HomebulletScriptsbulletTag: decryption (49 results)
  1. No Screenshot
    1852 total visits
    phpSHIELD 3 PHP Encoder protects your PHP Source Code with a powerful, easy to use encoder, which creates a native bytecode version of the script and then encrypts it. Some other PHP encoding systems do not use bytecode and it is very easy to reverse engineer their protected scripts back to the original source code. With bytecode encryption, it is ...
  2. No Screenshot
    1738 total visits
    SourceGuardian 7 PHP Encoder is the ultimate protection solution for your PHP scripts. Version 7.0 introduces a host of new and enhanced features. SourceGuardian has become an essential tool for many web developers and programmers, offering the ability to protect their PHP code and therefore their intellectual property. The new version contains all of the same useful features customers have ...
  3. No Screenshot
    1846 total visits
    A specified secret key is used to encrypt and decrypt the data in Encryption and Decryption with Rijndael 256. There is also a function to generate a random password made only of alpha-numeric characters and encrypt it using the specified secret key.
  4. No Screenshot
    1578 total visits
    Security authorization can start a session and store a variable with a value that is also encrypted and set to a cookie. If the cookie has expired or the decrypted cookie value different than the session variable value, the session is destroyed and the user is redirected to an authentication page. The cookie can be regenerated and verified for every ...
  5. No Screenshot
    1689 total visits
    A string of data can be encrypted using a specified key. RC4 Cipher can also do the opposite, i.e. decrypt the encrypted data with the same key.Requirements: PHP 5.0 or higher
  6. No Screenshot
    1651 total visits
    LSM Crypt Cookie is a simple class that can store encrypted values in cookies using a secret key. It can generate an encrypted version of a text value using a secret key and store it in a cookie.Whenever LSM Crypt Cookie is necessary to recover the original value, the class can decrypt the value stored in the cookie using the ...
  7. No Screenshot
    1683 total visits
    Secure Cookie can create a cookie and store data in the cookie encrypting it using a given key. Data can also be retrieved from a cookie, by decrypting it with the same key.Cookies may also be deleted with Secure Cookie.Requirements: PHP 4.0 or higher
  8. No Screenshot
    1504 total visits
    A data block can be encrypted using a specified key. The encrypted data is returned encoded with a variant of the base64 encoding algorithm that replaces +, / and = characters by -, _ and empty string.Encryption Class can also do the opposite, i.e. decrypt the data with the same key after decoding the base64 encoded encrypted data.Requirements: - PHP ...
  9. No Screenshot
    1750 total visits
    gksEncrypt uses RSA private and public keys to encrypt and decrypt the data. A private and public key pair with a specified bit length is generated.Requirements: PHP 5.2 or higher
  10. No Screenshot
    1418 total visits
    gEncrypter takes a key to generate a new alphabet that defines how the data to be encrypted should be encoded. The encrypted text can also be decrypted using the same key.Requirements: PHP 3 or higher
  11. No Screenshot
    1767 total visits
    A defined key is used to perform the encryption and decryption.
  12. No Screenshot
    1922 total visits
    Custom Encrypt Class takes a data string and applies a given hashing function. The hashing may be repeated a number of times over the resulting hashed data.Hashing functions like MD5 or SHA1 or custom ones can be applied.Requirements: PHP 4.0 or higher
  13. No Screenshot
    1699 total visits
    Crypter is capable of decrypting the data back to its original form.
  14. No Screenshot
    2126 total visits
    AzDGMailCrypt is a very simple, but very powerfull and quickly class for mail crypting. It allows you to encrypt mails for keeping the spam bots away.
  15. No Screenshot
    1729 total visits
    secShield takes a string with a list of parameters like the query parameters of an URL. It returns a string with the parameters encrypted with a secret key that should be used as a single parameter in a link URL.The integrity of the parameters can be verified and they can be decrypted. If the encrypted parameters are not valid in ...
Pages 2 of 4« 1 2 3 4 »