|
||||||
|
||
|
Home > Sha software |
|
|
1. | Aloaha PDF Suite 2.1.264 (aloaha.com) | ||
Your PDF Files are just one click away! Aloaha PDF Suite is the perfect tool to create your PDF Documents. One click is enough! Just print your document to any of your printers and Aloaha will convert the print job to a PDF Document, which you can save, digitally sign, email, fax or publish to an exchange Aloaha PDF Suite is the perfect tool to create/edit your PDF Documents. One click is enough! Just print your document to any of your printers and Aloaha will convert the print job to a PDF Document | |||
Updated: 3, 2006 | Rating: 435 | Author: Aloaha Software | Size: 8789 kb | Commercial Go to category: System Utilities > Printer Similar programs | |||
2. | Art HTML Listing 3.27 (zzee.com) | ||
text and CSV formats. Supports HTML titles, icons, media types, MD5, SHA, ID3 tags, Image info and | |||
Updated: 2, 2006 | Rating: 0 | Author: Paul Slavic | Size: 2353 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
3. | AxCrypt 1.6.2.3 (axcrypt.sourceforge.net) | ||
with a few mouse clicks. Cryptographic primitives are AES-128 and | |||
Updated: 2, 2006 | Rating: 337 | Author: Svante Seleborg | Size: 1034 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | axsStrongBox 2.1 (morello.co.uk) | ||
axsStrongBox is a COM component which provides strong, secure data encryption (public and private key). It can be easily integrated into Visual Basic, Visual C++, Delphi and VBScript applications. StrongBox uses industry standard, public domain algorithms - choose between Rijndael (AES), Twofish | |||
Updated: 9, 2005 | Rating: 116 | Author: Tom Duncan | Size: 473 kb | Demo Go to category: Development > Active X Similar programs | |||
5. | CDCheck 3.1.11 (elpros.si) | ||
Besides that CDCheck supports creation and checking of MD5, CRC-32, SHA... hashes in SFV, MD5 and CRC file formats. This provides means to check backups for possible loss of information or verify file transfers where comparing is not possible (transfer over mail etc.). The program can be used with all local or removable media (CDs, DVDs, disk drives, floppy disks, ZIP drives, USB | |||
Updated: 2, 2006 | Rating: 1217 | Author: Mitja Perko | Size: 1400 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
6. | cryptlib 3.0 (download.componentspot.com) | ||
are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various hashed message authentication code algorithms: · HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally, asymmetric (public/private key) | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
7. | EDXOR 1.64 (members.ozemail.com.au) | ||
EDXOR is a versatile, convenient and optimal text editor and file processor that far surpasses the capabilities of other Notepad-like applications. It offers innovative clipboard handling, cryptographic options and logic text conversions, great for education, fun, or privacy. EDXOR is small, self-contained | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 35 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
8. | HIME: Huge Integer Math and Encryption 1.04 (users.skynet.be) | ||
ArcFour (RC4) secret key encryption and digital signatures using the SHA-1, SHA-256 or MD5 Secure Hash Algorithm in your programs. HIME also contains functions for huge prime number generation, cryptographically secure random number generation (a.o. Blum-Blum-Shub and RSA), Diffie-Hellman key exchange algorithm and huge integer number mathematical operations. These | |||
Updated: 9, 2005 | Rating: 949 | Author: E. Van Esch | Size: 747 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
9. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for files and strings in a single step. Aside from providing core string and file encryption services, Crypt | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
10. | NCrypt TX 1.8 (littlelite.net) | ||
to verify message integrity. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With NCrypt TX you can convert your text messages into a sequence of encrypted hexadecimal or Base64 characters. NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 | |||
Updated: 2, 2006 | Rating: 0 | Author: Alessio Saltarin | Size: 511 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Sha software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|