|
||||||
|
||
|
Home > Public key software |
Related keywords: public, Public, public records, public address, public kiosks, public access internet terminal, public relations, public key encryption, Public Analysis, public folders |
|
|
101. | PC Accelerator 2005 Edition 1.1 (smartalec2000.com) | ||
and intelligent memory defragmentation - Manual adjustments for key functions. - Save favorite configurations to a file. - Built-in optimization wizard to help you fine-tune your system to the max. - Support for all the latest network protocols and equipment, including wireless connections. Brand new integrated PCPerformance control center with the following features | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Wong | Size: 3614 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
102. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
103. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
104. | Private Desktop 1.91 (tropsoft.com) | ||
comes in... Private Desktop will allow you to escape to your "public" desktop with the push of a button. Private Desktop allows you to keep a second password protected desktop containing all your private applications. Access to this desktop can be completely customized: its toolbar icon can be made either very small or invisible, hotkeys can be specified to remove you from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 237 kb | Demo Go to category: System Utilities > Other Similar programs | |||
105. | Puffer 4.02 (briggsoft.com) | ||
email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with wipe functions. Data file and e-mail encryption utility for Win 95 to XP. Uses | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
106. | Screen Privacy 1.2 (pictures-soft.com) | ||
Privacy allows you to hide and restore windows by pressing a secret key. It protects your privacy and prevent your information from being seen by anyone else. Screen Privacy allows you to work calmly and do not worry about uninvited visitors. While your application are hidden, they are still working | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Shubin | Size: 851 kb | Shareware Go to category: Desktop > Other Similar programs | |||
107. | SDATimer 1.73 (dasp.at.tut.by) | ||
is multifunctional digital countdown timer, clock and stopwatch. The key features are: Calendar with Sunrise,Sunset time, Moon Phase. Cool interface with skins support, easy to use. Mp3 files support. Easy to set time - only click by digits, or by using time presets. Original AutoHide feature | |||
Updated: 9, 2005 | Rating: 0 | Author: Spitsyn Dmitry | Size: 794 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
108. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
of it, i.e. opening it and prompting the user to enter a matching key phrase. Its user friendly interface is very intuitive - no need to study the manual. ShyFile also encrypts single or multiple binary files as well as whole folders with all its subfolders in a single run, which require a free demo version of ShyFile to decode though. ShyFile exclusively makes use of its own | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
109. | SI-Metric Office 2.1 (butterflyvista.com) | ||
army knife of business desktop utilities, includes several essential key utilities under one sleek customizable interface. With our integrated voice technology, you can keep your attention focused on whatever you are doing. You can configure SI-Metric Office to say the time and read your reminders | |||
Updated: 3, 2005 | Rating: 0 | Size: 6533 kb | Shareware Go to category: Business > Other Similar programs | |||
110. | SignIt! for Windows 1.1 (xlreader.com) | ||
(protection) and certification of the file. 2) Create private keys Objective: create a key to be used (or reused) to sign JAR files. 3) Manage private keys Objective: change aliases, passwords, copy/delete entries, ... 3 features: 1) sign a JAR file (main function), 2) create private keys, 3) manage private | |||
Updated: 8, 2004 | Rating: 130 | Author: Robert Della Malva | Size: 21300 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
111. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
passwords and pass phrases. Top Secret Crypto Gold includes RSA Key Creation, Public and Secret Key Ring Management procedures, data compression procedures, e-mail and file encryption procedures, One Time Pad Key File and True One Time Pad File creation, a completely | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
112. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
113. | Visual Patch 1.0.0.3 (indigorose.com) | ||
Rose's Visual Patch provides software developers with a comprehensive solution for creating secure full-history software update patches. Designed for use on all 32-bit Windows platforms, these compact, self-installing patch files can be distributed on diskette or CD-ROM or sent via email, web or LAN. Unlike setup programs, which contain all of the files needed to run an | |||
Updated: 9, 2005 | Rating: 0 | Author: Colin Adams | Size: 5801 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
114. | Wallpaper Sequencer Standard 4.51 (wallpapersequencer.com) | ||
system startup or at specified time periods) or by pressing a hot key. Semi-transparent wallpaper calendar. Taskbar transparency and | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Dryazgin | Size: 4308 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
115. | WinLock 4.32 (crystaloffice.com) | ||
is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
116. | WinLock Professional 4.32 (crystaloffice.com) | ||
is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
117. | SecureBlackbox.NET 4.3 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.), including Windows Certificate Storages and cryptography hardware (USB cryptotokens, smartcards). * PGPBlackbox - clean-room implementation of all PGP algorithms and standards with | |||
Updated: 2, 2006 | Rating: 48 | Author: EldoS Corporation | Size: 8799 kb | Commercial Go to category: Development > C / C++ / C-sharp Similar programs | |||
118. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
strong encryption algorithms. It supports traditional secret-key encryption as well as public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files. For traditional strong encryption, the library supports the newly adopted AES (US Advanced Encryption Standard) secret-key encryption algorithm (Rijndael), which uses | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
119. | SPAM Shredder 3.1 (safechaos.com) | ||
SPAM Shredder is an anti-spam email client that automatically classifies incoming emails as spam or non-spam. SPAM Shredder is a spam filtering software that lets you remove spam emails just from the mail server without pulling them down into your Inbox. SPAM Shredder ensures the efficient and easy control | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
120. | Safe Express Free 3.4 (netsafesoft.com) | ||
highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 927 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
121. | Safe Express Home 4.2 (netsafesoft.com) | ||
highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
122. | SiteKiosk 6.0.98 (sitekiosk.com) | ||
feature-packed package is designed for public access stations and turns any PC into a kiosk. Users can only access sites, applications, and settings you approve through a shell you design. You can command SiteKiosk and extend its functionality via scripts, objects, and ActiveX controls, or simply configure it with wizards. Wizards let you assign individual access rights and export | |||
Updated: 9, 2005 | Rating: 0 | Author: PROVISIO PROVISIO | Size: 11203 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
123. | Maintenance Parts Bin 6.2.7 (nhuntsoftware.com) | ||
Maintenance Parts Bin is a comprehensive software inventory management tool. You can maintain your inventory as well as databases in the most cost effective and suitable way. The primary functionality is to maintain part stocks, cater to reorders and track parts. Secondarily, this tool allows you to | |||
Updated: 9, 2005 | Rating: 0 | Author: Nathan Hunt | Size: 10051 kb | Shareware Similar programs | |||
124. | Maintenance Parts Bin 6.2.7 (maintenancepartsbin.com) | ||
Maintenance Parts Bin is a comprehensive software inventory management tool. You can maintain your inventory as well as databases in the most cost effective and suitable way. The primary functionality is to maintain part stocks, cater to reorders and track parts. Secondarily, this tool allows you to | |||
Updated: 9, 2005 | Rating: 0 | Author: Nathan Hunt | Size: 10051 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
125. | OnTarget 3.76.16 (hometown.aol.com) | ||
Crespo Software Distributing, OnTarget is now available again to the public via RAD Software, and with added features that make it the better than ever! Called `The perfect 10-minute break', OnTarget has just the right mix of fun and learning that makes it a game enjoyed by children from 8 to 80 | |||
Updated: 9, 2005 | Rating: 91 | Author: Rad Delaroderie | Size: 1244 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
126. | FlyDS 1.8 (asvzzz.narod.ru) | ||
Internal scheduler. Still images capturing on timer or hot key pressing into BMP,JPEG or GIF files. Audio recording into wav or mp3 files. Channels scanning. Skins. Individual settings for each channel. Hot keys and command-line swiches.Resizeable video window with different styles. Start and stop video capturing in predefined time. Extended capture statistics | |||
Updated: 3, 2005 | Rating: 169 | Author: Serge Andyk | Size: 1360 kb | Shareware Similar programs | |||
127. | TreePad PLUS 7.2 (treepad.com) | ||
any kind of data has never been easier: use TreePad's tree to browse any previously created/imported text or document, just as you browse directories/folders in Win-Explorer. TreePad is fully customizable: work the way you feel comfortable! TOOL BARS: can be hidden, visible, floating, moved around. SEARCH ENGINE: very fast, multiple options for tree/texts, search/replace | |||
Updated: 2, 2006 | Rating: 0 | Author: Henk Hagedoorn | Size: 388 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
128. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
Blowfish, the most reliable contemporary algorithm, and with 448 bit key. Therefore, the network packages could never be eavesdropped by different network sniffers. This matter is of utterly importance for medium and large business corporations! Your information will never become the property of your | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
129. | Spam Alarm for POP3 2.2.2.18 (dignitysoftware.com) | ||
statistical analysis of individual words and heuristic scanning. Key Features: Blocks 99% of spam with zero false positives Standalone application - your email client remains intact Multiple e-mail account processing Attractive user interface with the skin engine No special configuration is required Black & White lists are available for precise settings No user | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugeny Politskovoy | Size: 3704 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
130. | NotesImp 1.5.2 (notesimp.com) | ||
of a menu and tool bar. Commands are accessed through main window's menu, right-click context menus or the tray icon. NotesImp works under Windows 9x, ME, NT4, 2000 and XP. NotesImp is handy and low resource consuming organizer with tree like hierarchical structure of notes and ability to protect your data using encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 1055 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
131. | PrivacyKeyboard 6.1 (anti-keylogger.com) | ||
PrivacyKeyboard for Microsoft Windows 2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs (keyloggers) and keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
132. | Wallpaper Sequencer Standard 4.51 (draxysoft.com) | ||
system startup or at specified time periods) or by pressing a hot key. Semi-transparent wallpaper calendar. Taskbar transparency and | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Dryazgin | Size: 4308 kb | Shareware Go to category: Desktop > Other Similar programs | |||
133. | ABF Photo Camera 1.01 (abf-soft.com) | ||
are fully supported. The program has a huge help manual, so use F1 key wherever you need. ABF Photo Camera is an extremely useful capture application. It allows you to easily make a real photo studio from your web cam or other capture device. You'll be able to see a video, take pictures and even make timer delayed | |||
Updated: 9, 2005 | Rating: 42 | Author: Anton Karpenko | Size: 1115 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
134. | NotesImp Lite 1.5.2 (notesimp.com) | ||
NotesImp Lite is handy and low resource consuming organizer with tree like hierarchical structure of notes. NotesImp Lite has ability to change its appearance using skins. You'll also find customizable keyboard shortcuts, automatically URLs detection and many more. NotesImp Lite works under Windows 9x, ME | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 681 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
135. | Classical Block 3.00 (zhangduo.com) | ||
Classical Tetris is designed for Tetris beginners and experts and even advanced experts. They alike would find many features that would increase their enjoyment of Tetris as well as improve their skill with the game. You will play the classical Tetris with MIDI, WAV or MP3 background music that you | |||
Updated: 9, 2005 | Rating: 42 | Author: Duo Zhang | Size: 625 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
136. | OnTarget 3.77.17 (padfile.radsoftware.org) | ||
Crespo Software Distributing, OnTarget is now available again to the public via RAD Software, and with added features that make it the better than ever! Called `The perfect 10-minute break', OnTarget has just the right mix of fun and learning that makes it a game enjoyed by children from 8 to 80 | |||
Updated: 2, 2006 | Rating: 70 | Author: Rad Software | Size: 1324 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
137. | AES Home 4.0 (abensoft.com) | ||
for sending encrypted files to people who do not have PGP or CHAOS Public Key installed. AES Home is the suite of encryption tools for personal and professional | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
138. | AES Pro 5.5 (abensoft.com) | ||
Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
139. | Active CHAOS 5.0 (safechaos.com) | ||
CHAOS is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 42 | Size: 996 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
140. | CHAOS Messenger 4.0 (safechaos.com) | ||
for sending encrypted files to people who do not have PGP or CHAOS Public Key installed. CHAOS Messenger is the utility program for safe distribution of the | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
141. | CHAOS Self Decryptor 3.9 (safechaos.com) | ||
for sending encrypted files to people who do not have PGP or CHAOS Public Key installed. CHAOS Self Decryptorr is the program that creates self-decrypting chaos-files for | |||
Updated: 9, 2005 | Rating: 0 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
142. | Home CHAOS 3.5 (safechaos.com) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
143. | WinSSHD 4.12 (bitvise.com) | ||
bvterm terminal access. Supports Windows groups and domain accounts; public key and Kerberos authentication; virtual accounts; provides powerful graphical as well as scriptable configuration. Ideal for remote server administration; as file server (SFTP); or for a software VPN (SSH port | |||
Updated: 2, 2006 | Rating: 289 | Author: Bitvise Limited | Size: 3912 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
144. | Tunnelier 4.12 (bitvise.com) | ||
Remote Desktop forwarding for graphical server access. Supports public key user authentication, as well as transparent authentication with Kerberos (GSSAPI) or NTLM. To satisfy special requirements, Tunnelier is highly customizable using a variety of command line parameters. Ideal for remote server administration using SSH - implements a complete set of features for this | |||
Updated: 2, 2006 | Rating: 1238 | Author: Bitvise Limited | Size: 4380 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Public key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|