|
||||||
|
||
|
Home > Public key software |
Related keywords: public, Public, public records, public address, public kiosks, public access internet terminal, public relations, public key encryption, Public Analysis, public folders |
|
|
61. | NotesImp 1.5.2 (notesimp.com) | ||
of a menu and tool bar. Commands are accessed through main window's menu, right-click context menus or the tray icon. NotesImp works under Windows 9x, ME, NT4, 2000 and XP. NotesImp is handy and low resource consuming organizer with tree like hierarchical structure of notes and ability to protect your data using encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 1055 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
62. | OnTarget 3.77.17 (radsoftware.org) | ||
Crespo Software Distributing, OnTarget is now available again to the public via RAD Software, and with added features that make it the better than ever! Called `The perfect 10-minute break', OnTarget has just the right mix of fun and learning that makes it a game enjoyed by children from 8 to 80 | |||
Updated: 2, 2006 | Rating: 16 | Author: Rad Software | Size: 1324 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
63. | OnTarget 3.76.16 (hometown.aol.com) | ||
Crespo Software Distributing, OnTarget is now available again to the public via RAD Software, and with added features that make it the better than ever! Called `The perfect 10-minute break', OnTarget has just the right mix of fun and learning that makes it a game enjoyed by children from 8 to 80 | |||
Updated: 9, 2005 | Rating: 91 | Author: Rad Delaroderie | Size: 1244 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
64. | OnTarget 3.77.17 (padfile.radsoftware.org) | ||
Crespo Software Distributing, OnTarget is now available again to the public via RAD Software, and with added features that make it the better than ever! Called `The perfect 10-minute break', OnTarget has just the right mix of fun and learning that makes it a game enjoyed by children from 8 to 80 | |||
Updated: 2, 2006 | Rating: 70 | Author: Rad Software | Size: 1324 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
65. | Order Maven 1.31 (briggsoft.com) | ||
e-mail credit card orders directly back to merchant with built-in public key encryption and SMTP functions. Visually design your forms with the drag and drop interface. Order form generator for online merchants. Create stand-alone Windows executables that can be distributed royalty-free to customers. Collect, encrypt, and e-mail credit card | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 852 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
66. | PC Accelerator 2005 Edition 1.1 (smartalec2000.com) | ||
and intelligent memory defragmentation - Manual adjustments for key functions. - Save favorite configurations to a file. - Built-in optimization wizard to help you fine-tune your system to the max. - Support for all the latest network protocols and equipment, including wireless connections. Brand new integrated PCPerformance control center with the following features | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Wong | Size: 3614 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
67. | PopMessenger 1.61 (leadmind.com) | ||
opportunity to win the race and beat the competition. One of the key factors of successful business operation is well-thought staff communication system. Good managers know that each minute of work time spent in vain means profit loss. That is why building fast and convenient personnel communication environment is so important, these days. Common means of communication, such as | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
68. | Private Shell SSH Client 2.1 (privateshell.com) | ||
not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications (such as Oracle, MySQL, CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
69. | ProtectZ 1.60 (actualsecurity.com) | ||
is a security utility for personal and public accessible computers. This software-only solution enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename them, to make them | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
70. | Puffer 4.02 (briggsoft.com) | ||
email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with wipe functions. Data file and e-mail encryption utility for Win 95 to XP. Uses | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
71. | RaVeN Mixer 1.0.0.0 (fairdell.com) | ||
sound on you computer. Mixer features: Raven Mixer allow use hot keys for control sound settings Raven Mixer allow simultaneously see all possible sound settings. Raven Mixer allow get detail information about you sound card, witch installed in your computer You can change program interface | |||
Updated: 9, 2005 | Rating: 16 | Author: Alex Gribov | Size: 597 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
72. | Safe Express Home 4.2 (netsafesoft.com) | ||
highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
73. | Screen Privacy 1.2 (pictures-soft.com) | ||
Privacy allows you to hide and restore windows by pressing a secret key. It protects your privacy and prevent your information from being seen by anyone else. Screen Privacy allows you to work calmly and do not worry about uninvited visitors. While your application are hidden, they are still working | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
74. | SDATimer 1.73 (dasp.at.tut.by) | ||
is multifunctional digital countdown timer, clock and stopwatch. The key features are: Calendar with Sunrise,Sunset time, Moon Phase. Cool interface with skins support, easy to use. Mp3 files support. Easy to set time - only click by digits, or by using time presets. Original AutoHide feature | |||
Updated: 9, 2005 | Rating: 0 | Author: Spitsyn Dmitry | Size: 794 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
75. | SeaWar 3.0 (one.com.ua) | ||
experience. You can easily play the game at your workplace. The ESC key quickly hides the program to the tray area. Battleship clone game. You can play against both a computer and a human over a local network or the Internet. The game has nice interface with skins support. Various types of game and 7 levels of complexity give you extraordinary game | |||
Updated: 9, 2005 | Rating: 102 | Author: Vjacheslav Viter | Size: 2662 kb | Shareware Go to category: Games & Entertainment > Strategy & War Games Similar programs | |||
76. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business corporations! Your information will never become the property of your | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
77. | SecureCRT 4.1.2 (promaxum.com) | ||
RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and databases that are now available via the Internet. Remote | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
78. | SecureFile 2.0 (securefile.tripod.com) | ||
program that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
79. | ShyFile - 6144bit Email and File Encryption 5.13 (shyfile.de) | ||
of encryption of 192 and up to 6144bit since a variable symmetric key length of minimum 32 and up to 1,024 characters is employed, that reaches or even tops military requirements. True 6144bit depth of encryption since no characters of the key entry are duplicated to artificially blow up the bit | |||
Updated: 8, 2004 | Rating: 0 | Author: Dr. Bootz GmbH | Shareware Go to category: Security & Privacy > Other Similar programs | |||
80. | SI-Metric Office 2.1 (butterflyvista.com) | ||
army knife of business desktop utilities, includes several essential key utilities under one sleek customizable interface. With our integrated voice technology, you can keep your attention focused on whatever you are doing. You can configure SI-Metric Office to say the time and read your reminders | |||
Updated: 3, 2005 | Rating: 0 | Size: 6533 kb | Shareware Go to category: Business > Other Similar programs | |||
|
Home > Public key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|