Windows | Games | Mobile | Wallpapers


dbabits's XOR 2

Command-line executable that can do xor-encryption/decryption


Last Week downloads: 0
Total downloads: 251
  • Last Updated: Oct 22, 2009
  • License: Others Free
  • OS: Windows XP/2000/98
  • Requirements: No special requirements

User reviews

0 out of 5 based on 0 ratings for dbabits's XOR 2

For dbabits's XOR 2Publisher's description


dbabits's XOR is a Security software developed by dbabits. After our trial and test, the software is proved to be official, secure and free. Here is the official description for dbabits's XOR:

EditByBSEditor: c:\>xor

XOR-encrypt[base16-encode|decode] stdin. Dmitry Unltd. ⌐2006

xor 'password' or [base16encode|base16decode]
-if password is one of these: base16encode|base16decode the program encodes/decodes instead of xor
-Data to be encrypted/decrypted/encoded/decoded is read from stdin and written to stdout
-Diagnostic messages are written to stderr, redirect 2>/dev/null (Unix) or 2>NUL (Windows) if you don't want them
-Binary files no problem. Key also could be binary, but then can't pass it as an arg

xor password test.encrypted
xor password test.decrypted
check(should be no diff):
diff test.original test.decrypted
interactive use-type or paste your text,terminate by 'Enter' and ^Z:
xor password > test.encrypted
encrypt|base16encode|base16decode|decrypt->get original text:
echo foo|xor pwd|xor base16encode|xor base16decode|xor pwd
xor foobarfoobar < xor.pch |xor base16encode|xor base16decode|xor foobarfoobar >xor.pch.fullcircle && echo. && sum xor.pch xor.pch.fullcircle

XOR-encryption is very simple and quite strong. Search Google for more on XOR encryption.
The encryption Algorithm runs through each letter of the unencrypted phrase and XOR's it
with one letter of the key. For example, if the unencrypted phrase was
STARS, and the key was ABC, the encryption algorithm would go something like
this: (S XOR A)(T XOR B)(A XOR C)(R XOR A)(S XOR B). XOR only works with two
single letters at a time, which is why the algorithm needs to split both the
phrase and the key Letter By Letter. Because of the nature of the algorithm,
the length of the encrypted phrase is the same length as the unencrypted
phrase.The beauty of XOR encryption comes in its decryption. The algorithm
for encryption is the SAME as the one for decryption.
you can free download dbabits's XOR 2 now.

For dbabits's XOR 2Related Software


Please be aware that Brothersoft do not supply any crack, patches, serial numbers or keygen for dbabits's XOR,and please consult directly with program authors for any problem with dbabits's XOR.