|
||||||
|
||
|
Home > Public key software |
Related keywords: public, Public, public records, public address, public kiosks, public access internet terminal, public relations, public key encryption, Public Analysis, public folders |
|
|
91. | Order Maven 1.31 (briggsoft.com) | ||
e-mail credit card orders directly back to merchant with built-in public key encryption and SMTP functions. Visually design your forms with the drag and drop interface. Order form generator for online merchants. Create stand-alone Windows executables that can be distributed royalty-free to customers. Collect, encrypt, and e-mail credit card | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 852 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
92. | P2P Messenger .NET 3.0.2 (ufasoft.com) | ||
It is fully decentralized and does not require any servers. Supports public-key cryptography P2P Messenger is secure Instant Messaging client, working by Peer-to-Peer technology. It is fully decentralized and does not require any servers. Supports public-key | |||
Updated: 9, 2005 | Rating: 360 | Author: Ufasoft company | Size: 400 kb | Freeware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
93. | PC Accelerator 2005 Edition 1.1 (smartalec2000.com) | ||
and intelligent memory defragmentation - Manual adjustments for key functions. - Save favorite configurations to a file. - Built-in optimization wizard to help you fine-tune your system to the max. - Support for all the latest network protocols and equipment, including wireless connections. Brand new integrated PCPerformance control center with the following features | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Wong | Size: 3614 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
94. | PELock 1.06 (pelock.pac.pl) | ||
creation of application of evaluation-demo type, which use license key system. PELock features: • compression of the application (code, imports, resources), it's possible to decrease executable size even 70% of original file • encryption of code (publicly available | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
95. | Pinky 5.94 (donsoft.net) | ||
is a media player that's a little different to the rest, enabling you to add to your collection, as well as play it. This software is very easy to use, without the overhead of a normal text menu system. It's actions are controlled by buttons, check boxes and/or keyboard commands. Pinky can be set to run in Robot Mode, where you don't have to do a thing, once it has been | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Cunningham | Size: 4844 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
96. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
97. | PopMessenger 1.61 (leadmind.com) | ||
opportunity to win the race and beat the competition. One of the key factors of successful business operation is well-thought staff communication system. Good managers know that each minute of work time spent in vain means profit loss. That is why building fast and convenient personnel communication environment is so important, these days. Common means of communication, such as | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
98. | Private Desktop 1.91 (tropsoft.com) | ||
comes in... Private Desktop will allow you to escape to your "public" desktop with the push of a button. Private Desktop allows you to keep a second password protected desktop containing all your private applications. Access to this desktop can be completely customized: its toolbar icon can be made either very small or invisible, hotkeys can be specified to remove you from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 237 kb | Demo Go to category: System Utilities > Other Similar programs | |||
99. | Private Shell SSH Client 2.1 (privateshell.com) | ||
not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications (such as Oracle, MySQL, CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
100. | ProtectZ 1.60 (actualsecurity.com) | ||
is a security utility for personal and public accessible computers. This software-only solution enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename them, to make them | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Public key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|