|
||||||
|
||
|
Home > Asymmetric software |
|
|
1. | ContactDB 1.3.0 (multicomputing.com) | ||
ContactDB is a multi-purpose contact and mailing list management program. Using this program, you can track address information as well as telephone and e-mail information about your contacts. Besides contact information, you can also track daily events associated with your contacts. ContactDB does not | |||
Updated: 3, 2005 | Rating: 0 | Author: Percival Blenman | Size: 1863 kb | Shareware Go to category: Business > Other Similar programs | |||
2. | CryptoHeaven for Mac OS X 2.5.2 (cryptoheaven.com) | ||
provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management. Your data and your information stored in our Secure Data Center are illegible to anyone without your private key and passphase. Send and | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcin Kurzawa | Size: 1920 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
3. | cryptlib 3.0 (download.componentspot.com) | ||
algorithms: В· HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally, asymmetric (public/private key) encryption algorithms such as the following are available: В· Diffie-Hellman, DSA, RSA cryptlib can also be used with a variety of crypto devices (for example, Fortezza cards and Smart cards). The | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
4. | ICE License 2.01 (aidsoft.com) | ||
barrier against illegal copy using the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system allow transmission of secret information over an open channel without a common secret key previously shared between the ends.ICE License Features : * Antidebugging & Antimonitors Protection (protect against Code Tracing) * Sophisticated | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
5. | OpenSSL 0.9.7c (download.componentspot.com) | ||
the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital signature schemes to digitally sign documents. The Open SSL library uses some but not all of these | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
6. | 2Gif 5.3 (fcodersoft.com) | ||
2GIF is a command line graphics converter allowing you to convert images to gif format from 50 image files formats including conversions from jpeg to gif, from bitmap to gif, from tiff to gif and so on. The program has no windows interface and is fully optimized for working in background mode. 2GIF processes | |||
Updated: 9, 2005 | Rating: 42 | Author: Laisan Shafikova | Size: 2795 kb | Demo Go to category: Graphic Apps > Editors Similar programs | |||
7. | PaintStar 2.60 (paintstar2004.com) | ||
Fill tools include linear,radial,square,conical(symmetric),conical(asymmetric) and shapeburst. Multiple colors supported. Selection tools including rectangular, elliptical, free, fuzzy and paths. Add, subtract, invert, antialias and feather selections supported. Zoom 10% - 2000% display, and show grid supported. More then 30 File formats supported include JPEG, GIF, PNG, TIFF, TGA | |||
Updated: 9, 2005 | Rating: 16 | Author: Zhenzhou Wang | Size: 2696 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
8. | CryptoHeaven 2.5.2 (cryptoheaven.com) | ||
provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management. Your data and your information stored in our Secure Data Center are illegible to anyone without your private key and passphase. Send and | |||
Updated: 9, 2005 | Rating: 43 | Author: Marcin Kurzawa | Size: 10413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | CryptoHeaven for Java(tm) 2.5.2 (cryptoheaven.com) | ||
provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management. Your data and your information stored in our Secure Data Center are illegible to anyone without your private key and passphase. Send and | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcin Kurzawa | Size: 1940 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | Proxy Workbench 1.2 (tcpiq.com) | ||
failure simulation strategies allow you to simulate: a) Slow or asymmetric Internet connections (bandwidth throttling) b) Servers that are underpowered, overloaded or under attack (connection refusal) c) Intermittent connections (connection termination) d) Disconnected network cables (connection | |||
Updated: 9, 2005 | Rating: 0 | Author: Dave Apelt | Size: 6144 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
|
Home > Asymmetric software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|