|
||||||
|
||
|
Home > Public key software |
Related keywords: public, Public, public records, public address, public kiosks, public access internet terminal, public relations, public key encryption, Public Analysis, public folders |
|
|
101. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
102. | PopMessenger 1.61 (leadmind.com) | ||
opportunity to win the race and beat the competition. One of the key factors of successful business operation is well-thought staff communication system. Good managers know that each minute of work time spent in vain means profit loss. That is why building fast and convenient personnel communication environment is so important, these days. Common means of communication, such as | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
103. | PrEditor 2.1 (thistlesoft.com) | ||
syntax colouring programmer's editor for program languages, scripts, HTML, configuration files, documentation, and text files. With an FTP client and transparent support for DOS, UNIX, and Mac files, PrEditor allows you edit any file, anywhere. It has pre-defined syntax colouring for most popular | |||
Updated: 9, 2005 | Rating: 0 | Author: John Young | Size: 2336 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
104. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
105. | PrivacyKeyboard 6.1 (anti-keylogger.com) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
106. | Private Desktop 1.91 (tropsoft.com) | ||
comes in... Private Desktop will allow you to escape to your "public" desktop with the push of a button. Private Desktop allows you to keep a second password protected desktop containing all your private applications. Access to this desktop can be completely customized: its toolbar icon can be made either very small or invisible, hotkeys can be specified to remove you from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 237 kb | Demo Go to category: System Utilities > Other Similar programs | |||
107. | Private Shell SSH Client 2.1 (privateshell.com) | ||
not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications (such as Oracle, MySQL, CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
108. | Public Key File and Email Encryption freeware 3.2.1 (deltacrypt.com) | ||
OneClick Personal does it all: This Public Key Encryption Software encrypts files, text and emails with 1024-bit RSA protection, digital signatures, and unalterable public keys. It offers the basic encryption functionalities FREE OF CHARGE. Select files and folders or a combination of both and let DeltaCrypt OneClick Personal secure your sensitive data. For | |||
Updated: 9, 2005 | Rating: 0 | Author: Deltacrypt Technologies | Size: 1250 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
109. | Puffer 4.02 (briggsoft.com) | ||
email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with wipe functions. Data file and e-mail encryption utility for Win 95 to XP. Uses | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
110. | RaVeN Mixer 1.0.0.0 (fairdell.com) | ||
sound on you computer. Mixer features: Raven Mixer allow use hot keys for control sound settings Raven Mixer allow simultaneously see all possible sound settings. Raven Mixer allow get detail information about you sound card, witch installed in your computer You can change program interface | |||
Updated: 9, 2005 | Rating: 16 | Author: Alex Gribov | Size: 597 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
111. | Safe Express Free 3.4 (netsafesoft.com) | ||
highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 927 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
112. | Safe Express Home 4.2 (netsafesoft.com) | ||
highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
113. | Screen Privacy 1.2 (pictures-soft.com) | ||
Privacy allows you to hide and restore windows by pressing a secret key. It protects your privacy and prevent your information from being seen by anyone else. Screen Privacy allows you to work calmly and do not worry about uninvited visitors. While your application are hidden, they are still working | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
114. | SDATimer 1.73 (dasp.at.tut.by) | ||
is multifunctional digital countdown timer, clock and stopwatch. The key features are: Calendar with Sunrise,Sunset time, Moon Phase. Cool interface with skins support, easy to use. Mp3 files support. Easy to set time - only click by digits, or by using time presets. Original AutoHide feature | |||
Updated: 9, 2005 | Rating: 0 | Author: Spitsyn Dmitry | Size: 794 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
115. | SeaWar 3.0 (one.com.ua) | ||
experience. You can easily play the game at your workplace. The ESC key quickly hides the program to the tray area. Battleship clone game. You can play against both a computer and a human over a local network or the Internet. The game has nice interface with skins support. Various types of game and 7 levels of complexity give you extraordinary game | |||
Updated: 9, 2005 | Rating: 102 | Author: Vjacheslav Viter | Size: 2662 kb | Shareware Go to category: Games & Entertainment > Strategy & War Games Similar programs | |||
116. | SecEx Secure Shell Client 1.6 (bytefusion.com) | ||
SecEx also shields against IP and DNS spoofing by recording a server's public host key. During subsequent connection attempts, the known host key is compared to the host key offered by the server. SecEx is a graphical SCP and SFTP client and secure terminal emulator that | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 3610 kb | Demo Go to category: System Utilities > Other Similar programs | |||
117. | SecExMail Home 1.51 (bytefusion.com) | ||
e-mail encryption software uses 8192-bit RSA public key encryption and a secure 384-bit cipher, incorporating the AES candidate Twofish algorithm; SecExMail features PGP-style e-mail keys, but without the dependence on e-mail-software-specific plug-ins. The software runs unobtrusively as a relay agent in the system tray on your desktop and actively filters messages | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 2613 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
118. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business corporations! Your information will never become the property of your | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
119. | SecureBlackbox (ActiveX/DLL) 4.2 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.). PKIBlackbox supports Windows Certificates and Windows Certificate Storages. PKIBlackbox lets you manage certificates, stored on CryptoCards and USB CryptoTokens, via CryptoAPI. * | |||
Updated: 2, 2006 | Rating: 0 | Author: EldoS Corporation | Size: 4127 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
120. | SecureBlackbox (VCL) 4.3 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.), including Windows Certificate Storages and cryptography hardware (USB cryptotokens, smartcards). * PGPBlackbox - clean-room implementation of all PGP algorithms and standards with | |||
Updated: 2, 2006 | Rating: 16 | Author: EldoS Corporation | Size: 42127 kb | Commercial Go to category: Development > Delphi Similar programs | |||
121. | SecureBlackbox.NET 4.3 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.), including Windows Certificate Storages and cryptography hardware (USB cryptotokens, smartcards). * PGPBlackbox - clean-room implementation of all PGP algorithms and standards with | |||
Updated: 2, 2006 | Rating: 48 | Author: EldoS Corporation | Size: 8799 kb | Commercial Go to category: Development > C / C++ / C-sharp Similar programs | |||
122. | SecureCRT 4.1.2 (promaxum.com) | ||
RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and databases that are now available via the Internet. Remote | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
123. | SecureFile 2.0 (securefile.tripod.com) | ||
program that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
124. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
of it, i.e. opening it and prompting the user to enter a matching key phrase. Its user friendly interface is very intuitive - no need to study the manual. ShyFile also encrypts single or multiple binary files as well as whole folders with all its subfolders in a single run, which require a free demo version of ShyFile to decode though. ShyFile exclusively makes use of its own | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
125. | SI-Metric Office 2.1 (butterflyvista.com) | ||
army knife of business desktop utilities, includes several essential key utilities under one sleek customizable interface. With our integrated voice technology, you can keep your attention focused on whatever you are doing. You can configure SI-Metric Office to say the time and read your reminders | |||
Updated: 3, 2005 | Rating: 0 | Size: 6533 kb | Shareware Go to category: Business > Other Similar programs | |||
126. | SignetSure 1.0 (SignetSure.com) | ||
to your subscribers. You have installed a program on the subscriber's machine that receives your files. This program must be able to authenticate files even against a hacker who has reverse-engineered your program. Scenario Two: You distribute registered software with a datafile that identifies | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
127. | SignGen 1 (gjsmith.com) | ||
principles used by SignGen are similar to the PKI standards of a Public and Private key being used to identify the user and a unique transaction key generated on behalf of that user for stamping within their document. SignGen also provides a simple Electronic File management | |||
Updated: 9, 2005 | Rating: 0 | Author: Garry Smith | Size: 2490 kb | Demo Go to category: Business > Office Suites & Tools Similar programs | |||
128. | SignIt! for Windows 1.1 (xlreader.com) | ||
(protection) and certification of the file. 2) Create private keys Objective: create a key to be used (or reused) to sign JAR files. 3) Manage private keys Objective: change aliases, passwords, copy/delete entries, ... 3 features: 1) sign a JAR file (main function), 2) create private keys, 3) manage private | |||
Updated: 8, 2004 | Rating: 130 | Author: Robert Della Malva | Size: 21300 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
129. | SiteKiosk 5.5.45 (sitekiosk.com) | ||
is a software for public access internet terminals and lets you turn any computer into a secure multilanguage Internet terminal, allowing the user to access the Internet but protecting the underlying operating system and files. Possible uses include presentations, exhibitions, libraries, and more. SiteKiosk works with normal displays and Touchscreens. A keyboard doesn't even have | |||
Updated: 9, 2005 | Rating: 42 | Author: Andreas Koepf | Size: 9022 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
130. | SiteKiosk 6.0.98 (sitekiosk.com) | ||
feature-packed package is designed for public access stations and turns any PC into a kiosk. Users can only access sites, applications, and settings you approve through a shell you design. You can command SiteKiosk and extend its functionality via scripts, objects, and ActiveX controls, or simply configure it with wizards. Wizards let you assign individual access rights and export | |||
Updated: 9, 2005 | Rating: 0 | Author: PROVISIO PROVISIO | Size: 11203 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
131. | Smoke Attack 1.0 (aidsoft.com) | ||
this smoking-risk awareness game from the swiss federal office of public health, you are navigating the caracter "Oxy" through offices. You can fight the aggressive smoking balls and the cigarettes by shooting them with your oxygen gun. There are a lot of extra ammunitions, secret weapons and | |||
Updated: 9, 2005 | Rating: 0 | Author: Hajo Michels | Size: 5820 kb | Freeware Go to category: Games & Entertainment > Arcade Similar programs | |||
132. | Spam Alarm for POP3 2.2.2.18 (dignitysoftware.com) | ||
statistical analysis of individual words and heuristic scanning. Key Features: Blocks 99% of spam with zero false positives Standalone application - your email client remains intact Multiple e-mail account processing Attractive user interface with the skin engine No special configuration is required Black & White lists are available for precise settings No user | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugeny Politskovoy | Size: 3704 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
133. | SPAM Shredder 3.1 (safechaos.com) | ||
SPAM Shredder is an anti-spam email client that automatically classifies incoming emails as spam or non-spam. SPAM Shredder is a spam filtering software that lets you remove spam emails just from the mail server without pulling them down into your Inbox. SPAM Shredder ensures the efficient and easy control | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
134. | Spectrum Analyzer pro Live 4.0 (pas-products.com) | ||
Multi Mode Support. Switch between 4 Stereo Devices easily with the Keys. So you can analyze the input for Alesis ADAT, 8 Track Recording and any Multi Channel recordings... EQ suggestion -for realtime and wave-mpeg modus Convert Wave files to Mp3 files settings from 32 up to 320 bit/sec Tap Delay calculator- display for full, half and quarter Beats improvement to calibrate the | |||
Updated: 9, 2005 | Rating: 1628 | Author: Frank Dunkel | Size: 5830 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
135. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
passwords and pass phrases. Top Secret Crypto Gold includes RSA Key Creation, Public and Secret Key Ring Management procedures, data compression procedures, e-mail and file encryption procedures, One Time Pad Key File and True One Time Pad File creation, a completely | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
136. | TreePad PLUS 7.2 (treepad.com) | ||
any kind of data has never been easier: use TreePad's tree to browse any previously created/imported text or document, just as you browse directories/folders in Win-Explorer. TreePad is fully customizable: work the way you feel comfortable! TOOL BARS: can be hidden, visible, floating, moved around. SEARCH ENGINE: very fast, multiple options for tree/texts, search/replace | |||
Updated: 2, 2006 | Rating: 0 | Author: Henk Hagedoorn | Size: 388 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
137. | TreePad PLUS 7.2 (treepad.com) | ||
any kind of data has never been easier: use TreePad's tree to browse any previously created/imported text or document, just as you browse directories/folders in Win-Explorer. TreePad is fully customizable: work the way you feel comfortable! TOOL BARS: can be hidden, visible, floating, moved around. SEARCH ENGINE: very fast, multiple options for tree/texts, search/replace | |||
Updated: 2, 2006 | Rating: 0 | Author: Henk Hagedoorn | Size: 388 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
138. | TreePad SAFE 7.1.4 (treepad.com) | ||
exporting any kind of data has never been easier: use TreePad's tree to browse any previously created/imported text or document, just as you browse directories/folders in Win-Explorer. TreePad is fully customizable: work the way you feel comfortable! TOOL BARS: can be hidden, visible, floating | |||
Updated: 9, 2005 | Rating: 0 | Author: Henk Hagedoorn | Size: 3833 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
139. | Tunnelier 4.12 (bitvise.com) | ||
Remote Desktop forwarding for graphical server access. Supports public key user authentication, as well as transparent authentication with Kerberos (GSSAPI) or NTLM. To satisfy special requirements, Tunnelier is highly customizable using a variety of command line parameters. Ideal for remote server administration using SSH - implements a complete set of features for this | |||
Updated: 2, 2006 | Rating: 1238 | Author: Bitvise Limited | Size: 4380 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
140. | TZ Spyware-Adware Remover 8.2.0.0 (trackzapper.com) | ||
Remover is an Adware, SpyWare, Key Loggers, Trojans, Dialers, Hijackers, Trackware, Thiefware, Big Brotherware removal utility with multi-language support. It scans your memory (for active memory ad components, which are not stored on your hard drive and last only as long as the computer is powered up), registry, & drives for known adware modules & for known SpyWare parasites & | |||
Updated: 9, 2005 | Rating: 0 | Author: Track Zapper | Size: 6659 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
141. | VidLizard 1.24 (vidlizard.com) | ||
the keyboard layout at his own discretion. Skin support. There's a possibility to adjust playback and rewind rate. Screenshot saving. The possibility of controlling several audio streams in a video file. VidLizard defines video codecs installed on computer and allows choosing the most preferable one for playing. Infrared remote control WinLIRC is supported. In the the program you | |||
Updated: 2, 2006 | Rating: 82 | Author: Klim Agarkov | Size: 921 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
142. | VisNetic MailServer 8.3.5 (deerfield.com) | ||
SSL/TLS encryption. IM transmissions between VisNetic Mail Server's IM server and any Jabber-compatible IM server located outside your organization are also secured via SSL/TLS. VisNetic Mail Server is a high performance mail server with an extensive, highly configurable feature set. This secure mail server is also ideal for use as a gateway mail server, features built-in anti spam | |||
Updated: 2, 2006 | Rating: 124 | Author: Deerfield Com | Size: 25757 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
143. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
144. | Visual Patch 1.0.0.3 (indigorose.com) | ||
Rose's Visual Patch provides software developers with a comprehensive solution for creating secure full-history software update patches. Designed for use on all 32-bit Windows platforms, these compact, self-installing patch files can be distributed on diskette or CD-ROM or sent via email, web or LAN. Unlike setup programs, which contain all of the files needed to run an | |||
Updated: 9, 2005 | Rating: 0 | Author: Colin Adams | Size: 5801 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
145. | VShell 2.2.4 (promaxum.com) | ||
server configuration, options for Kerberos via GSSAPI, end user public-key upload, and triggers for automation of routine tasks reduce hassles for busy system administrators. Integrate this strong security with your existing infrastructure to support enterprise-wide authentication that goes beyond weak password authentication. VShell includes built-in support for Kerberos | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 3703 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
146. | Wallpaper Sequencer Standard 4.51 (wallpapersequencer.com) | ||
system startup or at specified time periods) or by pressing a hot key. Semi-transparent wallpaper calendar. Taskbar transparency and | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Dryazgin | Size: 4308 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
147. | Wallpaper Sequencer Standard 4.51 (draxysoft.com) | ||
system startup or at specified time periods) or by pressing a hot key. Semi-transparent wallpaper calendar. Taskbar transparency and | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Dryazgin | Size: 4308 kb | Shareware Go to category: Desktop > Other Similar programs | |||
148. | WinLock 4.32 (crystaloffice.com) | ||
is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
149. | WinLock Professional 4.32 (crystaloffice.com) | ||
is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
150. | WinSSHD 4.12 (bitvise.com) | ||
bvterm terminal access. Supports Windows groups and domain accounts; public key and Kerberos authentication; virtual accounts; provides powerful graphical as well as scriptable configuration. Ideal for remote server administration; as file server (SFTP); or for a software VPN (SSH port | |||
Updated: 2, 2006 | Rating: 289 | Author: Bitvise Limited | Size: 3912 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
151. | Worm 2000 1.18 (terminal-games.com) | ||
your worm! Options let you control the game speed and the worm's appearance. Select any of 14 game skins or design a new one. There are 10 basic game levels and 50 additional levels available for registered users.Only the first 10 "basic" levels are available in the free evaluation copy of the game which you can download at http://www.terminal-games.com/files/worminst.exe. A small | |||
Updated: 9, 2005 | Rating: 0 | Author: Egor Dyukarev | Size: 1055 kb | Shareware Go to category: Games & Entertainment > Arcade Similar programs | |||
152. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
strong encryption algorithms. It supports traditional secret-key encryption as well as public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files. For traditional strong encryption, the library supports the newly adopted AES (US Advanced Encryption Standard) secret-key encryption algorithm (Rijndael), which uses | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
153. | ZVolume Pro 3.44 (shelltoys.com) | ||
Besides allowing you to use your keyboard to adjust your sound card's output, ZVolume Pro can control Winamp, Sonique, the NAD MP3 Player, WPlay (Pro), the Windows CD Player and Microsoft's Internet Explorer 4.0/5.0. You can mute your sound with a quick double click on the ZVolume Pro system | |||
Updated: 9, 2005 | Rating: 0 | Author: Kirill Kirillov | Size: 965 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
|
Home > Public key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|