|
||||||
|
||
|
Home > Sha software |
|
|
1. | Aloaha PDF Suite 2.1.264 (aloaha.com) | ||
Your PDF Files are just one click away! Aloaha PDF Suite is the perfect tool to create your PDF Documents. One click is enough! Just print your document to any of your printers and Aloaha will convert the print job to a PDF Document, which you can save, digitally sign, email, fax or publish to an exchange Aloaha PDF Suite is the perfect tool to create/edit your PDF Documents. One click is enough! Just print your document to any of your printers and Aloaha will convert the print job to a PDF Document | |||
Updated: 3, 2006 | Rating: 435 | Author: Aloaha Software | Size: 8789 kb | Commercial Go to category: System Utilities > Printer Similar programs | |||
2. | CDCheck 3.1.11 (elpros.si) | ||
Besides that CDCheck supports creation and checking of MD5, CRC-32, SHA... hashes in SFV, MD5 and CRC file formats. This provides means to check backups for possible loss of information or verify file transfers where comparing is not possible (transfer over mail etc.). The program can be used with all local or removable media (CDs, DVDs, disk drives, floppy disks, ZIP drives, USB | |||
Updated: 2, 2006 | Rating: 1217 | Author: Mitja Perko | Size: 1400 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
3. | AxCrypt 1.6.2.3 (axcrypt.sourceforge.net) | ||
with a few mouse clicks. Cryptographic primitives are AES-128 and | |||
Updated: 2, 2006 | Rating: 337 | Author: Svante Seleborg | Size: 1034 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | Tray Safe 4.3 (traysafe.com) | ||
most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray Safe | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
5. | Winalysis 3.1 (winalysis.com) | ||
Monitor for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
6. | Tray Safe 4.3 (fgroupsoft.com) | ||
most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray Safe | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
7. | SecureWord 1.5 (secureword.com) | ||
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
8. | SecureWord 1.5 (cezeo.com) | ||
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
9. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
of the encryption algorithms offered. The library uses the modern SHA-2 and HAVAL hashing algorithms so that passphrases can be converted to exactly the amount of bits required for an encryption key and with better mathematical properties than older hashing algorithms such as MD5. Like all Xceed | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
10. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel, display settings, network, passwords, users, dos, games, internet, memory, printers, desktop, system, Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Sha software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|