SlideShare a Scribd company logo
1 of 4
1




OVERVIEW (WHAT MEO
DOES)
2




 MEO IS AN APPLICATION TO ALLOW YOU TO ENCRYPT
  AND DECRYPT FILES OR FOLDERS OR EMAILS
  AGAINST UNAUTHORIZED VIEWERS. YOU CAN
  ENCRYPT USING EITHER THE BLOWFISH OR 3-DES
  ALGORITHIMS.
3




FEATURES
 ENCRYPTS USING BLOWFISH OR 3-DES ALGORITHM
 SINGLE FILE OR FOLDER OF FILES OR EMAIL WITH
  ATTACHMENTS CAN BE ENCRYPTED
 A SELF-DECRYPTING FILE CAN BE CREATED THAT IS A
  STANDARD APPLICATION THEY WILL DECRYPT THE
  FILE WHEN RUN
 OPTION TO CREATE AND CHECK A FILE'S CHECKSUM
  USING MD5 OR SHA1 OR TIGER TREE HASH
4




SYSTEM REQUIREMENTS
 WINDOWS 2000/XP/2003/VISTA/2008/7.

More Related Content

Viewers also liked

Ppt roshna corrected
Ppt roshna correctedPpt roshna corrected
Ppt roshna correctedSano Anil
 
Análisis de de textos revisados en la construcción de la historia del arte de...
Análisis de de textos revisados en la construcción de la historia del arte de...Análisis de de textos revisados en la construcción de la historia del arte de...
Análisis de de textos revisados en la construcción de la historia del arte de...cediel1952
 
2014 Gold Monitor Award Winners: Banking
2014 Gold Monitor Award Winners: Banking2014 Gold Monitor Award Winners: Banking
2014 Gold Monitor Award Winners: BankingCorporate Insight
 
P&C Insurance - 2013 Gold Monitor Award Winners
P&C Insurance - 2013 Gold Monitor Award WinnersP&C Insurance - 2013 Gold Monitor Award Winners
P&C Insurance - 2013 Gold Monitor Award WinnersCorporate Insight
 
Medweb - Achievable Telemedicine Solutions in Afghanistan
Medweb - Achievable Telemedicine Solutions in AfghanistanMedweb - Achievable Telemedicine Solutions in Afghanistan
Medweb - Achievable Telemedicine Solutions in AfghanistanPeter Killcommons
 

Viewers also liked (8)

Ppt roshna corrected
Ppt roshna correctedPpt roshna corrected
Ppt roshna corrected
 
Análisis de de textos revisados en la construcción de la historia del arte de...
Análisis de de textos revisados en la construcción de la historia del arte de...Análisis de de textos revisados en la construcción de la historia del arte de...
Análisis de de textos revisados en la construcción de la historia del arte de...
 
Vih
VihVih
Vih
 
Kundemålskiven
KundemålskivenKundemålskiven
Kundemålskiven
 
2014 Gold Monitor Award Winners: Banking
2014 Gold Monitor Award Winners: Banking2014 Gold Monitor Award Winners: Banking
2014 Gold Monitor Award Winners: Banking
 
Brain crackers
Brain crackersBrain crackers
Brain crackers
 
P&C Insurance - 2013 Gold Monitor Award Winners
P&C Insurance - 2013 Gold Monitor Award WinnersP&C Insurance - 2013 Gold Monitor Award Winners
P&C Insurance - 2013 Gold Monitor Award Winners
 
Medweb - Achievable Telemedicine Solutions in Afghanistan
Medweb - Achievable Telemedicine Solutions in AfghanistanMedweb - Achievable Telemedicine Solutions in Afghanistan
Medweb - Achievable Telemedicine Solutions in Afghanistan
 

More from windowsprogramfiles (20)

Body
BodyBody
Body
 
Hair
HairHair
Hair
 
Fragance
FraganceFragance
Fragance
 
Uninstall panda-antivirus-pro-2012
Uninstall panda-antivirus-pro-2012Uninstall panda-antivirus-pro-2012
Uninstall panda-antivirus-pro-2012
 
tadaTADATada
tadaTADATadatadaTADATada
tadaTADATada
 
RAWR
RAWRRAWR
RAWR
 
1319077_634635203326249325
1319077_6346352033262493251319077_634635203326249325
1319077_634635203326249325
 
Explorer
ExplorerExplorer
Explorer
 
WINWORD.exe Virus
WINWORD.exe VirusWINWORD.exe Virus
WINWORD.exe Virus
 
Sparta Maximum Remix XKE
Sparta Maximum Remix XKESparta Maximum Remix XKE
Sparta Maximum Remix XKE
 
Word 2010
Word 2010Word 2010
Word 2010
 
Ms office 2010
Ms office 2010Ms office 2010
Ms office 2010
 
Ms office 2010
Ms office 2010Ms office 2010
Ms office 2010
 
Word 2010
Word 2010Word 2010
Word 2010
 
الباركود أنواع
الباركود أنواعالباركود أنواع
الباركود أنواع
 
نظرة عامة
نظرة عامةنظرة عامة
نظرة عامة
 
Install log
Install logInstall log
Install log
 
ответ
ответответ
ответ
 
Frames
FramesFrames
Frames
 
презентация1
презентация1презентация1
презентация1
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Encrypt and decrypt files with MEO application

  • 2. 2  MEO IS AN APPLICATION TO ALLOW YOU TO ENCRYPT AND DECRYPT FILES OR FOLDERS OR EMAILS AGAINST UNAUTHORIZED VIEWERS. YOU CAN ENCRYPT USING EITHER THE BLOWFISH OR 3-DES ALGORITHIMS.
  • 3. 3 FEATURES  ENCRYPTS USING BLOWFISH OR 3-DES ALGORITHM  SINGLE FILE OR FOLDER OF FILES OR EMAIL WITH ATTACHMENTS CAN BE ENCRYPTED  A SELF-DECRYPTING FILE CAN BE CREATED THAT IS A STANDARD APPLICATION THEY WILL DECRYPT THE FILE WHEN RUN  OPTION TO CREATE AND CHECK A FILE'S CHECKSUM USING MD5 OR SHA1 OR TIGER TREE HASH
  • 4. 4 SYSTEM REQUIREMENTS  WINDOWS 2000/XP/2003/VISTA/2008/7.