Notebook PEA 1.7 freeware

Open source password-encryption tool with built-in text editor. NotebookPEA provides some editing and styling functionality. The unencrypted text is never stored on the hard disk (real-time encryption). Several texts can be managed at the same time, not displaying texts remain encrypted in RAM. Besides Nextcloud and Owncloud, various cloud providers are supported. Authenticated encryption mode achieves confidentiality and integrity. ...

Author BeloumiX
Released 2022-05-29
Filesize 1.64 MB
Downloads 141
OS Java, Linux, Linux Gnome, Linux GPL, Linux Open Source, Mac OS X, Mac Other, Unix, Windows 8, Windows 10, Windows 7 x32, Windows 7 x64, WinOther, Windows Vista, Windows Vista x64, Windows XP
Installation No Install Support
Keywords encrypted notebook, text encryption, password, privacy, editor, authenticated encryption, key derivation, cloud support
Users' rating
(6 rating)
Notebook PEAEncryption ToolsJava, Linux, Linux Gnome, Linux GPL, Linux Open Source, Mac OS X, Mac Other, Unix, Windows 8, Windows 10, Windows 7 x32, Windows 7 x64, WinOther, Windows Vista, Windows Vista x64, Windows XP
Notebook PEA - hash algorithms Freeware Download Notice

Notebook PEA Free Download - we do not host any Notebook PEA torrent files or links of Notebook PEA on rapidshare.com, depositfiles.com, megaupload.com etc. All Notebook PEA download links are direct Notebook PEA download from publisher site or their selected mirrors.

Notebook PEA freeware - The Latest User Reviews
Notebook PEA freeware - The Latest Versions History
1.7 May 29, 2022 New Release

Most popular Encryption Tools freeware downloads

fHash

3.11.2.0 freeware download

... Sun Junwen, is a lightweight yet powerful file hashing utility designed to meet the needs of both ... a straightforward interface that allows users to generate hash values for files quickly and accurately. At ...

New Version

Speedcrypt

1.5 freeware download

Speedcrypt provides its users with protection against Dictionary Attacks, Guessing Attacks or Brute Force Attacks, and Rainbow Table Attacks. These types of attacks cannot be prevented ...

Hash Generator

8.0 freeware download

Hash Generator is the FREE universal hash generator tool which automates the generation of 15+ different type of hashes or checksums. It support most of the popular ...

Toms Hash Explorer

1.2 freeware download

Toms Hash Explorer is a fast multi-threaded cryptographic hash calculation suite with an innovative Explorer-like user interface. ... Windows utility allows you to easily calculate cryptographic hash values for single files or entire folders to ...

Cryptnos

1.3.3 freeware download

... help you generate strong, pseudo-random passwords using cryptographic hashes. Cryptnos combines a unique "site token" such ... password and runs this data through a cryptographic hash algorithm to produce a password that is unique, ...

Free File Lock

6.2.7 freeware download

... your important or sensitive files with uncrackable encryption algorithms. You can lock your files like images, music, ... Free File Lock is equipped with secure cryptographic algorithms including cipher and hash. You can choose Rijndael, ...

PCTuneUp Free File Encryptor

5.1.7 freeware download

... This free file encryptor features with secure encryption algorithms including cipher and hash. You can combine 3DES, Blowfish, Rijndael DES, Serpent ... with Haval, MD4, MD5, SHA1, Tiger, etc. from hash to build an uncrackable protection wall to guard ...

VSTextHash

1.0.3.65 freeware download

VSTextHash is a cryptographic hash calculation software. This software lets you hash text with many different hash algorithms. Simply type the text in this calculator and ...

Notebook PEA

1.7 freeware download

... Argon2. The default cipher is Threefish, the default hash function is Blake2b, but other algorithms are available such as the ciphers AES and the hash functions SHA-3. The program provides a virtual keyboard ...

Hash Compare

3.0 freeware download

Hash Compare is the FREE File Hash comparison tool. It performs Hash based Integrity Comparison using any of the the popular hash algorthms such as MD5, SHA1 or SHA256. To ...