|
||||||
|
||
|
Home > Secret key encryption software |
Related keywords: encryption, secret, file encryption, Encryption, encryption software, encryption system, email encryption, data encryption, hard disk encryption, ENCRYPTION |
|
|
1. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 520 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
2. | teoria 2.0 (teoria.com) | ||
and 13ths), scales (major, minor, modes, whole tone, diminished), key signatures, harmonic functions (secondary dominants and diminished 7hs and sixth chords), harmonic progressions and melodic dictation. Level can be set according to your needs. Online, context sensitive help, interval, scales and chord construction tools, setup and uninstall program (using Windows Installer) is | |||
Updated: 3, 2005 | Rating: 48 | Author: Jose Rodriguez Alvira | Size: 7704 kb | Shareware Go to category: Education > Other Similar programs | |||
3. | HIME: Huge Integer Math and Encryption 1.04 (users.skynet.be) | ||
stands for Huge Integer Math and Encryption library. It is a collection of functions for Windows programmers that allows to implement RSA public key encryption, AES (Rijndael) and ArcFour (RC4) secret key encryption and digital signatures using the SHA-1, SHA-256 or | |||
Updated: 9, 2005 | Rating: 949 | Author: E. Van Esch | Size: 747 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
4. | ICE License 2.01 (aidsoft.com) | ||
against illegal copy using the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system allow transmission of secret information over an open channel without a common secret key previously shared between the ends.ICE | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
5. | Spell ID 2.02 (aidsoft.com) | ||
Learn all scales, intervals, triads to 13th chords, cadences, borrowed chords and secondary dominants. Learn the pop chords in 'real' books and sheet music, all with immediate feedback and scoring.The Help file is a complete music theory book. Answer questions by clicking the screen keyboard. See your | |||
Updated: 9, 2005 | Rating: 0 | Author: Gil Trythall | Size: 735 kb | Demo Go to category: Education > Other Similar programs | |||
6. | Sammy Suricate 1.45 (suricate-software.com) | ||
protecting the gems and finding out how suricates taste. The player’s task is to help Sammy escape, avoid the Lions and find the gems, armed with nothing more than Sammy’s wits, speed and wasps. The game comes with a forgiving learning curve. The initial tutorial stages are simple enough for | |||
Updated: 9, 2005 | Rating: 0 | Author: Suricate Software | Size: 9000 kb | Shareware Go to category: Games & Entertainment > Other Similar programs | |||
7. | 007 Spy Software 3.01 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2005 | Rating: 1455 | Author: Demi He | Size: 2176 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | StrongDisk Pro 2.9 (strongdisk.de) | ||
which is specified during disk creation, and/or insert electronic key or diskette with key file. Without required password and/or a key nobody, including developers, can access the secret data on the protected disk, even if intruders possess the physical media. After the password | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | CryptoCrat 2005 4.61 (secureaction.com) | ||
2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating self-decrypting exe archives. To send them to your friends and | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
you want to send someone an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Secret key encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|