|
||||||
|
||
|
Home > Public key software |
Related keywords: public, Public, public records, public address, public kiosks, public access internet terminal, public relations, public key encryption, Public Analysis, public folders |
|
|
61. | Hiding CHAOS 5.6 (safechaos.net) | ||
and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression and encryption, file/folder shredder. Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
62. | Maxus 3.05 (neurobridge.com) | ||
the hotkeys and even open and close the CD-ROM tray by pressing keys on your keyboard. Maxus also features a skinnable desktop clock that can display the current time or the time passed since the last reboot; the clock also supports voiced time spelling in multiple languages and can synchronize system time with the highest precision atomic clock servers via Internet. Powerful system | |||
Updated: 8, 2004 | Rating: 0 | Author: NeuroBridge | Size: 1366 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
63. | Maxus SE 3.05 (neurobridge.com) | ||
the hotkeys and even open and close the CD-ROM tray by pressing keys on your keyboard. Maxus SE also features a skinnable desktop clock that can display the current time, the time passed since the last reboot or the duration of the current Internet connection; the clock also supports voiced time spelling in multiple languages and can synchronize system time with the highest precision | |||
Updated: 8, 2004 | Rating: 42 | Author: NeuroBridge | Size: 1383 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
64. | NETObserve 2.98 (exploreanywhere.net) | ||
a network) and moderate, administrate, and monitor the machine's activity. NETObserve's remote administration features include file system browsing, file transferring, registry key editing, startup process moderating, favorite place viewing, open port and connection records, real-time access and moderating of windows, processes, desktop, and more! NETObserve also | |||
Updated: 9, 2005 | Rating: 16 | Author: Bryan Hammond | Size: 1127 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
65. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
etc.). Easy access at any time with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites computers access, remote users (authorized or blocked), etc. - Allows to compress remote clipboard information before transfer it to your computer, quick and easy! - Log for process. - Automatic Clear | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
66. | NextSTART 3.41 (winstep.net) | ||
automatically read the directory structure of your Programs folder(s) and create a menu for you on the fly! In fact, thanks to NextStart's dynamic menu support, it will create as many menus as you wish based on any hard drive or directory! NextSTART features built-in task management to control running apps and the Windows System Tray. Gain access to your running apps via | |||
Updated: 2, 2006 | Rating: 0 | Author: Jorge Coelho | Size: 4405 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
67. | NotesImp 1.5.2 (notesimp.com) | ||
of a menu and tool bar. Commands are accessed through main window's menu, right-click context menus or the tray icon. NotesImp works under Windows 9x, ME, NT4, 2000 and XP. NotesImp is handy and low resource consuming organizer with tree like hierarchical structure of notes and ability to protect your data using encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 1055 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
68. | PC Accelerator 2005 Edition 1.1 (smartalec2000.com) | ||
and intelligent memory defragmentation - Manual adjustments for key functions. - Save favorite configurations to a file. - Built-in optimization wizard to help you fine-tune your system to the max. - Support for all the latest network protocols and equipment, including wireless connections. Brand new integrated PCPerformance control center with the following features | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Wong | Size: 3614 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
69. | ProtectZ 1.60 (actualsecurity.com) | ||
is a security utility for personal and public accessible computers. This software-only solution enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename them, to make them | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
70. | Puffer 4.02 (briggsoft.com) | ||
email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with wipe functions. Data file and e-mail encryption utility for Win 95 to XP. Uses | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
71. | Screen Privacy 1.2 (pictures-soft.com) | ||
Privacy allows you to hide and restore windows by pressing a secret key. It protects your privacy and prevent your information from being seen by anyone else. Screen Privacy allows you to work calmly and do not worry about uninvited visitors. While your application are hidden, they are still working | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
72. | SDATimer 1.73 (dasp.at.tut.by) | ||
is multifunctional digital countdown timer, clock and stopwatch. The key features are: Calendar with Sunrise,Sunset time, Moon Phase. Cool interface with skins support, easy to use. Mp3 files support. Easy to set time - only click by digits, or by using time presets. Original AutoHide feature | |||
Updated: 9, 2005 | Rating: 0 | Author: Spitsyn Dmitry | Size: 794 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
73. | SecureFile 2.0 (securefile.tripod.com) | ||
program that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
74. | SI-Metric Office 2.1 (butterflyvista.com) | ||
army knife of business desktop utilities, includes several essential key utilities under one sleek customizable interface. With our integrated voice technology, you can keep your attention focused on whatever you are doing. You can configure SI-Metric Office to say the time and read your reminders | |||
Updated: 3, 2005 | Rating: 0 | Size: 6533 kb | Shareware Go to category: Business > Other Similar programs | |||
75. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
passwords and pass phrases. Top Secret Crypto Gold includes RSA Key Creation, Public and Secret Key Ring Management procedures, data compression procedures, e-mail and file encryption procedures, One Time Pad Key File and True One Time Pad File creation, a completely | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
76. | Visual Patch 1.0.0.3 (indigorose.com) | ||
Rose's Visual Patch provides software developers with a comprehensive solution for creating secure full-history software update patches. Designed for use on all 32-bit Windows platforms, these compact, self-installing patch files can be distributed on diskette or CD-ROM or sent via email, web or LAN. Unlike setup programs, which contain all of the files needed to run an | |||
Updated: 9, 2005 | Rating: 0 | Author: Colin Adams | Size: 5801 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
77. | Wallpaper Sequencer Standard 4.51 (wallpapersequencer.com) | ||
system startup or at specified time periods) or by pressing a hot key. Semi-transparent wallpaper calendar. Taskbar transparency and | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Dryazgin | Size: 4308 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
78. | WinLock 4.32 (crystaloffice.com) | ||
is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
79. | WinLock Professional 4.32 (crystaloffice.com) | ||
is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
80. | Safe Express Home 4.2 (netsafesoft.com) | ||
highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Public key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|