|
||||||
|
||
|
Home > Public key software |
Related keywords: public, Public, public records, public address, public kiosks, public access internet terminal, public relations, public key encryption, Public Analysis, public folders |
|
|
1. | Amazing Photo Editor 5.3.1 (silvereaglesoft.com) | ||
Key Features: 1. Support 53 input formats and 27 output formats. 2. photo files access. ( New, Open, Save, Save as, Save all, Print, Email photo Scanner, Convert image format, Batch Conversion ) 3. Create and use macros. ( Create, Open, Edit, Save as, Delete ) 4. Multi-select tool. ( | |||
Updated: 3, 2006 | Rating: 69 | Author: Peng Chen | Size: 2209 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
2. | SecureBlackbox.NET 4.3 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.), including Windows Certificate Storages and cryptography hardware (USB cryptotokens, smartcards). * PGPBlackbox - clean-room implementation of all PGP algorithms and standards with | |||
Updated: 2, 2006 | Rating: 48 | Author: EldoS Corporation | Size: 8799 kb | Commercial Go to category: Development > C / C++ / C-sharp Similar programs | |||
3. | Advanced Encryption Package 2006 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 or any other software. The program includes a file shredder that wipes the contents of your original | |||
Updated: 2, 2006 | Rating: 105 | Author: SecureAction Research, LLC | Size: 2558 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 PRO or any other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | SecureBlackbox (VCL) 4.3 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.), including Windows Certificate Storages and cryptography hardware (USB cryptotokens, smartcards). * PGPBlackbox - clean-room implementation of all PGP algorithms and standards with | |||
Updated: 2, 2006 | Rating: 16 | Author: EldoS Corporation | Size: 42127 kb | Commercial Go to category: Development > Delphi Similar programs | |||
6. | OnTarget 3.77.17 (padfile.radsoftware.org) | ||
Crespo Software Distributing, OnTarget is now available again to the public via RAD Software, and with added features that make it the better than ever! Called `The perfect 10-minute break', OnTarget has just the right mix of fun and learning that makes it a game enjoyed by children from 8 to 80 | |||
Updated: 2, 2006 | Rating: 70 | Author: Rad Software | Size: 1324 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
7. | OnTarget 3.77.17 (radsoftware.org) | ||
Crespo Software Distributing, OnTarget is now available again to the public via RAD Software, and with added features that make it the better than ever! Called `The perfect 10-minute break', OnTarget has just the right mix of fun and learning that makes it a game enjoyed by children from 8 to 80 | |||
Updated: 2, 2006 | Rating: 16 | Author: Rad Software | Size: 1324 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
8. | WinSSHD 4.12 (bitvise.com) | ||
bvterm terminal access. Supports Windows groups and domain accounts; public key and Kerberos authentication; virtual accounts; provides powerful graphical as well as scriptable configuration. Ideal for remote server administration; as file server (SFTP); or for a software VPN (SSH port | |||
Updated: 2, 2006 | Rating: 289 | Author: Bitvise Limited | Size: 3912 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
9. | Tunnelier 4.12 (bitvise.com) | ||
Remote Desktop forwarding for graphical server access. Supports public key user authentication, as well as transparent authentication with Kerberos (GSSAPI) or NTLM. To satisfy special requirements, Tunnelier is highly customizable using a variety of command line parameters. Ideal for remote server administration using SSH - implements a complete set of features for this | |||
Updated: 2, 2006 | Rating: 1238 | Author: Bitvise Limited | Size: 4380 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
10. | WinLock Professional 4.32 (crystaloffice.com) | ||
is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
11. | WinLock 4.32 (crystaloffice.com) | ||
is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
12. | Wallpaper Sequencer Standard 4.51 (wallpapersequencer.com) | ||
system startup or at specified time periods) or by pressing a hot key. Semi-transparent wallpaper calendar. Taskbar transparency and | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Dryazgin | Size: 4308 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
13. | Wallpaper Sequencer Standard 4.51 (draxysoft.com) | ||
system startup or at specified time periods) or by pressing a hot key. Semi-transparent wallpaper calendar. Taskbar transparency and | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Dryazgin | Size: 4308 kb | Shareware Go to category: Desktop > Other Similar programs | |||
14. | NextSTART 3.41 (winstep.net) | ||
automatically read the directory structure of your Programs folder(s) and create a menu for you on the fly! In fact, thanks to NextStart's dynamic menu support, it will create as many menus as you wish based on any hard drive or directory! NextSTART features built-in task management to control running apps and the Windows System Tray. Gain access to your running apps via | |||
Updated: 2, 2006 | Rating: 0 | Author: Jorge Coelho | Size: 4405 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
15. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
etc.). Easy access at any time with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites computers access, remote users (authorized or blocked), etc. - Allows to compress remote clipboard information before transfer it to your computer, quick and easy! - Log for process. - Automatic Clear | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
16. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
on the target system. DevSolutions SecureFile incorporates public key cryptography in which two complementary keys-a key pair-are used to maintain secure communications. It compresses and encrypts selected files and produces a self-decryption archive. The encrypted file can be decrypted simply by double clicking the archive with the given password for | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
17. | VisNetic MailServer 8.3.5 (deerfield.com) | ||
SSL/TLS encryption. IM transmissions between VisNetic Mail Server's IM server and any Jabber-compatible IM server located outside your organization are also secured via SSL/TLS. VisNetic Mail Server is a high performance mail server with an extensive, highly configurable feature set. This secure mail server is also ideal for use as a gateway mail server, features built-in anti spam | |||
Updated: 2, 2006 | Rating: 124 | Author: Deerfield Com | Size: 25757 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
18. | #1 Smart Protector Pro - Internet Eraser 4.12 (smartprotector.com) | ||
Other features: Cookie Manager; Scheduling; Stealth mode; Emergency Key; Deleting of custom files and folders; Recent Files-RealPlayer, Media Player, DivX Player, Power DVD ACDSee 3.x, 4.0, 5.0 support Acrobat Reader 3.x, 4.x, 5 Get Right, Go!zilla, NetVampire, Download Accelerator MS Office 97, 2000 | |||
Updated: 2, 2006 | Rating: 440 | Author: Ivelin Kovatchev | Size: 440 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
19. | Private Shell SSH Client 2.1 (privateshell.com) | ||
not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications (such as Oracle, MySQL, CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
20. | DataparkSearch 4.37 (dataparksearch.org) | ||
open sources web-based search engine released under the GNU General Public License and designed to organize search within a website, group of websites, intranet or local system. DataparkSearch consists of two parts. The first part is indexing mechanism (indexer). Indexer walks over html hypertext | |||
Updated: 2, 2006 | Rating: 0 | Author: Maxim Zakharov | Size: 2179 kb | Freeware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
21. | TreePad PLUS 7.2 (treepad.com) | ||
any kind of data has never been easier: use TreePad's tree to browse any previously created/imported text or document, just as you browse directories/folders in Win-Explorer. TreePad is fully customizable: work the way you feel comfortable! TOOL BARS: can be hidden, visible, floating, moved around. SEARCH ENGINE: very fast, multiple options for tree/texts, search/replace | |||
Updated: 2, 2006 | Rating: 0 | Author: Henk Hagedoorn | Size: 388 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | VidLizard 1.24 (vidlizard.com) | ||
the keyboard layout at his own discretion. Skin support. There's a possibility to adjust playback and rewind rate. Screenshot saving. The possibility of controlling several audio streams in a video file. VidLizard defines video codecs installed on computer and allows choosing the most preferable one for playing. Infrared remote control WinLIRC is supported. In the the program you | |||
Updated: 2, 2006 | Rating: 82 | Author: Klim Agarkov | Size: 921 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
23. | Magic Lines 3.0.3 (agentix.org) | ||
explode and you score. Any ball being moved needs a clear shot to it's destination, or it won't move. Remember that each move there appear three new balls. So the quicker you clear board, the longer you survive. The objective of the game is to remove from the playing board as many balls as possible and | |||
Updated: 2, 2006 | Rating: 0 | Author: Agentix Software | Size: 943 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
24. | Magic Beads 2.93 (agentix.org) | ||
for you to make. Try the puzzle and feel the pure pleasure. Key features: * Several colorful skins for falling blocks; * Changeable background style; * Built-in midi player. Draw a bead on relaxation and play this gripping puzzle. Draw a one-color line made up of at least three beads and you will start scoring your points! Amusing gameplay, nice music and eye-pleasing | |||
Updated: 2, 2006 | Rating: 42 | Author: Agentix Software | Size: 951 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
25. | SecureBlackbox (ActiveX/DLL) 4.2 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.). PKIBlackbox supports Windows Certificates and Windows Certificate Storages. PKIBlackbox lets you manage certificates, stored on CryptoCards and USB CryptoTokens, via CryptoAPI. * | |||
Updated: 2, 2006 | Rating: 0 | Author: EldoS Corporation | Size: 4127 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
26. | Maintenance Parts Bin 7.1 (nhuntsoftware.biz) | ||
Maintenance Parts Bin is a comprehensive software inventory management tool. You can maintain your inventory as well as databases in the most cost effective and suitable way. The primary functionality is to maintain part stocks, cater to reorders and track parts. Secondarily, this tool allows you to | |||
Updated: 2, 2006 | Rating: 100 | Author: Nathan Hunt | Size: 10051 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
27. | InfoScope 3.0.1 (macrofocus.com) | ||
is a highly interactive visualization tool with the following key characteristics: - it shows the big picture by providing an overview of the essential relationships between cities - it encourages the explorative discovery of interesting features and unexpected patterns - it avoids the feeling of being lost in details by embedding them in the overall context - it supports | |||
Updated: 2, 2006 | Rating: 0 | Author: Luc Girardin | Size: 30427 kb | Freeware Go to category: Business > Other Similar programs | |||
28. | Access2MySQL PRO 5.1.3 (dmsofttech.com) | ||
with Multilanguage support. The current version converts Primary keys, Indexes and foreign keys (relations) . Renaming of tables, fields, indexes before conversion is also available. There is an ability to save data to PHP script or to a dump file that allows you to get over the restrictions on access to MySQL database if any. Sessions support allows you to save all your | |||
Updated: 2, 2006 | Rating: 256 | Author: Dmitry Narizhnykh | Size: 7266 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
29. | Access2MySQL SYNC 4.0.3 (dmsofttech.com) | ||
Access2MySQL Sync is an efficient converter which performs MS Access (mdb) to MySQL and MySQL to Access database conversions simply by configuring several options in wizard-like application. Acces2MySQL Sync gives you a chance not only convert your data with synchronization, but there is also a possibility to | |||
Updated: 2, 2006 | Rating: 191 | Author: Dmitry Narizhnykh | Size: 7008 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
30. | ABC Amber XML Converter 5.01 (thebeatlesforever.com) | ||
(Extensible Markup Language) is the key format in today's environment. This language allows us to describe and deliver structured data from any application. However sometimes this format is not easy to read. ABC Amber XML Converter is a powerful XML/XSL processor which converts your XML documents into any document format (PDF, HTML, RTF, TXT ANSI, TXT Unicode, DOC, MCW, WRI | |||
Updated: 2, 2006 | Rating: 113 | Author: ProcessText Group | Size: 929 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
31. | TreePad PLUS 7.2 (treepad.com) | ||
any kind of data has never been easier: use TreePad's tree to browse any previously created/imported text or document, just as you browse directories/folders in Win-Explorer. TreePad is fully customizable: work the way you feel comfortable! TOOL BARS: can be hidden, visible, floating, moved around. SEARCH ENGINE: very fast, multiple options for tree/texts, search/replace | |||
Updated: 2, 2006 | Rating: 0 | Author: Henk Hagedoorn | Size: 388 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
32. | Audio Sliders 4.1 (codesector.com) | ||
save and restore mixer settings manually or at specified time. Hot-keys for quick volume control, too! Remote Control provides hot-key control for the most popular CD and Mp3 players, including Winamp, Sonique, Quintessential CD, etc. The same hot-keys can even be used for all players. Auto-created submenus can control any installed player. When no external CD or | |||
Updated: 2, 2006 | Rating: 76 | Author: Jackie Ray | Size: 1279 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
33. | Audio Notes Recorder 6.1 (xemico.com) | ||
a cassette file represents one continual rewritable message. Other key features include transcription playback mode, support for unattended scheduled recordings, export to WAV, MP3, OGG Vorbis or EXE, sound effects (echo, equalizer, flanger, pitch), message editor for making cut-outs and splitting | |||
Updated: 2, 2006 | Rating: 132 | Author: XemiComputers Ltd. | Size: 3120 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
34. | Safe Express Free 3.4 (netsafesoft.com) | ||
highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 927 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
35. | Pinky 5.94 (donsoft.net) | ||
is a media player that's a little different to the rest, enabling you to add to your collection, as well as play it. This software is very easy to use, without the overhead of a normal text menu system. It's actions are controlled by buttons, check boxes and/or keyboard commands. Pinky can be set to run in Robot Mode, where you don't have to do a thing, once it has been | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Cunningham | Size: 4844 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
36. | iGo Incognito 1.2 (igo-incognito.com) | ||
open forums. The iGo Incognito network is built on a combination of public key encryption and the US Advanced Encryption Standard (AES). If you want to be sure that no-one is (or ever can) reading or intercepting your messages, chats and files, iGo Incognito is for you. As is common with all Instant Message systems, you can see in real time whether friends are online or | |||
Updated: 9, 2005 | Rating: 48 | Author: Paul Roigan | Size: 1541 kb | Freeware Go to category: Audio & Multimedia > Other Similar programs | |||
37. | Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) | ||
Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure | |||
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Development > Other Similar programs | |||
38. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
Crypt .NET is an advanced encryption component that offers both RSA public-key encryption with digital signatures as well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
39. | SignGen 1 (gjsmith.com) | ||
principles used by SignGen are similar to the PKI standards of a Public and Private key being used to identify the user and a unique transaction key generated on behalf of that user for stamping within their document. SignGen also provides a simple Electronic File management | |||
Updated: 9, 2005 | Rating: 0 | Author: Garry Smith | Size: 2490 kb | Demo Go to category: Business > Office Suites & Tools Similar programs | |||
40. | AES Home 4.0 (abensoft.com) | ||
for sending encrypted files to people who do not have PGP or CHAOS Public Key installed. AES Home is the suite of encryption tools for personal and professional | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
41. | AES Pro 5.5 (abensoft.com) | ||
Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
42. | Active CHAOS 5.0 (safechaos.com) | ||
CHAOS is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 42 | Size: 996 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
43. | CHAOS Messenger 4.0 (safechaos.com) | ||
for sending encrypted files to people who do not have PGP or CHAOS Public Key installed. CHAOS Messenger is the utility program for safe distribution of the | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
44. | CHAOS Self Decryptor 3.9 (safechaos.com) | ||
for sending encrypted files to people who do not have PGP or CHAOS Public Key installed. CHAOS Self Decryptorr is the program that creates self-decrypting chaos-files for | |||
Updated: 9, 2005 | Rating: 0 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
45. | Home CHAOS 3.5 (safechaos.com) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
46. | NotesImp Lite 1.5.2 (notesimp.com) | ||
NotesImp Lite is handy and low resource consuming organizer with tree like hierarchical structure of notes. NotesImp Lite has ability to change its appearance using skins. You'll also find customizable keyboard shortcuts, automatically URLs detection and many more. NotesImp Lite works under Windows 9x, ME | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 681 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
47. | Classical Block 3.00 (zhangduo.com) | ||
Classical Tetris is designed for Tetris beginners and experts and even advanced experts. They alike would find many features that would increase their enjoyment of Tetris as well as improve their skill with the game. You will play the classical Tetris with MIDI, WAV or MP3 background music that you | |||
Updated: 9, 2005 | Rating: 42 | Author: Duo Zhang | Size: 625 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
48. | PrivacyKeyboard 6.1 (anti-keylogger.com) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | ABF Photo Camera 1.01 (abf-soft.com) | ||
are fully supported. The program has a huge help manual, so use F1 key wherever you need. ABF Photo Camera is an extremely useful capture application. It allows you to easily make a real photo studio from your web cam or other capture device. You'll be able to see a video, take pictures and even make timer delayed | |||
Updated: 9, 2005 | Rating: 42 | Author: Anton Karpenko | Size: 1115 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
50. | NotesImp 1.5.2 (notesimp.com) | ||
of a menu and tool bar. Commands are accessed through main window's menu, right-click context menus or the tray icon. NotesImp works under Windows 9x, ME, NT4, 2000 and XP. NotesImp is handy and low resource consuming organizer with tree like hierarchical structure of notes and ability to protect your data using encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 1055 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
51. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business corporations! Your information will never become the property of your | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
52. | Spam Alarm for POP3 2.2.2.18 (dignitysoftware.com) | ||
statistical analysis of individual words and heuristic scanning. Key Features: Blocks 99% of spam with zero false positives Standalone application - your email client remains intact Multiple e-mail account processing Attractive user interface with the skin engine No special configuration is required Black & White lists are available for precise settings No user | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugeny Politskovoy | Size: 3704 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
53. | OnTarget 3.76.16 (hometown.aol.com) | ||
Crespo Software Distributing, OnTarget is now available again to the public via RAD Software, and with added features that make it the better than ever! Called `The perfect 10-minute break', OnTarget has just the right mix of fun and learning that makes it a game enjoyed by children from 8 to 80 | |||
Updated: 9, 2005 | Rating: 91 | Author: Rad Delaroderie | Size: 1244 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
54. | SiteKiosk 6.0.98 (sitekiosk.com) | ||
feature-packed package is designed for public access stations and turns any PC into a kiosk. Users can only access sites, applications, and settings you approve through a shell you design. You can command SiteKiosk and extend its functionality via scripts, objects, and ActiveX controls, or simply configure it with wizards. Wizards let you assign individual access rights and export | |||
Updated: 9, 2005 | Rating: 0 | Author: PROVISIO PROVISIO | Size: 11203 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
55. | Maintenance Parts Bin 6.2.7 (maintenancepartsbin.com) | ||
Maintenance Parts Bin is a comprehensive software inventory management tool. You can maintain your inventory as well as databases in the most cost effective and suitable way. The primary functionality is to maintain part stocks, cater to reorders and track parts. Secondarily, this tool allows you to | |||
Updated: 9, 2005 | Rating: 0 | Author: Nathan Hunt | Size: 10051 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
56. | SPAM Shredder 3.1 (safechaos.com) | ||
SPAM Shredder is an anti-spam email client that automatically classifies incoming emails as spam or non-spam. SPAM Shredder is a spam filtering software that lets you remove spam emails just from the mail server without pulling them down into your Inbox. SPAM Shredder ensures the efficient and easy control | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
57. | Safe Express Home 4.2 (netsafesoft.com) | ||
highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
58. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
strong encryption algorithms. It supports traditional secret-key encryption as well as public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files. For traditional strong encryption, the library supports the newly adopted AES (US Advanced Encryption Standard) secret-key encryption algorithm (Rijndael), which uses | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
59. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
60. | Visual Patch 1.0.0.3 (indigorose.com) | ||
Rose's Visual Patch provides software developers with a comprehensive solution for creating secure full-history software update patches. Designed for use on all 32-bit Windows platforms, these compact, self-installing patch files can be distributed on diskette or CD-ROM or sent via email, web or LAN. Unlike setup programs, which contain all of the files needed to run an | |||
Updated: 9, 2005 | Rating: 0 | Author: Colin Adams | Size: 5801 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
61. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
passwords and pass phrases. Top Secret Crypto Gold includes RSA Key Creation, Public and Secret Key Ring Management procedures, data compression procedures, e-mail and file encryption procedures, One Time Pad Key File and True One Time Pad File creation, a completely | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
62. | Screen Privacy 1.2 (pictures-soft.com) | ||
Privacy allows you to hide and restore windows by pressing a secret key. It protects your privacy and prevent your information from being seen by anyone else. Screen Privacy allows you to work calmly and do not worry about uninvited visitors. While your application are hidden, they are still working | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
63. | SDATimer 1.73 (dasp.at.tut.by) | ||
is multifunctional digital countdown timer, clock and stopwatch. The key features are: Calendar with Sunrise,Sunset time, Moon Phase. Cool interface with skins support, easy to use. Mp3 files support. Easy to set time - only click by digits, or by using time presets. Original AutoHide feature | |||
Updated: 9, 2005 | Rating: 0 | Author: Spitsyn Dmitry | Size: 794 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
64. | SecureFile 2.0 (securefile.tripod.com) | ||
program that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
65. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
of it, i.e. opening it and prompting the user to enter a matching key phrase. Its user friendly interface is very intuitive - no need to study the manual. ShyFile also encrypts single or multiple binary files as well as whole folders with all its subfolders in a single run, which require a free demo version of ShyFile to decode though. ShyFile exclusively makes use of its own | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | PC Accelerator 2005 Edition 1.1 (smartalec2000.com) | ||
and intelligent memory defragmentation - Manual adjustments for key functions. - Save favorite configurations to a file. - Built-in optimization wizard to help you fine-tune your system to the max. - Support for all the latest network protocols and equipment, including wireless connections. Brand new integrated PCPerformance control center with the following features | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Wong | Size: 3614 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
67. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | Private Desktop 1.91 (tropsoft.com) | ||
comes in... Private Desktop will allow you to escape to your "public" desktop with the push of a button. Private Desktop allows you to keep a second password protected desktop containing all your private applications. Access to this desktop can be completely customized: its toolbar icon can be made either very small or invisible, hotkeys can be specified to remove you from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 237 kb | Demo Go to category: System Utilities > Other Similar programs | |||
69. | Puffer 4.02 (briggsoft.com) | ||
email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with wipe functions. Data file and e-mail encryption utility for Win 95 to XP. Uses | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
70. | NETObserve 2.98 (exploreanywhere.net) | ||
a network) and moderate, administrate, and monitor the machine's activity. NETObserve's remote administration features include file system browsing, file transferring, registry key editing, startup process moderating, favorite place viewing, open port and connection records, real-time access and moderating of windows, processes, desktop, and more! NETObserve also | |||
Updated: 9, 2005 | Rating: 16 | Author: Bryan Hammond | Size: 1127 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
71. | NotesImp 1.5.2 (notesimp.com) | ||
of a menu and tool bar. Commands are accessed through main window's menu, right-click context menus or the tray icon. NotesImp works under Windows 9x, ME, NT4, 2000 and XP. NotesImp is handy and low resource consuming organizer with tree like hierarchical structure of notes and ability to protect your data using encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 1055 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
72. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the confidential information instead of accident-sensitive pkzip, arj etc | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
73. | EugeneShutdown 1.00 (eugenesoft.com) | ||
shutdown of remote computer. The program provides the following key features: ability to force shutdown, force if hung applications shutdown, shutdown remote computer with user-defined message and timeout. EugeneShutdown is a system utility for Windows 9x/ME/NT/2000/XP operating systems that allows to automatically shutdown, power off, reboot or log off current user at a specific | |||
Updated: 9, 2005 | Rating: 34 | Author: Eugene Konovalov | Size: 641 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
74. | Cresotech Easystart 2.0 (cresotech.com) | ||
CRESOTECH EASYSTART is a tray-based skinnable tool to easily manage, locate, start and monitor any program on your computer. No matter how powerful is your PC, with dozens of programs stored it becomes a nuisance and loss of time to find and start the one that you need right now. Hair-of-the dog solution is | |||
Updated: 9, 2005 | Rating: 0 | Author: Cresotech, Inc. | Size: 1508 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | Public Key File and Email Encryption freeware 3.2.1 (deltacrypt.com) | ||
OneClick Personal does it all: This Public Key Encryption Software encrypts files, text and emails with 1024-bit RSA protection, digital signatures, and unalterable public keys. It offers the basic encryption functionalities FREE OF CHARGE. Select files and folders or a combination of both and let DeltaCrypt OneClick Personal secure your sensitive data. For | |||
Updated: 9, 2005 | Rating: 0 | Author: Deltacrypt Technologies | Size: 1250 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
76. | AlphaXP 1.1.2 (zeroherosoftware.com) | ||
in, don't worry because AlphaXP is built with users in mind so it's easy-to-use and if you're still curious about anything AlphaXP includes a website style help file that explains everything in-depth using plain english with pictures and animations. Get more info and see pictures of this five-star award-winning software at www.zeroherosoftware.com AlphaXP is a powerful system | |||
Updated: 9, 2005 | Rating: 42 | Author: John Katenay | Size: 1323 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
77. | Anti-keylogger 6.1 (anti-keyloggers.com) | ||
of very different operation principles. Due to the Anti-keylogger's protection spy software will not be able to record and steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a decision | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 2659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
78. | CHAOS Chameleon 3.8 (safechaos.net) | ||
others. CHAOS Chameleon has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. CHAOS Chameleon has comprehensive privacy tools including file/folder compression, file/folder shredder. CHAOS Chameleon has comprehensive privacy tools including file/folder compression, file/folder | |||
Updated: 9, 2005 | Rating: 0 | Size: 374 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | CHAOS Messenger 4.0 (safechaos.net) | ||
for sending encrypted files to people who do not have PGP or CHAOS Public Key installed. CHAOS Messenger is the utility program for safe distribution of the | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
80. | CHAOS Public Key 4.23 (safechaos.net) | ||
uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send off data on email. The program is compact, efficient and user friendly. CHAOS supports | |||
Updated: 9, 2005 | Rating: 0 | Size: 410 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
81. | CHAOS Self Decryptor 3.9 (safechaos.net) | ||
for sending encrypted files to people who do not have PGP or CHAOS Public Key installed. CHAOS Self Decryptorr is the program that creates self-decrypting chaos-files for | |||
Updated: 9, 2005 | Rating: 16 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
82. | CHAOS' Doors 3.7 (safechaos.net) | ||
Comprehensive privacy tools including file/folder encryption, e-mail encryption, file/folder shredder. The program is compact, efficient and user friendly. Required cryptographic procedures are enforced in the new graphical user interface Drag and Drop support. CHAOS' doors is opened in a world of safety | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
83. | 1st Calculator 1.15 (romanlab.com) | ||
Handy and useful expression calculator and unit converter with skins. Main features: fully customizable interface with skins; keyboard shortcuts; all arithmetic operations, more than 20 functions; editable lists of constants and unit conversions; recalling previously used expressions; five result formats with | |||
Updated: 9, 2005 | Rating: 0 | Author: Roman Nikolaev | Size: 558 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
84. | Active CHAOS 5.0 (safechaos.net) | ||
CHAOS is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 0 | Size: 996 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
85. | AES Home 4.0 (aes.safeworld.info) | ||
for sending encrypted files to people who do not have PGP or CHAOS Public Key installed. AES Home is the suite of encryption tools for personal and professional | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
86. | AES Pro 5.5 (aes.safeworld.info) | ||
Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public | |||
Updated: 9, 2005 | Rating: 16 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
87. | Clock 2.0 (soft.ria-media.com.ru) | ||
screen saver on your desktop? RIA-Media Clock the best choice. It's easy and simple. RIA-Media Clock - skinable clock screen | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Markin | Size: 5434 kb | Shareware Go to category: Desktop > Similar programs | |||
88. | TZ Spyware-Adware Remover 8.2.0.0 (trackzapper.com) | ||
Remover is an Adware, SpyWare, Key Loggers, Trojans, Dialers, Hijackers, Trackware, Thiefware, Big Brotherware removal utility with multi-language support. It scans your memory (for active memory ad components, which are not stored on your hard drive and last only as long as the computer is powered up), registry, & drives for known adware modules & for known SpyWare parasites & | |||
Updated: 9, 2005 | Rating: 0 | Author: Track Zapper | Size: 6659 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
89. | VShell 2.2.4 (promaxum.com) | ||
server configuration, options for Kerberos via GSSAPI, end user public-key upload, and triggers for automation of routine tasks reduce hassles for busy system administrators. Integrate this strong security with your existing infrastructure to support enterprise-wide authentication that goes beyond weak password authentication. VShell includes built-in support for Kerberos | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 3703 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
90. | PopMessenger 1.61 (leadmind.com) | ||
opportunity to win the race and beat the competition. One of the key factors of successful business operation is well-thought staff communication system. Good managers know that each minute of work time spent in vain means profit loss. That is why building fast and convenient personnel communication environment is so important, these days. Common means of communication, such as | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
91. | SecEx Secure Shell Client 1.6 (bytefusion.com) | ||
SecEx also shields against IP and DNS spoofing by recording a server's public host key. During subsequent connection attempts, the known host key is compared to the host key offered by the server. SecEx is a graphical SCP and SFTP client and secure terminal emulator that | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 3610 kb | Demo Go to category: System Utilities > Other Similar programs | |||
92. | SecExMail Home 1.51 (bytefusion.com) | ||
e-mail encryption software uses 8192-bit RSA public key encryption and a secure 384-bit cipher, incorporating the AES candidate Twofish algorithm; SecExMail features PGP-style e-mail keys, but without the dependence on e-mail-software-specific plug-ins. The software runs unobtrusively as a relay agent in the system tray on your desktop and actively filters messages | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 2613 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
93. | SecureCRT 4.1.2 (promaxum.com) | ||
RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and databases that are now available via the Internet. Remote | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
94. | Order Maven 1.31 (briggsoft.com) | ||
e-mail credit card orders directly back to merchant with built-in public key encryption and SMTP functions. Visually design your forms with the drag and drop interface. Order form generator for online merchants. Create stand-alone Windows executables that can be distributed royalty-free to customers. Collect, encrypt, and e-mail credit card | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 852 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
95. | P2P Messenger .NET 3.0.2 (ufasoft.com) | ||
It is fully decentralized and does not require any servers. Supports public-key cryptography P2P Messenger is secure Instant Messaging client, working by Peer-to-Peer technology. It is fully decentralized and does not require any servers. Supports public-key | |||
Updated: 9, 2005 | Rating: 360 | Author: Ufasoft company | Size: 400 kb | Freeware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
96. | Magellan 1.0 (eyespyfx.com) | ||
dynamically assigned IP addresses. Pan Tilt option available. The key advantages of the EyeSpyFX Magellan system is that it is easy to use, has a large range of features and customization options, is a complete solution working with any standard web cam and or with EyeSpyFX's own Pan Tilt unit. Software Components: Automatic detection of assigned IP address, Password | |||
Updated: 9, 2005 | Rating: 0 | Author: Aidan Gallagher | Size: 19115 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
97. | i3Connect Merlin 1.1 (i3connect.com) | ||
networks. SECURITY Merlin provides end-to-end security with key features such as LDAP based authentication, PKI encryption, and X.509 Digital ID support. Merlin is also designed to prevent security breaches such as spam and viruses. For those customers who need to archive messages to meet corporate HR policy or regulatory requirements such those from SEC or HIPPA, Merlin | |||
Updated: 9, 2005 | Rating: 42 | Author: i3Connect, Inc | Size: 379 kb | Commercial Go to category: Communications > Chat & Instant Messaging Similar programs | |||
98. | Dialer Queen 1.31 (dialerqueen.com) | ||
Dialer Queen does not look as an ugly software monster due to it's excellent skin engine and user friendly interface! So, why choose dialer? Choose Dialer Queen! Key features: * Supports skins * Supports plugins * Supports several ISP's * Supports unlimited phone numbers to dial up * Keeps the detailed statistics for each connection, providing you with handy | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Pivovarov | Size: 1456 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
99. | Email CHAOS 4.52 (safechaos.net) | ||
their digital signature, CHAOS automatically use a copy of their public key to check the digital signature and to make sure that no one has tampered with the contents. It is compact, reliable and simple program for sending protected messages to friends, colleagues and | |||
Updated: 9, 2005 | Rating: 0 | Size: 424 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
100. | ATAF-Picture-eShop 2004.0.2 (ataf.dk) | ||
as a slideshow ATAF Web gallery supports Upload pictures for public or private viewing Direct upload of pictures from the users browser to the web application, no server components needed Full searchable picture database Advanced thumbnail view with zoom function Picture rating | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Rasmussen | Size: 2544 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Public key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|