted May 20, 2009 Posted May 20, 2009 Toucan 2.1.0 License: Open Source File Size: 2.5MB Download / 3.1MB Installed 0perating System: Windows 2000/XP/Vista/7, Wine HomePage: http://portableapps.com/apps/utilities/toucan Toucan is a tool for advanced users that allows you to sync, backup and secure files on your portable device. With more options than the built in suite utilities. It is split up into 7 tabs, allowing you to easily find the function that you want. This release contains includes a brand new sync engine, bug fixes, additional languages, a new installer, Windows 7 support and a new progress dialog. There is also a change to Backup Differential. It's packaged in PortableApps.com Format for easy use from any portable device . Features *Four synchronisation modes, copy, update, mirror and equalise. *Backup and restore in industry standard zip and 7-zip files, with support for complete backups, updating existing backups and incremental backups, as well as restoring files from an archive. *AES-256 encryption using ccrypt *Command line support, allows you to create a batch file for repeated jobs *Portable variables, point to places on you USB drive no matter what its drive letter is ChangeLog *Visual notification when Toucan has finished running a job has been added. *A new Progress Dialog with much improved visual output and a progress bar *New Sync engine has been added speeding up many types of Sync and bringing a more reliable preview. a new Progress Dialog with much improved visual output and a progress bar. Quote
RTZ Posted May 20, 2009 Author Posted May 20, 2009 ccrypt is a utility for encrypting and decrypting files and streams. It was designed to replace the standard unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael block cipher, which was also chosen by the U.S. government as the Advanced Encryption Standard (AES]. This cipher is believed to provide very strong cryptographic security. Unlike unix crypt, the algorithm provided by ccrypt is not symmetric, i.e., one must specify whether to encrypt or decrypt. The most common way to invoke ccrypt is via the commands ccencrypt and ccdecrypt. Encryption and decryption depends on a keyword (or key phrase) supplied by the user. By default, the user is prompted to enter a keyword from the terminal. Keywords can consist of any number of characters, and all characters are significant (although ccrypt internally hashes the key to 256 bits). Longer keywords provide better security than short ones, since they are less likely to be discovered by exhaustive search.Advanced Encryption Standard (AES) Questions and Answers 1. What is the Advanced Encryption Standard (AES)? The Advanced Encryption Standard (AES) will be a new Federal Information Processing Standard (FIPS) Publication that will specify a cryptographic algorithm for use by U.S. Government organizations to protect sensitive (unclassified) information. NIST also anticipates that the AES will be widely used on a voluntary basis by organizations, institutions, and individuals outside of the U.S. Government - and outside of the United States - in some cases. 2. What algorithm has been selected by NIST, and how do you pronounce it? NIST has selected Rijndael as the proposed AES algorithm. The algorithm's developers have suggested the following pronunciation alternatives: "Reign Dahl," "Rain Doll" and "Rhine Dahl." 3. Who submitted the algorithm, and where are they from? The two researchers who developed and submitted Rijndael for the AES are both cryptographers from Belgium: Dr. Joan Daemen (Yo'-ahn Dah'-mun) of Proton World International and Dr. Vincent Rijmen (Rye'-mun), a postdoctoral researcher in the Electrical Engineering Department (ESAT) of Katholieke Universiteit Leuven. more info, http://csrc.nist.gov/archive/aes/index.html Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.