|
||||||
|
||
|
Home > Cipher software |
Related keywords: stream cipher, secure email encrypted e mail encryption crypto online privacy rsa twofish block cipher stream ciphe |
|
|
61. | virtualCrypt 3.02 (netindiasolutions.com) | ||
virtualCrypt is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
62. | XFILEBOX 1.0 (wisehuman.com) | ||
your files more easily, and also a security utility with built-in cipher that enables you to store your files securely. XFILEBOX is a powerful, easy to use utility for managing, protecting, and backuping your important files or folders. It is a wonderful archive manager that enables you to organize your files more easily, and enables you to store your files | |||
Updated: 9, 2005 | Rating: 0 | Author: Xia Mou | Size: 1562 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
63. | ZoomMagic 2.03 (peakstars.com) | ||
ZoomMagic is a powerful tool to magnify any portion of your screen, measure distances or capture a screen area. Targeted users are: designers and developers on the hunt for those lost pixels .. or in the need for a fast screencapture, users with visual impairments or anybody who needs to find the shortest way | |||
Updated: 9, 2005 | Rating: 0 | Author: Peak Stars | Size: 1668 kb | Freeware Go to category: Graphic Apps > Other Similar programs | |||
64. | Gravitational Lensing 1.00 (kwakkelflap.com) | ||
General Theory of Relativity demonstrates that a large mass can deform spacetime and bend the path of light. So, a very massive object, such as a cluster of galaxies can act as a gravitational lens. When light passes through the cluster from an object lying behind it, the light is bent and focused to produce an image or images of the source. The image may be magnified | |||
Updated: 9, 2005 | Rating: 25 | Author: Wouter Dhondt | Size: 74 kb | Freeware Go to category: Home & Hobby > Astrology / Biorhythms / Mystic Similar programs | |||
65. | CryptIt 1.301 (SinnerComputing.com) | ||
correctly. CryptIt can also generate key files (from a stream cipher and thus not best for OTP usage) and analyse the suitability of your own files for key usage. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | Armor System5 2.2.2 (ambitware.com) | ||
of encryption keys. Keys are generated automatically based on user's pass-phrase input and optimized for compatibility. Armor System5 will also eliminate all the evidence of the sensitive documents with its build-in Wipe utility. The program can be used with our free ARS5 Viewer/Decryptor for an easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Vlach | Size: 5986 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
67. | I-Cipher AP 2.2.2 (ambitware.com) | ||
with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
68. | Ulead PhotoImpact 8 (ulead.com) | ||
PhotoImpact 8 is designed to meet the needs of digital camera users and amateur photographers for managing, enhancing and sharing photos. PhotoImpact also provides Web and graphics enthusiasts with a comprehensive set of tools without a steep learning curve. PhotoImpact gives you easy one-click photo | |||
Updated: 9, 2005 | Rating: 0 | Author: Ulead Systems | Size: 31744 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
69. | Ulead PhotoImpact 8 (ulead.com) | ||
PhotoImpact 8 is designed to meet the needs of digital camera users and amateur photographers for managing, enhancing and sharing photos. PhotoImpact also provides Web and graphics enthusiasts with a comprehensive set of tools without a steep learning curve. PhotoImpact gives you easy one-click photo | |||
Updated: 9, 2005 | Rating: 42 | Author: Ulead Systems | Size: 31744 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
70. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
Encryption algorithm used is much stronger than the 128 bit cipher used in todays browsers and considered secure enough for online credit card payments. Option to enter the password only once for all protected files. Customizable encrypted files layout. You can use one or more passwords.Many additional security options are available. For more information visit | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
|
Home > Cipher software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|