|
||||||
|
||
|
Home > Cipher software |
Related keywords: stream cipher, secure email encrypted e mail encryption crypto online privacy rsa twofish block cipher stream ciphe |
|
|
1. | ABF Magnifying Tools 1.2 (abf-soft.com) | ||
ABF Magnifying Tools is a set of useful graphics tools for viewing the screen area in different zooms. Each tool has its own unique behavior and usability. All tools supplement each other and allow designers and people with poor eyesight to work with computers better. The set contains: Cursor Eye - a | |||
Updated: 9, 2005 | Rating: 0 | Author: Anton Karpenko | Size: 2073 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
2. | Able Graphic Manager 2.4.5 (graphicregion.com) | ||
Able Graphic Manager is a program that enables you to easily view, acquire, print and convert graphic files in normal (file by file), batch (many files at a time) and command line modes. Input formats: Drawing Interchange Format (DXF) generated by most CAD programs, TIFF Bitmap (TIF; TIFF), JPEG Bitmap | |||
Updated: 2, 2006 | Rating: 91 | Author: Graphic Region | Size: 2313 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
3. | Able Photo Slide Show 1.7 (graphicregion.com) | ||
Able Photo Slide Show displays your images continuously without you doing anything. You just point it to a file in folder, say how long to display each picture, select transition effects and then sit back and watch. If a picture is too large or less for your screen, it is resized to fit keeping the aspect | |||
Updated: 2, 2006 | Rating: 0 | Author: Graphic Region | Size: 3831 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
4. | Absolute CHAOS 3.8 (safechaos.net) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 16 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Absolute CHAOS 3.8 (safechaos.com) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 0 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 16 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | AES Home 4.0 (aes.safeworld.info) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | AES Home 4.0 (abensoft.com) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | AES Pro 5.5 (aes.safeworld.info) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 16 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
11. | AES Pro 5.5 (abensoft.com) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
12. | AMI GIF Elements 1 2.0a.03 (mindworkshop.com) | ||
Elements #1 adds new magic to AMI GIF Construction Set Pro, the powerful web page animation software. Make your pages leap from the monitors of the people who surf them, fling pixels about the room and teleport some of your users to alternate parallel universes with this exciting plugin set - your mileage may | |||
Updated: 9, 2005 | Rating: 48 | Author: Alchemy Mindworks | Size: 6032 kb | Shareware Go to category: Graphic Apps > Animation Tools Similar programs | |||
13. | AMI PNG Elements 1 2.0a.03 (mindworkshop.com) | ||
Elements #1 adds new magic to AMI PNG/MNG Construction Set, the animation software for presentation and screen saver images. Make your creations leap from the monitors, fling pixels about the room and teleport some of your users to alternate parallel universes with this exciting plugin set - your mileage may | |||
Updated: 9, 2005 | Rating: 0 | Author: Alchemy Mindworks | Size: 6032 kb | Shareware Go to category: Graphic Apps > Animation Tools Similar programs | |||
14. | Ansel Adams Photographs 5.0 (cassdesign.com) | ||
screen saver are the photographs reflecting the beauty of America's National Parks, all seen through the lens of the great landscape photographer Ansel Adams. Ansel Adams Photographs: In this screen saver are the photographs reflecting the beauty of America's National Parks, all seen through the lens of the great landscape photographer Ansel | |||
Updated: 9, 2005 | Rating: 173 | Author: Andy Cass | Size: 3944 kb | Shareware Go to category: Desktop > Similar programs | |||
15. | Armor System5 2.2.2 (ambitware.com) | ||
of encryption keys. Keys are generated automatically based on user's pass-phrase input and optimized for compatibility. Armor System5 will also eliminate all the evidence of the sensitive documents with its build-in Wipe utility. The program can be used with our free ARS5 Viewer/Decryptor for an easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Vlach | Size: 5986 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
16. | BlowFish 2000 2.8 (gregorybraun.com) | ||
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
17. | Bodie's Calendar 2.25 (iespana.es) | ||
Calendar is a desktop calendar with alarm and notes. Its simplistic modular design is perfect for the user that needs to track important info. It features Stay-on-top mode, minimizes to a desktray icon, supports drag 'n drop, search and replace text in the current note or across all notes, cipher and decipher notes, it is highly configurable, is multi-lingual (English | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcelo Dato | Size: 310 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
18. | Boomer 4.0 (gfx2swf.com) | ||
your audio and video, create slideshows. Convert your mp3's and wave files to streaming format that half a billion user have. If you can drag and drop you can use this software. Create interactive graphics and audio with multiple links. Hundreds of combinations of effects. A " Lean, Mean, Streaming Machine" that's easy to use. Boomer uses the Flash Player from | |||
Updated: 9, 2005 | Rating: 0 | Author: Harry Hayes | Size: 1852 kb | Shareware Go to category: Development > Other Similar programs | |||
19. | CHAOS Chameleon 3.8 (safechaos.net) | ||
CHAOS Chameleon allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. CHAOS Chameleon has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. CHAOS Chameleon has | |||
Updated: 9, 2005 | Rating: 0 | Size: 374 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | CHAOS For Security 2.9 (safechaos.net) | ||
Encrypt and compress individual files and folders. Drag and Drop support. CHAOS for security of your secrets. Encrypt and compress individual files and folders. | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
21. | CHAOS' Doors 3.7 (safechaos.net) | ||
Comprehensive privacy tools including file/folder encryption, e-mail encryption, file/folder shredder. The program is compact, efficient and user friendly. Required cryptographic procedures are enforced in the new graphical user interface Drag and Drop support. CHAOS' doors is opened in a world of safety | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | Cipher - A Cryptogram Game by uuba.com 7.00b (uuba.com) | ||
your mind with great quotes and bad jokes. Cipher is a word game to unscramble phrases by correctly substituting letters of the alphabet into the puzzle - hence deciphering the phrase. Evaluation edition has 100 puzzles. Registered edition includes 1400 puzzles, ability to load other puzzle files, and "crypto-tool" to assist in solving other cryptograms. Challenge your | |||
Updated: 9, 2005 | Rating: 0 | Author: -- UUBA.com | Size: 325 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
23. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | CryptIt 1.301 (SinnerComputing.com) | ||
correctly. CryptIt can also generate key files (from a stream cipher and thus not best for OTP usage) and analyse the suitability of your own files for key usage. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | Crypto 2000 4.2 (gregorybraun.com) | ||
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | Crypto! 3.7 (KMRConsulting.com) | ||
Crypto! is a Windows version of the popular cryptogram puzzles often found in puzzle books and the Sunday paper. Crypto! selects a quote or phrase from its library of 50, encrypts it, and presents it for you to solve. Solving cryptograms with Crypto! is more fun because it is easy to try various letters and | |||
Updated: 9, 2005 | Rating: 42 | Author: Kenneth Reek | Size: 539 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
27. | CryptoForge 3.2.5 (cryptoforge.com) | ||
features include multiple encryption, filename encryption, cipher speed meter, password cache with timeout, and compression level control. This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
28. | CryptoForge 3.2.5 (cryptoforge.com) | ||
features include multiple encryption, filename encryption, cipher speed meter, password cache with timeout, and compression level control. This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | Crypton 1.0 (uic.nnov.ru) | ||
and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
30. | Cynapse InfoCryptor 1.50 (cynapse.co.in) | ||
system, giving you military strength & security. InfoCryptor's easy to use Export / Import feature and its backup solution make secure portability and exchange of information a breeze. Features: 448-bit symmetric encryption cipher, Various levels of security implementation, Multiple User support with individually customisable user accounts, 'Export to encrypted | |||
Updated: 9, 2005 | Rating: 39 | Author: Apurva Roy Choudhury | Size: 5732 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
31. | EDCrypt 3.1 (softuarium.com) | ||
functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
32. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. Of course, if you are really concerned about | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
33. | FirmTools PanoramaComposer 2.0 (firmtools.com) | ||
preview that makes creating panoramas just as easy as playing Lego’s. Since the software uses a proprietary algorithm for stitching images, the overlap between images may be anywhere between two and fifty percents, with no stitches or other distortion visible. There is also a built-in image enhancing mechanism that get rids of glitches that may be present in the original images | |||
Updated: 9, 2005 | Rating: 19 | Author: Joe Kelner | Size: 1693 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | Fisheye Player 2.01 (imaysoft.com) | ||
Fisheye Player create 360 degree Panorama,Use single shot Fish eye image. With Web/Windows Published generates Java Applet and Executable File. No Stitching needed. System Character : (1) Multiple Panoramic image supported : Fisheye,Cylindrical,spherical,PAL35/PAL53,Panoramic Mirror. (2) One Shot Version 2.01 add Video Function, Create Panoramic AVI File | |||
Updated: 9, 2005 | Rating: 74 | Author: Cognac Hsih | Size: 10116 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
35. | Hiding CHAOS 5.6 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | Home CHAOS 3.5 (safechaos.com) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | I-Cipher AP 2.2.2 (ambitware.com) | ||
with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | Invisible CHAOS 5.1 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | Japanolle 1.3 (yavsoft.com) | ||
crosswords are ciphered pictures. You have a playing field with rows and columns, each of them is described by some number. The number says how many colored cells there are in each row/column. Their order corresponds to the order of colored areas. The purpose of the game is to fill the cells in the correct order. There are tons of different pictures to provide you with everlasting | |||
Updated: 3, 2005 | Rating: 0 | Author: John Drifter | Size: 964 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
41. | LeoPicture 1.5 (leokrut.com) | ||
Select and modify part of image. Copy/paste image or selected area(s). Print and print preview images. Analyze color distribution and symmetry patterns in image and create MS Word report. Intuitive, colorful, rich and transparent user interface All intermediate variants of picture are | |||
Updated: 3, 2006 | Rating: 16 | Author: Leonid Sakharov | Size: 284 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
42. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
(SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for files and strings in a single step. Aside from providing core string and file encryption services, Crypt implements advanced features such as Base64 based encryption | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
43. | M2Crypto Installer for Python 2.3 0.13.1 (sandbox.rulemaker.net) | ||
the following: - RSA, DSA, DH, HMACs, message digests, symmetric ciphers (including AES). - SSL functionality to implement clients and servers. - HTTPS extensions to Python's httplib, urllib and xmlrpclib. - PKI functionality. - Unforgeable HMAC'ing AuthCookies for web session management. - FTP/TLS client and server. - S/MIME. - ZServerSSL: A HTTPS server for | |||
Updated: 9, 2005 | Rating: 1064 | Author: Pheng Siong Ng | Size: 356 kb | Shareware Go to category: Development > Other Similar programs | |||
44. | Optimumcut-1D LITE 1.00 (optimumcut.com) | ||
Optimumcut-1D is a Stand-Alone (1 Dimension) Cutting List Generator and Linear Material Optimization Software Tool which calculates and displays exactly how to obtain the best yield from stock lengths of profile. Subsequently leading to significant savings in materials cost when estimating and ordering | |||
Updated: 2, 2006 | Rating: 90 | Author: Stephen Martin | Size: 2 kb | Shareware Go to category: Business > Other Similar programs | |||
45. | Pixie Power Swapper 1.02 (artichokegames.com) | ||
Pixie Power Swapper is a light hearted puzzle game in which you swap blocks back and forth across a game board in order to complete lines of a given color. To aid you in this endeavor you have access to four Pixies, each of whom can perform special tricks. Your pixie power meter rises with your score, when it | |||
Updated: 9, 2005 | Rating: 0 | Author: Katarzyna Uchnast | Size: 2604 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
46. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | SafeCryptor 1.5 (gemiscorp.com) | ||
SafeCryptor provides you with safe, fast and reliable text encryption anywhere, anytime, and lets you securely and quickly send all of your sensitive and personal information (e.g., login, password, credit card number) via e-mail or chat session to your partners, customers, friends or family. SafeCryptor is | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 1472 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
48. | SecureCRT 4.1.2 (promaxum.com) | ||
SSH2 support provides AES, 3DES, RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and databases that are now | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
49. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
Features include: Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
50. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
Features include: Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Cipher software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|