|
||||||
|
||
|
Home > Public key software |
Related keywords: public, Public, public records, public address, public kiosks, public access internet terminal, public relations, public key encryption, Public Analysis, public folders |
|
|
121. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
of it, i.e. opening it and prompting the user to enter a matching key phrase. Its user friendly interface is very intuitive - no need to study the manual. ShyFile also encrypts single or multiple binary files as well as whole folders with all its subfolders in a single run, which require a free demo version of ShyFile to decode though. ShyFile exclusively makes use of its own | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
122. | SI-Metric Office 2.1 (butterflyvista.com) | ||
army knife of business desktop utilities, includes several essential key utilities under one sleek customizable interface. With our integrated voice technology, you can keep your attention focused on whatever you are doing. You can configure SI-Metric Office to say the time and read your reminders | |||
Updated: 3, 2005 | Rating: 0 | Size: 6533 kb | Shareware Go to category: Business > Other Similar programs | |||
123. | SignIt! for Windows 1.1 (xlreader.com) | ||
(protection) and certification of the file. 2) Create private keys Objective: create a key to be used (or reused) to sign JAR files. 3) Manage private keys Objective: change aliases, passwords, copy/delete entries, ... 3 features: 1) sign a JAR file (main function), 2) create private keys, 3) manage private | |||
Updated: 8, 2004 | Rating: 130 | Author: Robert Della Malva | Size: 21300 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
124. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
passwords and pass phrases. Top Secret Crypto Gold includes RSA Key Creation, Public and Secret Key Ring Management procedures, data compression procedures, e-mail and file encryption procedures, One Time Pad Key File and True One Time Pad File creation, a completely | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
125. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
126. | Visual Patch 1.0.0.3 (indigorose.com) | ||
Rose's Visual Patch provides software developers with a comprehensive solution for creating secure full-history software update patches. Designed for use on all 32-bit Windows platforms, these compact, self-installing patch files can be distributed on diskette or CD-ROM or sent via email, web or LAN. Unlike setup programs, which contain all of the files needed to run an | |||
Updated: 9, 2005 | Rating: 0 | Author: Colin Adams | Size: 5801 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
127. | Wallpaper Sequencer Standard 4.51 (wallpapersequencer.com) | ||
system startup or at specified time periods) or by pressing a hot key. Semi-transparent wallpaper calendar. Taskbar transparency and | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Dryazgin | Size: 4308 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
128. | WinLock 4.32 (crystaloffice.com) | ||
is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
129. | WinLock Professional 4.32 (crystaloffice.com) | ||
is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
130. | SecureBlackbox.NET 4.3 (secureblackbox.com) | ||
is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.), including Windows Certificate Storages and cryptography hardware (USB cryptotokens, smartcards). * PGPBlackbox - clean-room implementation of all PGP algorithms and standards with | |||
Updated: 2, 2006 | Rating: 48 | Author: EldoS Corporation | Size: 8799 kb | Commercial Go to category: Development > C / C++ / C-sharp Similar programs | |||
|
Home > Public key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|