|
||||||
|
||
|
Home > Cipher software |
Related keywords: stream cipher, secure email encrypted e mail encryption crypto online privacy rsa twofish block cipher stream ciphe |
|
|
1. | LeoPicture 1.5 (leokrut.com) | ||
Select and modify part of image. Copy/paste image or selected area(s). Print and print preview images. Analyze color distribution and symmetry patterns in image and create MS Word report. Intuitive, colorful, rich and transparent user interface All intermediate variants of picture are | |||
Updated: 3, 2006 | Rating: 16 | Author: Leonid Sakharov | Size: 284 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
2. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
Features include: Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
3. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
host machine. X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive | |||
Updated: 2, 2006 | Rating: 82 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
4. | CryptIt 1.301 (SinnerComputing.com) | ||
correctly. CryptIt can also generate key files (from a stream cipher and thus not best for OTP usage) and analyse the suitability of your own files for key usage. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
Features include: Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
6. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
host machine. X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
7. | The Panorama Factory 4.2 (panoramafactory.com) | ||
The Panorama Factory creates high-quality panoramas in a highly automated fashion from a set of overlapping digital images. You can add image hotspots, export to VR formats and create web pages that link your images into virtual tours. The software also corrects for lens-induced distortions and creates either | |||
Updated: 2, 2006 | Rating: 7410 | Author: John Strait | Size: 4917 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
8. | Able Graphic Manager 2.4.5 (graphicregion.com) | ||
Able Graphic Manager is a program that enables you to easily view, acquire, print and convert graphic files in normal (file by file), batch (many files at a time) and command line modes. Input formats: Drawing Interchange Format (DXF) generated by most CAD programs, TIFF Bitmap (TIF; TIFF), JPEG Bitmap | |||
Updated: 2, 2006 | Rating: 91 | Author: Graphic Region | Size: 2313 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
9. | Able Photo Slide Show 1.7 (graphicregion.com) | ||
Able Photo Slide Show displays your images continuously without you doing anything. You just point it to a file in folder, say how long to display each picture, select transition effects and then sit back and watch. If a picture is too large or less for your screen, it is resized to fit keeping the aspect | |||
Updated: 2, 2006 | Rating: 0 | Author: Graphic Region | Size: 3831 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
10. | URenameIT 2.3 (particleg.com) | ||
and time stamps. Perform advanced renaming using SoundEx, Caesars cipher, and parse various types of documents to extract a particular line for the file name. Many operations are geared towards cleaning, including space removal and consolidation, case management, normalizing, and padding. In addition, the find and remove abilities against sub strings or positions is near surgical in | |||
Updated: 9, 2005 | Rating: 0 | Author: ParticleG ParticleG | Size: 1180 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
11. | Pixie Power Swapper 1.02 (artichokegames.com) | ||
Pixie Power Swapper is a light hearted puzzle game in which you swap blocks back and forth across a game board in order to complete lines of a given color. To aid you in this endeavor you have access to four Pixies, each of whom can perform special tricks. Your pixie power meter rises with your score, when it | |||
Updated: 9, 2005 | Rating: 0 | Author: Katarzyna Uchnast | Size: 2604 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
12. | Bodie's Calendar 2.25 (iespana.es) | ||
Calendar is a desktop calendar with alarm and notes. Its simplistic modular design is perfect for the user that needs to track important info. It features Stay-on-top mode, minimizes to a desktray icon, supports drag 'n drop, search and replace text in the current note or across all notes, cipher and decipher notes, it is highly configurable, is multi-lingual (English | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcelo Dato | Size: 310 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
13. | AES Home 4.0 (abensoft.com) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
14. | AES Pro 5.5 (abensoft.com) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Absolute CHAOS 3.8 (safechaos.com) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 0 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
16. | Home CHAOS 3.5 (safechaos.com) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
17. | CryptoForge 3.2.5 (cryptoforge.com) | ||
features include multiple encryption, filename encryption, cipher speed meter, password cache with timeout, and compression level control. This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
18. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 16 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
19. | Ulead PhotoImpact 8 (ulead.com) | ||
PhotoImpact 8 is designed to meet the needs of digital camera users and amateur photographers for managing, enhancing and sharing photos. PhotoImpact also provides Web and graphics enthusiasts with a comprehensive set of tools without a steep learning curve. PhotoImpact gives you easy one-click photo | |||
Updated: 9, 2005 | Rating: 0 | Author: Ulead Systems | Size: 31744 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
20. | Ulead PhotoImpact 8 (ulead.com) | ||
PhotoImpact 8 is designed to meet the needs of digital camera users and amateur photographers for managing, enhancing and sharing photos. PhotoImpact also provides Web and graphics enthusiasts with a comprehensive set of tools without a steep learning curve. PhotoImpact gives you easy one-click photo | |||
Updated: 9, 2005 | Rating: 42 | Author: Ulead Systems | Size: 31744 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
21. | Armor System5 2.2.2 (ambitware.com) | ||
of encryption keys. Keys are generated automatically based on user's pass-phrase input and optimized for compatibility. Armor System5 will also eliminate all the evidence of the sensitive documents with its build-in Wipe utility. The program can be used with our free ARS5 Viewer/Decryptor for an easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Vlach | Size: 5986 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
22. | I-Cipher AP 2.2.2 (ambitware.com) | ||
with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
23. | virtualCrypt 3.02 (netindiasolutions.com) | ||
virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
24. | XFILEBOX 1.0 (wisehuman.com) | ||
your files more easily, and also a security utility with built-in cipher that enables you to store your files securely. XFILEBOX is a powerful, easy to use utility for managing, protecting, and backuping your important files or folders. It is a wonderful archive manager that enables you to organize your files more easily, and enables you to store your files | |||
Updated: 9, 2005 | Rating: 0 | Author: Xia Mou | Size: 1562 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
25. | USA Shield 2.15 (usa.safeworld.info) | ||
USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | SafeCryptor 1.5 (gemiscorp.com) | ||
SafeCryptor provides you with safe, fast and reliable text encryption anywhere, anytime, and lets you securely and quickly send all of your sensitive and personal information (e.g., login, password, credit card number) via e-mail or chat session to your partners, customers, friends or family. SafeCryptor is | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 1472 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
27. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
28. | Invisible CHAOS 5.1 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
29. | Crypto 2000 4.2 (gregorybraun.com) | ||
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
30. | CryptoForge 3.2.5 (cryptoforge.com) | ||
features include multiple encryption, filename encryption, cipher speed meter, password cache with timeout, and compression level control. This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Cipher software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|