|
||||||
|
||
|
Home > Asymmetric software |
|
|
1. | SafeCryptor 1.5 (gemiscorp.com) | ||
SafeCryptor provides you with safe, fast and reliable text encryption anywhere, anytime, and lets you securely and quickly send all of your sensitive and personal information (e.g., login, password, credit card number) via e-mail or chat session to your partners, customers, friends or family. SafeCryptor is | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 1472 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | SecureFile 2.0 (securefile.tripod.com) | ||
that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ private key ) for the | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
3. | Proxy Workbench 1.2 (tcpiq.com) | ||
failure simulation strategies allow you to simulate: a) Slow or asymmetric Internet connections (bandwidth throttling) b) Servers that are underpowered, overloaded or under attack (connection refusal) c) Intermittent connections (connection termination) d) Disconnected network cables (connection | |||
Updated: 9, 2005 | Rating: 0 | Author: Dave Apelt | Size: 6144 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
4. | CryptoHeaven 2.5.2 (cryptoheaven.com) | ||
provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management. Your data and your information stored in our Secure Data Center are illegible to anyone without your private key and passphase. Send and | |||
Updated: 9, 2005 | Rating: 43 | Author: Marcin Kurzawa | Size: 10413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | CryptoHeaven for Java(tm) 2.5.2 (cryptoheaven.com) | ||
provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management. Your data and your information stored in our Secure Data Center are illegible to anyone without your private key and passphase. Send and | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcin Kurzawa | Size: 1940 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | PaintStar 2.60 (paintstar2004.com) | ||
Fill tools include linear,radial,square,conical(symmetric),conical(asymmetric) and shapeburst. Multiple colors supported. Selection tools including rectangular, elliptical, free, fuzzy and paths. Add, subtract, invert, antialias and feather selections supported. Zoom 10% - 2000% display, and show grid supported. More then 30 File formats supported include JPEG, GIF, PNG, TIFF, TGA | |||
Updated: 9, 2005 | Rating: 16 | Author: Zhenzhou Wang | Size: 2696 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
7. | 2Gif 5.3 (fcodersoft.com) | ||
2GIF is a command line graphics converter allowing you to convert images to gif format from 50 image files formats including conversions from jpeg to gif, from bitmap to gif, from tiff to gif and so on. The program has no windows interface and is fully optimized for working in background mode. 2GIF processes | |||
Updated: 9, 2005 | Rating: 42 | Author: Laisan Shafikova | Size: 2795 kb | Demo Go to category: Graphic Apps > Editors Similar programs | |||
8. | OpenSSL 0.9.7c (download.componentspot.com) | ||
the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital signature schemes to digitally sign documents. The Open SSL library uses some but not all of these | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
9. | ICE License 2.01 (aidsoft.com) | ||
barrier against illegal copy using the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system allow transmission of secret information over an open channel without a common secret key previously shared between the ends.ICE License Features : * Antidebugging & Antimonitors Protection (protect against Code Tracing) * Sophisticated | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
10. | cryptlib 3.0 (download.componentspot.com) | ||
algorithms: В· HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally, asymmetric (public/private key) encryption algorithms such as the following are available: В· Diffie-Hellman, DSA, RSA cryptlib can also be used with a variety of crypto devices (for example, Fortezza cards and Smart cards). The | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
|
Home > Asymmetric software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|