|
||||||
|
||
|
Home > Brute software |
Related keywords: brute force, brute force attack |
|
|
141. | Advanced ZIP Password Recovery 3.52 (elcomsoft.com) | ||
passwords for ZIP/PKZip/WinZip archives. Supports the customizable brute-force attack, optimized for speed (more than two million passwords per second on modern CPUs like Pentium II); dictionary-based attack, and very fast and effective known-plaintext attack. All ZIP versions and compression methods are supported. Multilanguage interface is provided. A program for recovering lost | |||
Updated: 9, 2005 | Rating: 2203 | Author: Vladimir Katalov | Size: 684 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
142. | Ardorsoft Privacy Guard 2.0 (ardorsoft.com) | ||
algorithm, password is hashed before encryption, Impracticable brute-force attack. **No back doors, none password info stored. There is absolutely no way of recovering your information without the correct password. **Built-in file and directory shredder with multi-rounds shredding function, ensure complete erasure of data, the shredded data can never be restored by anyway | |||
Updated: 3, 2005 | Rating: 42 | Author: Zhenhua Xu | Size: 1294 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
143. | ASHE - A Scripted Hex Editor 2.0 (grandriversoftware.com) | ||
ASHE - A Scripted Hex Editor is a hex editor with a built-in scripting language. Through the user interface you can view basic data types in hex, binary or decimal. From an 8 byte viewport, data is sliced into 8 single characters, four 16 bit integers (signed and unsigned are displayed), two 32 bit integers | |||
Updated: 9, 2005 | Rating: 53 | Author: Mark Manning | Size: 4866 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
144. | bed 0.2.23 (bed.dse.nl) | ||
Menu driven binary editor. Dataformats are ascii, unsigned (base 2-36: bin,oct,dec,hex,etc) and signed integers, float, bitflags, bitfields, labels, ebcdic and time_t. Different sizes and byte ordenings are possible. Datatypes can be used in structures. Contains copy, past, undo, redo, search, replace | |||
Updated: 9, 2005 | Rating: 16 | Author: Jaap Korthals Altes | Size: 380 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
145. | BitZipper 4.1 SR-1 (bitzipper.com) | ||
of BitZipper's dominant strengths is its built-in support for ACE, ARC, ARJ, BH, CAB, GZ, JAR, LHA, LZH, RAR, TAR, TGZ, UUE, WAR, XXE, Z, ZIP and ZOO files; no third-party products are needed. You can access almost every compressed file with just this one tool. No need for additional software applications; no wasted expense. Another one of BitZipper's strengths is that it | |||
Updated: 9, 2005 | Rating: 124 | Author: Brian Rasmusson | Size: 2714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
146. | CFList 1.0 (ciansoft.com) | ||
Free tool provides list of formats currently available on the Windows clipboard. Gives the integer value to identify each format. Useful for software development using the clipboard. Free tool provides list of formats currently available on the Windows clipboard. Gives the integer value to identify each format. Useful for software development using the clipboard. | |||
Updated: 9, 2005 | Rating: 0 | Author: Ian Chester | Size: 211 kb | Freeware Go to category: System Utilities > Clipboard Tools Similar programs | |||
147. | DB Maker 2.0 (internet-soft.com) | ||
DataBase Maker allows you to extract specific data from HTML and TXT documents and create text databases. The program lets you analyze and search a selected document for specified data, and convert the unstructured results into a text file for further processing in a spreadsheet application like Microsoft | |||
Updated: 9, 2005 | Rating: 42 | Author: DB Maker | Size: 537 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
148. | DCPP 2.7 (securstar.com) | ||
transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
149. | DriveCryptPlusPack 1.0c (securstar.de) | ||
allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
150. | dsCrypt 1.10 (members.ozemail.com.au) | ||
widely accepted algorithm - BruteHalt and exceptional resistance to brute-force password search - inherent resistance to brute-force key search - Secure PassPad and immunity to keylogger-infested environments - disclosed implementation and source code - secure use of system resources - verified data and file processing - efficient user interface and operation - speedy | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 25 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Brute software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|