|
||||||
|
||
|
Home > Cipher software |
Related keywords: stream cipher, secure email encrypted e mail encryption crypto online privacy rsa twofish block cipher stream ciphe |
|
|
1. | ABF Magnifying Tools 1.2 (abf-soft.com) | ||
ABF Magnifying Tools is a set of useful graphics tools for viewing the screen area in different zooms. Each tool has its own unique behavior and usability. All tools supplement each other and allow designers and people with poor eyesight to work with computers better. The set contains: Cursor Eye - a | |||
Updated: 9, 2005 | Rating: 0 | Author: Anton Karpenko | Size: 2073 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
2. | Able Graphic Manager 2.4.5 (graphicregion.com) | ||
Able Graphic Manager is a program that enables you to easily view, acquire, print and convert graphic files in normal (file by file), batch (many files at a time) and command line modes. Input formats: Drawing Interchange Format (DXF) generated by most CAD programs, TIFF Bitmap (TIF; TIFF), JPEG Bitmap | |||
Updated: 2, 2006 | Rating: 91 | Author: Graphic Region | Size: 2313 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
3. | Able Photo Slide Show 1.7 (graphicregion.com) | ||
Able Photo Slide Show displays your images continuously without you doing anything. You just point it to a file in folder, say how long to display each picture, select transition effects and then sit back and watch. If a picture is too large or less for your screen, it is resized to fit keeping the aspect | |||
Updated: 2, 2006 | Rating: 0 | Author: Graphic Region | Size: 3831 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
4. | Absolute CHAOS 3.8 (safechaos.net) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 16 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Absolute CHAOS 3.8 (safechaos.com) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 0 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 16 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | AES Free 2.5 (aes.safeworld.info) | ||
AES Free is the program that creates self-extracting encrypted AES-files for Windows. Self-extracting files are executable programs (EXEs) that contain a AES-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting AES-files simply by running it like | |||
Updated: 9, 2005 | Rating: 245 | Size: 515 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | AES Free 2.5 (abensoft.com) | ||
AES Free is the program that creates self-extracting encrypted files for Windows. Self-extracting files are executable programs (EXEs) that contain a AES-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting AES-files simply by running it like any | |||
Updated: 9, 2005 | Rating: 0 | Size: 515 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | AES Home 4.0 (aes.safeworld.info) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
11. | AES Home 4.0 (abensoft.com) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
12. | AES Pro 5.5 (aes.safeworld.info) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 16 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
13. | AES Pro 5.5 (abensoft.com) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
14. | AMI GIF Elements 1 2.0a.03 (mindworkshop.com) | ||
Elements #1 adds new magic to AMI GIF Construction Set Pro, the powerful web page animation software. Make your pages leap from the monitors of the people who surf them, fling pixels about the room and teleport some of your users to alternate parallel universes with this exciting plugin set - your mileage may | |||
Updated: 9, 2005 | Rating: 48 | Author: Alchemy Mindworks | Size: 6032 kb | Shareware Go to category: Graphic Apps > Animation Tools Similar programs | |||
15. | AMI PNG Elements 1 2.0a.03 (mindworkshop.com) | ||
Elements #1 adds new magic to AMI PNG/MNG Construction Set, the animation software for presentation and screen saver images. Make your creations leap from the monitors, fling pixels about the room and teleport some of your users to alternate parallel universes with this exciting plugin set - your mileage may | |||
Updated: 9, 2005 | Rating: 0 | Author: Alchemy Mindworks | Size: 6032 kb | Shareware Go to category: Graphic Apps > Animation Tools Similar programs | |||
16. | Ansel Adams Photographs 5.0 (cassdesign.com) | ||
screen saver are the photographs reflecting the beauty of America's National Parks, all seen through the lens of the great landscape photographer Ansel Adams. Ansel Adams Photographs: In this screen saver are the photographs reflecting the beauty of America's National Parks, all seen through the lens of the great landscape photographer Ansel | |||
Updated: 9, 2005 | Rating: 173 | Author: Andy Cass | Size: 3944 kb | Shareware Go to category: Desktop > Similar programs | |||
17. | Armor System5 2.2.2 (ambitware.com) | ||
of encryption keys. Keys are generated automatically based on user's pass-phrase input and optimized for compatibility. Armor System5 will also eliminate all the evidence of the sensitive documents with its build-in Wipe utility. The program can be used with our free ARS5 Viewer/Decryptor for an easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Vlach | Size: 5986 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
18. | BlowFish 2000 2.8 (gregorybraun.com) | ||
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
19. | Bodie's Calendar 2.25 (iespana.es) | ||
Calendar is a desktop calendar with alarm and notes. Its simplistic modular design is perfect for the user that needs to track important info. It features Stay-on-top mode, minimizes to a desktray icon, supports drag 'n drop, search and replace text in the current note or across all notes, cipher and decipher notes, it is highly configurable, is multi-lingual (English | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcelo Dato | Size: 310 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | Boomer 4.0 (gfx2swf.com) | ||
your audio and video, create slideshows. Convert your mp3's and wave files to streaming format that half a billion user have. If you can drag and drop you can use this software. Create interactive graphics and audio with multiple links. Hundreds of combinations of effects. A " Lean, Mean, Streaming Machine" that's easy to use. Boomer uses the Flash Player from | |||
Updated: 9, 2005 | Rating: 0 | Author: Harry Hayes | Size: 1852 kb | Shareware Go to category: Development > Other Similar programs | |||
21. | CHAOS Chameleon 3.8 (safechaos.net) | ||
CHAOS Chameleon allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. CHAOS Chameleon has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. CHAOS Chameleon has | |||
Updated: 9, 2005 | Rating: 0 | Size: 374 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | CHAOS For Security 2.9 (safechaos.net) | ||
Encrypt and compress individual files and folders. Drag and Drop support. CHAOS for security of your secrets. Encrypt and compress individual files and folders. | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
23. | CHAOS Shredder 3.0 (safechaos.net) | ||
Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
24. | CHAOS Shredder 3.0 (safechaos.com) | ||
Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the | |||
Updated: 3, 2006 | Rating: 0 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
25. | CHAOS' Doors 3.7 (safechaos.net) | ||
Comprehensive privacy tools including file/folder encryption, e-mail encryption, file/folder shredder. The program is compact, efficient and user friendly. Required cryptographic procedures are enforced in the new graphical user interface Drag and Drop support. CHAOS' doors is opened in a world of safety | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
26. | Cipher - A Cryptogram Game by uuba.com 7.00b (uuba.com) | ||
your mind with great quotes and bad jokes. Cipher is a word game to unscramble phrases by correctly substituting letters of the alphabet into the puzzle - hence deciphering the phrase. Evaluation edition has 100 puzzles. Registered edition includes 1400 puzzles, ability to load other puzzle files, and "crypto-tool" to assist in solving other cryptograms. Challenge your | |||
Updated: 9, 2005 | Rating: 0 | Author: -- UUBA.com | Size: 325 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
27. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
28. | ColorPicker 2.0 (vandog.com) | ||
This library helps your users to pick RGB colors from any place of the screen. It contains only one function, PickColor() and shows your user a "lens-eyedropper" tool for color selection. ColorPicker.dll is absolutely free and contains Delphi 7 source code. ColorPicker.dll is a free and easy way to add a | |||
Updated: 9, 2005 | Rating: 42 | Author: Igor Kovalevsky | Size: 390 kb | Freeware Go to category: Development > Active X Similar programs | |||
29. | Computers Hall 2.11 (ruslan.odessa.ua) | ||
of reports, analyses of operation of club; · The base of reports is ciphered by modern symmetric algorithms of encoding; · The Base of reports has mechanisms of selfrecovery; · It is possible to see the list of active processes by client machines, to delete them and to conduct the report on their | |||
Updated: 3, 2005 | Rating: 16 | Author: Ruslan Scherbatuk | Size: 1798 kb | Demo Go to category: Business > Other Similar programs | |||
30. | CryptIt 1.301 (SinnerComputing.com) | ||
correctly. CryptIt can also generate key files (from a stream cipher and thus not best for OTP usage) and analyse the suitability of your own files for key usage. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
31. | Crypto 2000 4.2 (gregorybraun.com) | ||
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
32. | Crypto Anywhere 1.1 (bytefusion.com) | ||
algorithms based on RSA public key encryption, the Twofish block cipher and the ISAAC random number generator. Crypto Anywhere e-mail is compatible with SecExMail client based and SecExMail Gate server based encryption. Crypto Anywhere is secure email on the move ! Crypto Anywhere is small enough to fit on a single floppy or USB key chain drive and so easy to use your grandma will be | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 1301 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
33. | Crypto Anywhere - OpenPGP Edition 2.0 (bytefusion.com) | ||
you to make a travel floppy which can be used in internet cafe's or at work. You don't even need to install the software - just run it from the floppy disk or USB thumb drive. Encrypted messages can be sent to friends who don't even have Crypto Anywhere. Registered users can use Crypto Anywhere for commercial purposes. Crypto Anywhere implements trusted, industry standard, strong | |||
Updated: 9, 2005 | Rating: 86 | Author: Bytefusion Sales | Size: 2987 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
34. | Crypto! 3.7 (KMRConsulting.com) | ||
Crypto! is a Windows version of the popular cryptogram puzzles often found in puzzle books and the Sunday paper. Crypto! selects a quote or phrase from its library of 50, encrypts it, and presents it for you to solve. Solving cryptograms with Crypto! is more fun because it is easy to try various letters and | |||
Updated: 9, 2005 | Rating: 42 | Author: Kenneth Reek | Size: 539 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
35. | CryptoForge 3.2.5 (cryptoforge.com) | ||
features include multiple encryption, filename encryption, cipher speed meter, password cache with timeout, and compression level control. This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
36. | CryptoForge 3.2.5 (cryptoforge.com) | ||
features include multiple encryption, filename encryption, cipher speed meter, password cache with timeout, and compression level control. This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | Crypton 1.0 (uic.nnov.ru) | ||
and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | Cynapse InfoCryptor 1.50 (cynapse.co.in) | ||
system, giving you military strength & security. InfoCryptor's easy to use Export / Import feature and its backup solution make secure portability and exchange of information a breeze. Features: 448-bit symmetric encryption cipher, Various levels of security implementation, Multiple User support with individually customisable user accounts, 'Export to encrypted | |||
Updated: 9, 2005 | Rating: 39 | Author: Apurva Roy Choudhury | Size: 5732 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | EDCrypt 3.1 (softuarium.com) | ||
functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
40. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. Of course, if you are really concerned about | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
41. | FirmTools PanoramaComposer 2.0 (firmtools.com) | ||
preview that makes creating panoramas just as easy as playing Lego’s. Since the software uses a proprietary algorithm for stitching images, the overlap between images may be anywhere between two and fifty percents, with no stitches or other distortion visible. There is also a built-in image enhancing mechanism that get rids of glitches that may be present in the original images | |||
Updated: 9, 2005 | Rating: 19 | Author: Joe Kelner | Size: 1693 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | Fisheye Player 2.01 (imaysoft.com) | ||
Fisheye Player create 360 degree Panorama,Use single shot Fish eye image. With Web/Windows Published generates Java Applet and Executable File. No Stitching needed. System Character : (1) Multiple Panoramic image supported : Fisheye,Cylindrical,spherical,PAL35/PAL53,Panoramic Mirror. (2) One Shot Version 2.01 add Video Function, Create Panoramic AVI File | |||
Updated: 9, 2005 | Rating: 74 | Author: Cognac Hsih | Size: 10116 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
43. | Gravitational Lensing 1.00 (kwakkelflap.com) | ||
General Theory of Relativity demonstrates that a large mass can deform spacetime and bend the path of light. So, a very massive object, such as a cluster of galaxies can act as a gravitational lens. When light passes through the cluster from an object lying behind it, the light is bent and focused to produce an image or images of the source. The image may be magnified | |||
Updated: 9, 2005 | Rating: 25 | Author: Wouter Dhondt | Size: 74 kb | Freeware Go to category: Home & Hobby > Astrology / Biorhythms / Mystic Similar programs | |||
44. | Hiding CHAOS 5.6 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | History and Guide Book to Lenticular Technology 1.2 (didik.com) | ||
of many, if not most lenticular images produced. Covers the 1940's to the mid 1980's. Contains the original manufacturer catalog numbers as well as the Didik Universal Catalog Number® (DUCN) for every lenticular. Contains the original selling price and current value of collectable lenticular images. Contains thousands of illustrations, photographs and images of lenticulars | |||
Updated: 3, 2005 | Rating: 0 | Author: Frank D | Size: 2300 kb | Commercial Go to category: Graphic Apps > Other Similar programs | |||
46. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | Home CHAOS 3.5 (safechaos.com) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
48. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
Encryption algorithm used is much stronger than the 128 bit cipher used in todays browsers and considered secure enough for online credit card payments. Option to enter the password only once for all protected files. Customizable encrypted files layout. You can use one or more passwords.Many additional security options are available. For more information visit | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
49. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
Encryption algorithm used is much stronger than the 128 bit cipher used in todays browsers and considered secure enough for online credit card payments. Option to enter the password only once for all protected files. Customizable encrypted files layout. You can use one or more passwords.Many additional security options are available. For more information visit | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
50. | I-Cipher AP 2.2.2 (ambitware.com) | ||
with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
51. | Invisible CHAOS 5.1 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
52. | iTime 1.0.0 (skynergy.com) | ||
founder and director of the Massachusetts Institute of Technology`s Media Laboratory. iTime is a simple Windows application which will make the Windows tray clock alternate between your local time and Internet Time. A Simple windows application which will make the windows tray clock alternate between your local time and Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Magnus Kruger | Size: 250 kb | Freeware Go to category: Desktop > Clocks & Alarms Similar programs | |||
53. | Japanolle 1.3 (yavsoft.com) | ||
crosswords are ciphered pictures. You have a playing field with rows and columns, each of them is described by some number. The number says how many colored cells there are in each row/column. Their order corresponds to the order of colored areas. The purpose of the game is to fill the cells in the correct order. There are tons of different pictures to provide you with everlasting | |||
Updated: 3, 2005 | Rating: 0 | Author: John Drifter | Size: 964 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
54. | Kryptel Lite 1.1 (kryptel.com) | ||
Explorer right-click menu. Kryptel Lite uses industry-standard DES cipher for encryption and includes a single-pass file shredder for secure file deletion. Kryptel Lite is a drag-and-drop file encryption program, providing easy-to-use and secure data protection. The program is a one-click solution and can process any number of files or folders in a single | |||
Updated: 9, 2005 | Rating: 16 | Size: 1202 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
55. | Lens - magnifying glass 1.5 (abfsoftware.com) | ||
The Lens - magnifying glass is a graphic tool for viewing the screen area in different zooms (magnify from 1x to 64x). This program was designed as a demo of the krpRegions library (the library for creating cool looking interfaces), but many people with poor eyesight have found this program very helpful. The | |||
Updated: 3, 2005 | Rating: 0 | Author: Anton Karpenko | Size: 594 kb | Freeware Go to category: Desktop > Other Similar programs | |||
56. | Lens - magnifying glass 1.5 (abf-soft.com) | ||
The Lens - magnifying glass is a graphic tool for viewing the screen area in different zooms (magnify from 1x to 64x). This program was designed as a demo of the krpRegions library (the library for creating cool looking interfaces), but many people with poor eyesight have found this program very helpful. The | |||
Updated: 9, 2005 | Rating: 16 | Author: Anton Karpenko | Size: 594 kb | Freeware Go to category: Graphic Apps > CAD Similar programs | |||
57. | LeoPicture 1.5 (leokrut.com) | ||
Select and modify part of image. Copy/paste image or selected area(s). Print and print preview images. Analyze color distribution and symmetry patterns in image and create MS Word report. Intuitive, colorful, rich and transparent user interface All intermediate variants of picture are | |||
Updated: 3, 2006 | Rating: 16 | Author: Leonid Sakharov | Size: 284 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
58. | Looking Glass 1.0b2 (LivingGraphs.com) | ||
Looking Glass is a geometric optics construction set that allows students to create and explore situations involving several objects, lenses, mirrors and images. This software takes an interactive, visual approach to physics. Looking Glass will help students develop an intuition for the effect of lenses and | |||
Updated: 9, 2005 | Rating: 48 | Author: Shawn Leclaire | Size: 807 kb | Commercial Go to category: Graphic Apps > CAD Similar programs | |||
59. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
(SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for files and strings in a single step. Aside from providing core string and file encryption services, Crypt implements advanced features such as Base64 based encryption | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
60. | M2Crypto Installer for Python 2.3 0.13.1 (sandbox.rulemaker.net) | ||
the following: - RSA, DSA, DH, HMACs, message digests, symmetric ciphers (including AES). - SSL functionality to implement clients and servers. - HTTPS extensions to Python's httplib, urllib and xmlrpclib. - PKI functionality. - Unforgeable HMAC'ing AuthCookies for web session management. - FTP/TLS client and server. - S/MIME. - ZServerSSL: A HTTPS server for | |||
Updated: 9, 2005 | Rating: 1064 | Author: Pheng Siong Ng | Size: 356 kb | Shareware Go to category: Development > Other Similar programs | |||
61. | MicroWorld Anti Virus Toolkit 1.0.6.1 (mwti.net) | ||
MicroWorld Technologies Inc.has developed a free eScan AntiVirus toolkit utility, that will help you diagonize if your machine is infected by a virus. This tool also cleans your registry and other system areas of the damage that a virus could have done. The best part of eScan toolkit utility, is | |||
Updated: 8, 2004 | Rating: 16 | Author: kshipra Saxena | Size: 3589 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
62. | OldMovie 1.30n (v-d-l.com) | ||
A commercial plugin (only $19.95) with which you can transform all your digitized images into photographs and films of the old days. Add grain, shade the images into a monochrome palette, defocus, brighten or darken the edges, add highly configurable scratches, hairs and spots of dust and fat. Jittering | |||
Updated: 9, 2005 | Rating: 1321 | Author: Martijn Lee, van der | Size: 649 kb | Demo Go to category: Graphic Apps > Other Similar programs | |||
63. | Pixie Power Swapper 1.02 (artichokegames.com) | ||
Pixie Power Swapper is a light hearted puzzle game in which you swap blocks back and forth across a game board in order to complete lines of a given color. To aid you in this endeavor you have access to four Pixies, each of whom can perform special tricks. Your pixie power meter rises with your score, when it | |||
Updated: 9, 2005 | Rating: 0 | Author: Katarzyna Uchnast | Size: 2604 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
64. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
65. | QuickScore Elite Level II 11.0 (sionsoft.com) | ||
Elite Level II is Sion Software's premier music composition and notation software - incorporating scoring, arranging, MIDI and audio sequencing and recording. Use it to create publication-quality scores, musical content for the desktop and world wide web, audio CDs, MP3s and soundtracks for film, video and games. This is the program that Electronic Magazine awarded their 1995 | |||
Updated: 2, 2006 | Rating: 0 | Author: Cris Sion | Size: 4338 kb | Demo Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
66. | SafeCryptor 1.5 (gemiscorp.com) | ||
SafeCryptor provides you with safe, fast and reliable text encryption anywhere, anytime, and lets you securely and quickly send all of your sensitive and personal information (e.g., login, password, credit card number) via e-mail or chat session to your partners, customers, friends or family. SafeCryptor is | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 1472 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
67. | SafeDisk 2.10 (guardcomplete.com) | ||
128bit on-the-fly disk encription. Allows to create and use virtual ciphered disks. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK, RSC. Stealth. Built-in protection against keyboard spies. Mode "under enforcement". Locking of access to workstation at Windows loading/idle. Low level wipe. SafeDisk is 128bit on-the-fly disk encription. Supports algorithms AES | |||
Updated: 3, 2005 | Rating: 42 | Author: Andre Belokon | Size: 820 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
68. | SecExFile Home 1.1 (bytefusion.com) | ||
to use, password based, intuitive + Strong 128/384 bit SecExMail cipher, incorporating 256 bit Twofish + Encrypt multiple files and folders into a single encrypted archive + Known plain text attack and frequency analysis protection SecExFile brings one-click file protection to the desktop. It integrates with Windows Explorer to make securing your personal or corporate data easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 1747 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
69. | SecExMail Home 1.51 (bytefusion.com) | ||
uses 8192-bit RSA public key encryption and a secure 384-bit cipher, incorporating the AES candidate Twofish algorithm; SecExMail features PGP-style e-mail keys, but without the dependence on e-mail-software-specific plug-ins. The software runs unobtrusively as a relay agent in the system tray on your desktop and actively filters messages between your e-mail client and your mail | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 2613 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
70. | SecureCRT 4.1.2 (promaxum.com) | ||
SSH2 support provides AES, 3DES, RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and databases that are now | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
71. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
Features include: Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
72. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
Features include: Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
73. | The Panorama Factory 4.2 (panoramafactory.com) | ||
The Panorama Factory creates high-quality panoramas in a highly automated fashion from a set of overlapping digital images. You can add image hotspots, export to VR formats and create web pages that link your images into virtual tours. The software also corrects for lens-induced distortions and creates either | |||
Updated: 2, 2006 | Rating: 7410 | Author: John Strait | Size: 4917 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
74. | Ulead PhotoImpact 8 (ulead.co.uk) | ||
PhotoImpact 8 delivers total image editing for the PC. Easily manage and enhance digital photos, create stunning graphics and produce high-impact Web pages for recreational or professional use. Professional looking photos are easy to make using one-click auto-correct commands. Add extra pizzazz to photos with | |||
Updated: 9, 2005 | Rating: 929 | Author: Jackson Chang | Size: 45156 kb | Demo Go to category: Graphic Apps > Editors Similar programs | |||
75. | Ulead PhotoImpact 8 (ulead.com) | ||
PhotoImpact 8 is designed to meet the needs of digital camera users and amateur photographers for managing, enhancing and sharing photos. PhotoImpact also provides Web and graphics enthusiasts with a comprehensive set of tools without a steep learning curve. PhotoImpact gives you easy one-click photo | |||
Updated: 9, 2005 | Rating: 0 | Author: Ulead Systems | Size: 31744 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
76. | Ulead PhotoImpact 8 (ulead.com) | ||
PhotoImpact 8 is designed to meet the needs of digital camera users and amateur photographers for managing, enhancing and sharing photos. PhotoImpact also provides Web and graphics enthusiasts with a comprehensive set of tools without a steep learning curve. PhotoImpact gives you easy one-click photo | |||
Updated: 9, 2005 | Rating: 42 | Author: Ulead Systems | Size: 31744 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
77. | URenameIT 2.3 (particleg.com) | ||
and time stamps. Perform advanced renaming using SoundEx, Caesars cipher, and parse various types of documents to extract a particular line for the file name. Many operations are geared towards cleaning, including space removal and consolidation, case management, normalizing, and padding. In addition, the find and remove abilities against sub strings or positions is near surgical in | |||
Updated: 9, 2005 | Rating: 0 | Author: ParticleG ParticleG | Size: 1180 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
78. | USA Shield 2.15 (usa.safeworld.info) | ||
USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
79. | virtualCrypt 3.02 (netindiasolutions.com) | ||
virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
80. | World Saver 3D 3.3 (meanfox.com) | ||
A unique, stunning, fully-featured 3D Windows screensaver by MeanFox.com. It features a beautifully rendered 3D world slowly spinning against a backdrop of nebulae and stars, with the Sun and Moon correctly positioned in relation to the Earth. Additional visual effects including clouds, atmosphere, and lens | |||
Updated: 9, 2005 | Rating: 0 | Author: Mean Fox | Size: 926 kb | Shareware Go to category: Desktop > Similar programs | |||
81. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
host machine. X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive | |||
Updated: 2, 2006 | Rating: 82 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
82. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
host machine. X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
83. | XFILEBOX 1.0 (wisehuman.com) | ||
your files more easily, and also a security utility with built-in cipher that enables you to store your files securely. XFILEBOX is a powerful, easy to use utility for managing, protecting, and backuping your important files or folders. It is a wonderful archive manager that enables you to organize your files more easily, and enables you to store your files | |||
Updated: 9, 2005 | Rating: 0 | Author: Xia Mou | Size: 1562 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
84. | ZoomAView - The Computer Magnifier! 1.5 (zoomaview.com) | ||
to strain your eyes. Choose to have the lens show exactly what's under your mouse wherever it moves, or use "locked" mode for keeping the magnified area in place (great for Internet games!) ZoomAView also lets you pick from various pointer styles, and can reverse colors within the lens view (photo negative) for maximum visual clarity. ZoomAView is a powerful, easy to use computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Wondermill Webworks | Size: 1657 kb | Shareware Go to category: Graphic Apps > Screen Capture Similar programs | |||
85. | ZoomMagic 2.03 (peakstars.com) | ||
ZoomMagic is a powerful tool to magnify any portion of your screen, measure distances or capture a screen area. Targeted users are: designers and developers on the hunt for those lost pixels .. or in the need for a fast screencapture, users with visual impairments or anybody who needs to find the shortest way | |||
Updated: 9, 2005 | Rating: 0 | Author: Peak Stars | Size: 1668 kb | Freeware Go to category: Graphic Apps > Other Similar programs | |||
|
Home > Cipher software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|