|
||||||
|
||
|
Home > Public key software |
Related keywords: public, Public, public records, public address, public kiosks, public access internet terminal, public relations, public key encryption, Public Analysis, public folders |
|
|
121. | SecExMail Home 1.51 (bytefusion.com) | ||
e-mail encryption software uses 8192-bit RSA public key encryption and a secure 384-bit cipher, incorporating the AES candidate Twofish algorithm; SecExMail features PGP-style e-mail keys, but without the dependence on e-mail-software-specific plug-ins. The software runs unobtrusively as a relay agent in the system tray on your desktop and actively filters messages | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 2613 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
122. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business corporations! Your information will never become the property of your | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
123. | SecureBlackbox (ActiveX/DLL) 4.2 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.). PKIBlackbox supports Windows Certificates and Windows Certificate Storages. PKIBlackbox lets you manage certificates, stored on CryptoCards and USB CryptoTokens, via CryptoAPI. * | |||
Updated: 2, 2006 | Rating: 0 | Author: EldoS Corporation | Size: 4127 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
124. | SecureBlackbox (VCL) 4.3 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.), including Windows Certificate Storages and cryptography hardware (USB cryptotokens, smartcards). * PGPBlackbox - clean-room implementation of all PGP algorithms and standards with | |||
Updated: 2, 2006 | Rating: 16 | Author: EldoS Corporation | Size: 42127 kb | Commercial Go to category: Development > Delphi Similar programs | |||
125. | SecureBlackbox.NET 4.3 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.), including Windows Certificate Storages and cryptography hardware (USB cryptotokens, smartcards). * PGPBlackbox - clean-room implementation of all PGP algorithms and standards with | |||
Updated: 2, 2006 | Rating: 48 | Author: EldoS Corporation | Size: 8799 kb | Commercial Go to category: Development > C / C++ / C-sharp Similar programs | |||
126. | SecureCRT 4.1.2 (promaxum.com) | ||
RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and databases that are now available via the Internet. Remote | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
127. | SecureFile 2.0 (securefile.tripod.com) | ||
program that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
128. | ShyFile - 6144bit Email and File Encryption 5.13 (shyfile.de) | ||
of encryption of 192 and up to 6144bit since a variable symmetric key length of minimum 32 and up to 1,024 characters is employed, that reaches or even tops military requirements. True 6144bit depth of encryption since no characters of the key entry are duplicated to artificially blow up the bit | |||
Updated: 8, 2004 | Rating: 0 | Author: Dr. Bootz GmbH | Shareware Go to category: Security & Privacy > Other Similar programs | |||
129. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
of it, i.e. opening it and prompting the user to enter a matching key phrase. Its user friendly interface is very intuitive - no need to study the manual. ShyFile also encrypts single or multiple binary files as well as whole folders with all its subfolders in a single run, which require a free demo version of ShyFile to decode though. ShyFile exclusively makes use of its own | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
130. | SI-Metric Office 2.1 (butterflyvista.com) | ||
army knife of business desktop utilities, includes several essential key utilities under one sleek customizable interface. With our integrated voice technology, you can keep your attention focused on whatever you are doing. You can configure SI-Metric Office to say the time and read your reminders | |||
Updated: 3, 2005 | Rating: 0 | Size: 6533 kb | Shareware Go to category: Business > Other Similar programs | |||
131. | SignetSure 1.0 (SignetSure.com) | ||
to your subscribers. You have installed a program on the subscriber's machine that receives your files. This program must be able to authenticate files even against a hacker who has reverse-engineered your program. Scenario Two: You distribute registered software with a datafile that identifies | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
132. | SignGen 1 (gjsmith.com) | ||
principles used by SignGen are similar to the PKI standards of a Public and Private key being used to identify the user and a unique transaction key generated on behalf of that user for stamping within their document. SignGen also provides a simple Electronic File management | |||
Updated: 9, 2005 | Rating: 0 | Author: Garry Smith | Size: 2490 kb | Demo Go to category: Business > Office Suites & Tools Similar programs | |||
133. | SignIt! for Windows 1.1 (xlreader.com) | ||
(protection) and certification of the file. 2) Create private keys Objective: create a key to be used (or reused) to sign JAR files. 3) Manage private keys Objective: change aliases, passwords, copy/delete entries, ... 3 features: 1) sign a JAR file (main function), 2) create private keys, 3) manage private | |||
Updated: 8, 2004 | Rating: 130 | Author: Robert Della Malva | Size: 21300 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
134. | SiteKiosk 5.5.45 (sitekiosk.com) | ||
is a software for public access internet terminals and lets you turn any computer into a secure multilanguage Internet terminal, allowing the user to access the Internet but protecting the underlying operating system and files. Possible uses include presentations, exhibitions, libraries, and more. SiteKiosk works with normal displays and Touchscreens. A keyboard doesn't even have | |||
Updated: 9, 2005 | Rating: 42 | Author: Andreas Koepf | Size: 9022 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
135. | SiteKiosk 6.0.98 (sitekiosk.com) | ||
feature-packed package is designed for public access stations and turns any PC into a kiosk. Users can only access sites, applications, and settings you approve through a shell you design. You can command SiteKiosk and extend its functionality via scripts, objects, and ActiveX controls, or simply configure it with wizards. Wizards let you assign individual access rights and export | |||
Updated: 9, 2005 | Rating: 0 | Author: PROVISIO PROVISIO | Size: 11203 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
136. | Smoke Attack 1.0 (aidsoft.com) | ||
this smoking-risk awareness game from the swiss federal office of public health, you are navigating the caracter "Oxy" through offices. You can fight the aggressive smoking balls and the cigarettes by shooting them with your oxygen gun. There are a lot of extra ammunitions, secret weapons and | |||
Updated: 9, 2005 | Rating: 0 | Author: Hajo Michels | Size: 5820 kb | Freeware Go to category: Games & Entertainment > Arcade Similar programs | |||
137. | Spam Alarm for POP3 2.2.2.18 (dignitysoftware.com) | ||
statistical analysis of individual words and heuristic scanning. Key Features: Blocks 99% of spam with zero false positives Standalone application - your email client remains intact Multiple e-mail account processing Attractive user interface with the skin engine No special configuration is required Black & White lists are available for precise settings No user | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugeny Politskovoy | Size: 3704 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
138. | SPAM Shredder 3.1 (safechaos.com) | ||
SPAM Shredder is an anti-spam email client that automatically classifies incoming emails as spam or non-spam. SPAM Shredder is a spam filtering software that lets you remove spam emails just from the mail server without pulling them down into your Inbox. SPAM Shredder ensures the efficient and easy control | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
139. | Spectrum Analyzer pro Live 4.0 (pas-products.com) | ||
Multi Mode Support. Switch between 4 Stereo Devices easily with the Keys. So you can analyze the input for Alesis ADAT, 8 Track Recording and any Multi Channel recordings... EQ suggestion -for realtime and wave-mpeg modus Convert Wave files to Mp3 files settings from 32 up to 320 bit/sec Tap Delay calculator- display for full, half and quarter Beats improvement to calibrate the | |||
Updated: 9, 2005 | Rating: 1628 | Author: Frank Dunkel | Size: 5830 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
140. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
passwords and pass phrases. Top Secret Crypto Gold includes RSA Key Creation, Public and Secret Key Ring Management procedures, data compression procedures, e-mail and file encryption procedures, One Time Pad Key File and True One Time Pad File creation, a completely | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Public key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|