|
||||||
|
||
|
Home > Cipher software |
Related keywords: stream cipher, secure email encrypted e mail encryption crypto online privacy rsa twofish block cipher stream ciphe |
|
|
41. | FirmTools PanoramaComposer 2.0 (firmtools.com) | ||
preview that makes creating panoramas just as easy as playing Lego’s. Since the software uses a proprietary algorithm for stitching images, the overlap between images may be anywhere between two and fifty percents, with no stitches or other distortion visible. There is also a built-in image enhancing mechanism that get rids of glitches that may be present in the original images | |||
Updated: 9, 2005 | Rating: 19 | Author: Joe Kelner | Size: 1693 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | Fisheye Player 2.01 (imaysoft.com) | ||
Fisheye Player create 360 degree Panorama,Use single shot Fish eye image. With Web/Windows Published generates Java Applet and Executable File. No Stitching needed. System Character : (1) Multiple Panoramic image supported : Fisheye,Cylindrical,spherical,PAL35/PAL53,Panoramic Mirror. (2) One Shot Version 2.01 add Video Function, Create Panoramic AVI File | |||
Updated: 9, 2005 | Rating: 74 | Author: Cognac Hsih | Size: 10116 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
43. | Gravitational Lensing 1.00 (kwakkelflap.com) | ||
General Theory of Relativity demonstrates that a large mass can deform spacetime and bend the path of light. So, a very massive object, such as a cluster of galaxies can act as a gravitational lens. When light passes through the cluster from an object lying behind it, the light is bent and focused to produce an image or images of the source. The image may be magnified | |||
Updated: 9, 2005 | Rating: 25 | Author: Wouter Dhondt | Size: 74 kb | Freeware Go to category: Home & Hobby > Astrology / Biorhythms / Mystic Similar programs | |||
44. | Hiding CHAOS 5.6 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | History and Guide Book to Lenticular Technology 1.2 (didik.com) | ||
of many, if not most lenticular images produced. Covers the 1940's to the mid 1980's. Contains the original manufacturer catalog numbers as well as the Didik Universal Catalog Number® (DUCN) for every lenticular. Contains the original selling price and current value of collectable lenticular images. Contains thousands of illustrations, photographs and images of lenticulars | |||
Updated: 3, 2005 | Rating: 0 | Author: Frank D | Size: 2300 kb | Commercial Go to category: Graphic Apps > Other Similar programs | |||
46. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | Home CHAOS 3.5 (safechaos.com) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
48. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
Encryption algorithm used is much stronger than the 128 bit cipher used in todays browsers and considered secure enough for online credit card payments. Option to enter the password only once for all protected files. Customizable encrypted files layout. You can use one or more passwords.Many additional security options are available. For more information visit | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
49. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
Encryption algorithm used is much stronger than the 128 bit cipher used in todays browsers and considered secure enough for online credit card payments. Option to enter the password only once for all protected files. Customizable encrypted files layout. You can use one or more passwords.Many additional security options are available. For more information visit | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
50. | I-Cipher AP 2.2.2 (ambitware.com) | ||
with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Cipher software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|