AlligatorSQL Business Intelligence Edition 1.45
AlligatorSQLis the first IDE covering the most common database servers in the market through on common conception. Crossadministration and…
KVT ImageCutter 1.5
This programm is intended for all WWW authors. It cuts large graphic images in few pieces and then creates the HTML file with the table…
 
   
   
     
Example:  Norton Antivirus
 
• New       • TOP       • Most popular       • All soft       • Advertising       • Add program       • Support       • Link to us       • About       • Board      
audio & multimedia  business  communications  desktop  development  education  games & entertainment  graphics apps  home & hobby  network & internet  security & privacy  servers  system utilities  web development  A B C D E F G I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9

Home > Sha software

Home
Software
New soft
TOP-10
Best 1000
All Soft
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Number of references on page:10 | 20 | 30 | 50 | 100
Language: Any | English | German | French | Italian | Japanese | Portuguese | Spanish
License: Any | Freeware | Shareware | Demo | Adware | Commercial | Data Only
Installation: Any | Install and Uninstall | Install Only | No Install Support | Uninstall Only
Operational system: Any | Windows 95 | 98 | ME | NT | 2000 | XP | CE | Unix | Palm | Mac


Search result:
programs found: 10.

1.CDCheck 3.1.11 (elpros.si) free  CDCheck download
Besides that CDCheck supports creation and checking of MD5, CRC-32, SHA... hashes in SFV, MD5 and CRC file formats. This provides means to check backups for possible loss of information or verify file transfers where comparing is not possible (transfer over mail etc.). The program can be used with all local or removable media (CDs, DVDs, disk drives, floppy disks, ZIP drives, USB…
Updated: 2, 2006 | Rating: 1217 | Author: Mitja Perko | Size: 1400 kb | Shareware
Go to category: System Utilities > Backup & Restore
Similar programs
2.HIME: Huge Integer Math and Encryption 1.04 (users.skynet.be) free  HIME: Huge Integer Math and Encryption download
ArcFour (RC4) secret key encryption and digital signatures using the SHA-1, SHA-256 or MD5 Secure Hash Algorithm in your programs. HIME also contains functions for huge prime number generation, cryptographically secure random number generation (a.o. Blum-Blum-Shub and RSA), Diffie-Hellman key exchange algorithm and huge integer number mathematical operations. These…
Updated: 9, 2005 | Rating: 949 | Author: E. Van Esch | Size: 747 kb | Shareware
Go to category: Development > Components & Libraries
Similar programs
3.Lucigenic Crypt 4.4 (lucigenic.com) free  Lucigenic Crypt download
algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for files and strings in a single step. Aside from providing core string and file encryption services, Crypt…
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware
Go to category: Development > Other
Similar programs
4.RSP Checksum OCX 2.6.0 (rspsoftware.clic3.net) free  RSP Checksum OCX download
fast the checksum of strings or files using Adler32 , CRC32 , MD5 , SHA-1 and SHA-256 , the code is optimized for new AMD and Intel processors running very fast in the win32 environment ActiveX OCX to compute very fast the checksum of strings or files using Adler32 , CRC32 , MD5 , SHA-1 and…
Updated: 3, 2005 | Rating: 298 | Author: Ricardo Pereira | Size: 366 kb | Shareware
Go to category: Development > Active X
Similar programs
5.SecureWord 1.5 (secureword.com) free  SecureWord download
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy…
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware
Go to category: Security & Privacy > Password Managers
Similar programs
6.SecureWord 1.5 (cezeo.com) free  SecureWord download
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy…
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware
Go to category: Security & Privacy > Password Managers
Similar programs
7.Tray Safe 4.3 (traysafe.com) free  Tray Safe download
most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray Safe…
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware
Go to category: Security & Privacy > Password Managers
Similar programs
8.Tray Safe 4.3 (fgroupsoft.com) free  Tray Safe download
most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray Safe…
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware
Go to category: Security & Privacy > Password Managers
Similar programs
9.Winalysis 3.1 (winalysis.com) free  Winalysis download
Monitor for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP…
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware
Go to category: System Utilities > File & Disk Management
Similar programs
10.Window Security Toolkit 5.0 (dmisoftware.com) free  Window Security Toolkit download
Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel, display settings, network, passwords, users, dos, games, internet, memory, printers, desktop, system, Internet…
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware
Go to category: System Utilities > Other
Similar programs

Sort programs by: relevance | date | alphabet | popularity


301 Moved Permanently

301 Moved Permanently


nginx

Home > Sha software

WinProof 5.0
WinProof is a major advance over other grammar checkers. It goes beyond simple grammar checking and it can actually proofread like a person…
Sydock XML Document Processor 1.1
Sydock XML Document Processor allows you to work with XML-documents in the same way as with regular documents in popular text-processors…
Criminal Tango 3.01
A board/dice game for 1-6 players. Try to steal, plunder and betray other players and sooner or later you will find yourself in the prison…

Copyright © 2004 - 2010 allworldsoft.com Contact Page