|
||||||
|
||
|
Home > Sha software |
|
|
11. | EDXOR 1.64 (members.ozemail.com.au) | ||
EDXOR is a versatile, convenient and optimal text editor and file processor that far surpasses the capabilities of other Notepad-like applications. It offers innovative clipboard handling, cryptographic options and logic text conversions, great for education, fun, or privacy. EDXOR is small, self-contained | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 35 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
12. | NCrypt TX 1.8 (littlelite.net) | ||
to verify message integrity. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With NCrypt TX you can convert your text messages into a sequence of encrypted hexadecimal or Base64 characters. NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 | |||
Updated: 2, 2006 | Rating: 0 | Author: Alessio Saltarin | Size: 511 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
13. | SecureWord 1.5 (secureword.com) | ||
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
14. | Signit 1.0 (softcomplete.com) | ||
self-checking signature (exe-file) for folder contents. Based on SHA-1. Allows receive list of modified and removed files. Create small (~40Kb) self-checking signature (exe-file) for folder contents. Based on SHA-1. Allows receive list of modified and removed | |||
Updated: 9, 2005 | Rating: 0 | Size: 127 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Tray Safe 4.3 (traysafe.com) | ||
most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray Safe | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
16. | Winalysis 3.1 (winalysis.com) | ||
Monitor for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
17. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel, display settings, network, passwords, users, dos, games, internet, memory, printers, desktop, system, Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
18. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
of the encryption algorithms offered. The library uses the modern SHA-2 and HAVAL hashing algorithms so that passphrases can be converted to exactly the amount of bits required for an encryption key and with better mathematical properties than older hashing algorithms such as MD5. Like all Xceed | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
19. | NCrypt TX 1.6 (ncrypt.altervista.org) | ||
tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal characters. Automatically converts a weak password into a strong one. NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 419 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | SecureWord 1.5 (cezeo.com) | ||
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Sha software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|