|
||||||
|
||
|
Home > Cipher software |
Related keywords: stream cipher, secure email encrypted e mail encryption crypto online privacy rsa twofish block cipher stream ciphe |
|
|
1. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | QuickScore Elite Level II 11.0 (sionsoft.com) | ||
Elite Level II is Sion Software's premier music composition and notation software - incorporating scoring, arranging, MIDI and audio sequencing and recording. Use it to create publication-quality scores, musical content for the desktop and world wide web, audio CDs, MP3s and soundtracks for film, video and games. This is the program that Electronic Magazine awarded their 1995 | |||
Updated: 2, 2006 | Rating: 0 | Author: Cris Sion | Size: 4338 kb | Demo Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
3. | Ulead PhotoImpact 8 (ulead.co.uk) | ||
PhotoImpact 8 delivers total image editing for the PC. Easily manage and enhance digital photos, create stunning graphics and produce high-impact Web pages for recreational or professional use. Professional looking photos are easy to make using one-click auto-correct commands. Add extra pizzazz to photos with | |||
Updated: 9, 2005 | Rating: 929 | Author: Jackson Chang | Size: 45156 kb | Demo Go to category: Graphic Apps > Editors Similar programs | |||
4. | Computers Hall 2.11 (ruslan.odessa.ua) | ||
of reports, analyses of operation of club; · The base of reports is ciphered by modern symmetric algorithms of encoding; · The Base of reports has mechanisms of selfrecovery; · It is possible to see the list of active processes by client machines, to delete them and to conduct the report on their | |||
Updated: 3, 2005 | Rating: 16 | Author: Ruslan Scherbatuk | Size: 1798 kb | Demo Go to category: Business > Other Similar programs | |||
5. | Cynapse InfoCryptor 1.50 (cynapse.co.in) | ||
system, giving you military strength & security. InfoCryptor's easy to use Export / Import feature and its backup solution make secure portability and exchange of information a breeze. Features: 448-bit symmetric encryption cipher, Various levels of security implementation, Multiple User support with individually customisable user accounts, 'Export to encrypted | |||
Updated: 9, 2005 | Rating: 39 | Author: Apurva Roy Choudhury | Size: 5732 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
6. | Boomer 4.0 (gfx2swf.com) | ||
your audio and video, create slideshows. Convert your mp3's and wave files to streaming format that half a billion user have. If you can drag and drop you can use this software. Create interactive graphics and audio with multiple links. Hundreds of combinations of effects. A " Lean, Mean, Streaming Machine" that's easy to use. Boomer uses the Flash Player from | |||
Updated: 9, 2005 | Rating: 0 | Author: Harry Hayes | Size: 1852 kb | Shareware Go to category: Development > Other Similar programs | |||
7. | ColorPicker 2.0 (vandog.com) | ||
This library helps your users to pick RGB colors from any place of the screen. It contains only one function, PickColor() and shows your user a "lens-eyedropper" tool for color selection. ColorPicker.dll is absolutely free and contains Delphi 7 source code. ColorPicker.dll is a free and easy way to add a | |||
Updated: 9, 2005 | Rating: 42 | Author: Igor Kovalevsky | Size: 390 kb | Freeware Go to category: Development > Active X Similar programs | |||
8. | EDCrypt 3.1 (softuarium.com) | ||
functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
9. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
(SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for files and strings in a single step. Aside from providing core string and file encryption services, Crypt implements advanced features such as Base64 based encryption | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
10. | M2Crypto Installer for Python 2.3 0.13.1 (sandbox.rulemaker.net) | ||
the following: - RSA, DSA, DH, HMACs, message digests, symmetric ciphers (including AES). - SSL functionality to implement clients and servers. - HTTPS extensions to Python's httplib, urllib and xmlrpclib. - PKI functionality. - Unforgeable HMAC'ing AuthCookies for web session management. - FTP/TLS client and server. - S/MIME. - ZServerSSL: A HTTPS server for | |||
Updated: 9, 2005 | Rating: 1064 | Author: Pheng Siong Ng | Size: 356 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Cipher software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|