|
||||||
|
||
|
Home > Cipher software |
Related keywords: stream cipher, secure email encrypted e mail encryption crypto online privacy rsa twofish block cipher stream ciphe |
|
|
1. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | Cynapse InfoCryptor 1.50 (cynapse.co.in) | ||
system, giving you military strength & security. InfoCryptor's easy to use Export / Import feature and its backup solution make secure portability and exchange of information a breeze. Features: 448-bit symmetric encryption cipher, Various levels of security implementation, Multiple User support with individually customisable user accounts, 'Export to encrypted | |||
Updated: 9, 2005 | Rating: 39 | Author: Apurva Roy Choudhury | Size: 5732 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
3. | Optimumcut-1D LITE 1.00 (optimumcut.com) | ||
Optimumcut-1D is a Stand-Alone (1 Dimension) Cutting List Generator and Linear Material Optimization Software Tool which calculates and displays exactly how to obtain the best yield from stock lengths of profile. Subsequently leading to significant savings in materials cost when estimating and ordering | |||
Updated: 2, 2006 | Rating: 90 | Author: Stephen Martin | Size: 2 kb | Shareware Go to category: Business > Other Similar programs | |||
4. | Boomer 4.0 (gfx2swf.com) | ||
your audio and video, create slideshows. Convert your mp3's and wave files to streaming format that half a billion user have. If you can drag and drop you can use this software. Create interactive graphics and audio with multiple links. Hundreds of combinations of effects. A " Lean, Mean, Streaming Machine" that's easy to use. Boomer uses the Flash Player from | |||
Updated: 9, 2005 | Rating: 0 | Author: Harry Hayes | Size: 1852 kb | Shareware Go to category: Development > Other Similar programs | |||
5. | EDCrypt 3.1 (softuarium.com) | ||
functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5 | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
6. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
(SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for files and strings in a single step. Aside from providing core string and file encryption services, Crypt implements advanced features such as Base64 based encryption | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
7. | M2Crypto Installer for Python 2.3 0.13.1 (sandbox.rulemaker.net) | ||
the following: - RSA, DSA, DH, HMACs, message digests, symmetric ciphers (including AES). - SSL functionality to implement clients and servers. - HTTPS extensions to Python's httplib, urllib and xmlrpclib. - PKI functionality. - Unforgeable HMAC'ing AuthCookies for web session management. - FTP/TLS client and server. - S/MIME. - ZServerSSL: A HTTPS server for | |||
Updated: 9, 2005 | Rating: 1064 | Author: Pheng Siong Ng | Size: 356 kb | Shareware Go to category: Development > Other Similar programs | |||
8. | Cipher - A Cryptogram Game by uuba.com 7.00b (uuba.com) | ||
your mind with great quotes and bad jokes. Cipher is a word game to unscramble phrases by correctly substituting letters of the alphabet into the puzzle - hence deciphering the phrase. Evaluation edition has 100 puzzles. Registered edition includes 1400 puzzles, ability to load other puzzle files, and "crypto-tool" to assist in solving other cryptograms. Challenge your | |||
Updated: 9, 2005 | Rating: 0 | Author: -- UUBA.com | Size: 325 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
9. | Crypto! 3.7 (KMRConsulting.com) | ||
Crypto! is a Windows version of the popular cryptogram puzzles often found in puzzle books and the Sunday paper. Crypto! selects a quote or phrase from its library of 50, encrypts it, and presents it for you to solve. Solving cryptograms with Crypto! is more fun because it is easy to try various letters and | |||
Updated: 9, 2005 | Rating: 42 | Author: Kenneth Reek | Size: 539 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
10. | Japanolle 1.3 (yavsoft.com) | ||
crosswords are ciphered pictures. You have a playing field with rows and columns, each of them is described by some number. The number says how many colored cells there are in each row/column. Their order corresponds to the order of colored areas. The purpose of the game is to fill the cells in the correct order. There are tons of different pictures to provide you with everlasting | |||
Updated: 3, 2005 | Rating: 0 | Author: John Drifter | Size: 964 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
11. | ABF Magnifying Tools 1.2 (abf-soft.com) | ||
ABF Magnifying Tools is a set of useful graphics tools for viewing the screen area in different zooms. Each tool has its own unique behavior and usability. All tools supplement each other and allow designers and people with poor eyesight to work with computers better. The set contains: Cursor Eye - a | |||
Updated: 9, 2005 | Rating: 0 | Author: Anton Karpenko | Size: 2073 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
12. | Able Graphic Manager 2.4.5 (graphicregion.com) | ||
Able Graphic Manager is a program that enables you to easily view, acquire, print and convert graphic files in normal (file by file), batch (many files at a time) and command line modes. Input formats: Drawing Interchange Format (DXF) generated by most CAD programs, TIFF Bitmap (TIF; TIFF), JPEG Bitmap | |||
Updated: 2, 2006 | Rating: 91 | Author: Graphic Region | Size: 2313 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
13. | Able Photo Slide Show 1.7 (graphicregion.com) | ||
Able Photo Slide Show displays your images continuously without you doing anything. You just point it to a file in folder, say how long to display each picture, select transition effects and then sit back and watch. If a picture is too large or less for your screen, it is resized to fit keeping the aspect | |||
Updated: 2, 2006 | Rating: 0 | Author: Graphic Region | Size: 3831 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
14. | AMI GIF Elements 1 2.0a.03 (mindworkshop.com) | ||
Elements #1 adds new magic to AMI GIF Construction Set Pro, the powerful web page animation software. Make your pages leap from the monitors of the people who surf them, fling pixels about the room and teleport some of your users to alternate parallel universes with this exciting plugin set - your mileage may | |||
Updated: 9, 2005 | Rating: 48 | Author: Alchemy Mindworks | Size: 6032 kb | Shareware Go to category: Graphic Apps > Animation Tools Similar programs | |||
15. | AMI PNG Elements 1 2.0a.03 (mindworkshop.com) | ||
Elements #1 adds new magic to AMI PNG/MNG Construction Set, the animation software for presentation and screen saver images. Make your creations leap from the monitors, fling pixels about the room and teleport some of your users to alternate parallel universes with this exciting plugin set - your mileage may | |||
Updated: 9, 2005 | Rating: 0 | Author: Alchemy Mindworks | Size: 6032 kb | Shareware Go to category: Graphic Apps > Animation Tools Similar programs | |||
16. | Fisheye Player 2.01 (imaysoft.com) | ||
Fisheye Player create 360 degree Panorama,Use single shot Fish eye image. With Web/Windows Published generates Java Applet and Executable File. No Stitching needed. System Character : (1) Multiple Panoramic image supported : Fisheye,Cylindrical,spherical,PAL35/PAL53,Panoramic Mirror. (2) One Shot Version 2.01 add Video Function, Create Panoramic AVI File | |||
Updated: 9, 2005 | Rating: 74 | Author: Cognac Hsih | Size: 10116 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
17. | LeoPicture 1.5 (leokrut.com) | ||
Select and modify part of image. Copy/paste image or selected area(s). Print and print preview images. Analyze color distribution and symmetry patterns in image and create MS Word report. Intuitive, colorful, rich and transparent user interface All intermediate variants of picture are | |||
Updated: 3, 2006 | Rating: 16 | Author: Leonid Sakharov | Size: 284 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
18. | FirmTools PanoramaComposer 2.0 (firmtools.com) | ||
preview that makes creating panoramas just as easy as playing Lego’s. Since the software uses a proprietary algorithm for stitching images, the overlap between images may be anywhere between two and fifty percents, with no stitches or other distortion visible. There is also a built-in image enhancing mechanism that get rids of glitches that may be present in the original images | |||
Updated: 9, 2005 | Rating: 19 | Author: Joe Kelner | Size: 1693 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
19. | The Panorama Factory 4.2 (panoramafactory.com) | ||
The Panorama Factory creates high-quality panoramas in a highly automated fashion from a set of overlapping digital images. You can add image hotspots, export to VR formats and create web pages that link your images into virtual tours. The software also corrects for lens-induced distortions and creates either | |||
Updated: 2, 2006 | Rating: 7410 | Author: John Strait | Size: 4917 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
20. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
host machine. X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full support for X-protocol connection forwarding Efficient TCP/IP Network File System: NFS (Client + Server) File transfer programs: FTP and TFTP Remote printing facilities (LPR, LPQ, LPRM) Interactive | |||
Updated: 2, 2006 | Rating: 82 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
21. | SecureCRT 4.1.2 (promaxum.com) | ||
SSH2 support provides AES, 3DES, RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to remote systems running UNIX and VMS as well as the many BBSs and databases that are now | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
22. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
Features include: Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full support for X-protocol connection forwarding Now with "Dynamic Port Forwarding". This unique feature allows you to start FTP, XStartup/Rexec and other facilities, without direct access to | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
23. | ZoomAView - The Computer Magnifier! 1.5 (zoomaview.com) | ||
to strain your eyes. Choose to have the lens show exactly what's under your mouse wherever it moves, or use "locked" mode for keeping the magnified area in place (great for Internet games!) ZoomAView also lets you pick from various pointer styles, and can reverse colors within the lens view (photo negative) for maximum visual clarity. ZoomAView is a powerful, easy to use computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Wondermill Webworks | Size: 1657 kb | Shareware Go to category: Graphic Apps > Screen Capture Similar programs | |||
24. | Ansel Adams Photographs 5.0 (cassdesign.com) | ||
screen saver are the photographs reflecting the beauty of America's National Parks, all seen through the lens of the great landscape photographer Ansel Adams. Ansel Adams Photographs: In this screen saver are the photographs reflecting the beauty of America's National Parks, all seen through the lens of the great landscape photographer Ansel | |||
Updated: 9, 2005 | Rating: 173 | Author: Andy Cass | Size: 3944 kb | Shareware Go to category: Desktop > Similar programs | |||
25. | World Saver 3D 3.3 (meanfox.com) | ||
A unique, stunning, fully-featured 3D Windows screensaver by MeanFox.com. It features a beautifully rendered 3D world slowly spinning against a backdrop of nebulae and stars, with the Sun and Moon correctly positioned in relation to the Earth. Additional visual effects including clouds, atmosphere, and lens | |||
Updated: 9, 2005 | Rating: 0 | Author: Mean Fox | Size: 926 kb | Shareware Go to category: Desktop > Similar programs | |||
26. | Absolute CHAOS 3.8 (safechaos.net) | ||
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. Absolute CHAOS has comprehensive | |||
Updated: 9, 2005 | Rating: 16 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
27. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
28. | AES Home 4.0 (aes.safeworld.info) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | AES Pro 5.5 (aes.safeworld.info) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 16 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
30. | BlowFish 2000 2.8 (gregorybraun.com) | ||
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
31. | CHAOS Chameleon 3.8 (safechaos.net) | ||
CHAOS Chameleon allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. CHAOS Chameleon has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly. CHAOS Chameleon has | |||
Updated: 9, 2005 | Rating: 0 | Size: 374 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
32. | CHAOS For Security 2.9 (safechaos.net) | ||
Encrypt and compress individual files and folders. Drag and Drop support. CHAOS for security of your secrets. Encrypt and compress individual files and folders. | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
33. | CHAOS' Doors 3.7 (safechaos.net) | ||
Comprehensive privacy tools including file/folder encryption, e-mail encryption, file/folder shredder. The program is compact, efficient and user friendly. Required cryptographic procedures are enforced in the new graphical user interface Drag and Drop support. CHAOS' doors is opened in a world of safety | |||
Updated: 9, 2005 | Rating: 0 | Size: 402 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | Crypto 2000 4.2 (gregorybraun.com) | ||
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
36. | CryptoForge 3.2.5 (cryptoforge.com) | ||
features include multiple encryption, filename encryption, cipher speed meter, password cache with timeout, and compression level control. This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | Crypton 1.0 (uic.nnov.ru) | ||
and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. Of course, if you are really concerned about | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | Hiding CHAOS 5.6 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | Invisible CHAOS 5.1 (safechaos.net) | ||
sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has comprehensive privacy tools, including file/folder compression | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
41. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
42. | SafeCryptor 1.5 (gemiscorp.com) | ||
SafeCryptor provides you with safe, fast and reliable text encryption anywhere, anytime, and lets you securely and quickly send all of your sensitive and personal information (e.g., login, password, credit card number) via e-mail or chat session to your partners, customers, friends or family. SafeCryptor is | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 1472 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
43. | URenameIT 2.3 (particleg.com) | ||
and time stamps. Perform advanced renaming using SoundEx, Caesars cipher, and parse various types of documents to extract a particular line for the file name. Many operations are geared towards cleaning, including space removal and consolidation, case management, normalizing, and padding. In addition, the find and remove abilities against sub strings or positions is near surgical in | |||
Updated: 9, 2005 | Rating: 0 | Author: ParticleG ParticleG | Size: 1180 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
44. | USA Shield 2.15 (usa.safeworld.info) | ||
USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
45. | virtualCrypt 3.02 (netindiasolutions.com) | ||
virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
46. | XFILEBOX 1.0 (wisehuman.com) | ||
your files more easily, and also a security utility with built-in cipher that enables you to store your files securely. XFILEBOX is a powerful, easy to use utility for managing, protecting, and backuping your important files or folders. It is a wonderful archive manager that enables you to organize your files more easily, and enables you to store your files | |||
Updated: 9, 2005 | Rating: 0 | Author: Xia Mou | Size: 1562 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
47. | CryptIt 1.301 (SinnerComputing.com) | ||
correctly. CryptIt can also generate key files (from a stream cipher and thus not best for OTP usage) and analyse the suitability of your own files for key usage. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
48. | Armor System5 2.2.2 (ambitware.com) | ||
of encryption keys. Keys are generated automatically based on user's pass-phrase input and optimized for compatibility. Armor System5 will also eliminate all the evidence of the sensitive documents with its build-in Wipe utility. The program can be used with our free ARS5 Viewer/Decryptor for an easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Vlach | Size: 5986 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
49. | I-Cipher AP 2.2.2 (ambitware.com) | ||
with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
50. | Ulead PhotoImpact 8 (ulead.com) | ||
PhotoImpact 8 is designed to meet the needs of digital camera users and amateur photographers for managing, enhancing and sharing photos. PhotoImpact also provides Web and graphics enthusiasts with a comprehensive set of tools without a steep learning curve. PhotoImpact gives you easy one-click photo | |||
Updated: 9, 2005 | Rating: 0 | Author: Ulead Systems | Size: 31744 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
|
Home > Cipher software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|